Commit Graph

2676 Commits

Author SHA1 Message Date
Silvan Mosberger
bed0e8b089
Merge pull request #49806 from colemickens/falkon-qtwayland
falkon: enable qtwayland
2018-11-10 14:52:39 +01:00
Frederik Rietdijk
53d00c3351 Merge master into staging-next 2018-11-10 11:08:54 +01:00
Renaud
caf2390efa
Merge pull request #49636 from colemickens/google-chrome-unstable-fix
google-chrome-dev: add at-spi2-core dependency
2018-11-09 23:01:49 +01:00
Michael Raskin
213407d471 firefox-bin: 63.0 -> 63.0.1 2018-11-08 20:23:33 +03:00
Michael Raskin
108de151f8 firefox: 63.0 -> 63.0.1; firefox-esr: 60.2.2esr -> 60.3.0esr 2018-11-08 20:23:33 +03:00
Michael Raskin
adf41ed942
Merge pull request #49864 from oxij/pkgs/tiny-things
trivial: tiny cleanups and fixes
2018-11-08 06:28:10 +00:00
Jan Malakhovski
d2d80e6d30 firefox: disable pulseaudio support on non-Linux by default 2018-11-08 05:20:18 +00:00
Andreas Rammhold
faf57d2b95
Merge pull request #49690 from mat8913/unstable_firefox-esr-60.3.0
firefox-esr-60: 60.2.2 -> 60.3.0 [critical security fixes]
2018-11-07 21:18:12 +01:00
Andreas Rammhold
551ef1ac41 firefox: provide clang configure flags on i686
With the upgrade to firefox 62 clang flags are now required on i686.

(cherry picked from commit acf4a4eff315a52d8f9c944a167ecb373bc1fdf9)
2018-11-07 19:44:01 +01:00
Andreas Rammhold
c8d45086d1
firefox-esr-60: drop skia patch on aarch64 2018-11-07 16:47:24 +01:00
Rafael García Gallego
ded5faa82e flashplayer: add libglvnd dep 2018-11-07 16:36:30 +01:00
Cole Mickens
4d26a57d50 falkon: enable qtwayland on linux 2018-11-05 22:23:51 -08:00
Patrick Hilhorst
b0e9fc131c
treewide: Fix packages using name where they should use pname 2018-11-06 00:06:17 +01:00
Matthew Harm Bekkema
9973a266ab firefox-esr-60: 60.2.2 -> 60.3.0 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12392: Crash with nested event loops
  When manipulating user events in nested loops while opening a document
  through script, it is possible to trigger a potentially exploitable
  crash due to poor event handling.

- CVE-2018-12393: Integer overflow during Unicode conversion while loading JavaScript
  A potential vulnerability was found in 32-bit builds where an integer
  overflow during the conversion of scripts to an internal UTF-16
  representation could result in allocating a buffer too small for the
  conversion. This leads to a possible out-of-bounds write.
  Note: 64-bit builds are not vulnerable to this issue.

- CVE-2018-12395: WebExtension bypass of domain restrictions through header rewriting
  By rewriting the Host request headers using the webRequest API, a
  WebExtension can bypass domain restrictions through domain fronting.
  This would allow access to domains that share a host that are
  otherwise restricted.

- CVE-2018-12396: WebExtension content scripts can execute in disallowed contexts
  A vulnerability where a WebExtension can run content scripts in
  disallowed contexts following navigation or other events. This allows
  for potential privilege escalation by the WebExtension on sites where
  content scripts should not be run.

- CVE-2018-12397: Missing warning prompt when WebExtension requests local file access
  A WebExtension can request access to local files without the warning
  prompt stating that the extension will "Access your data for all
  websites" being displayed to the user. This allows extensions to run
  content scripts in local pages without permission warnings when a
  local file is opened.

- CVE-2018-12389: Memory safety bugs fixed in Firefox ESR 60.3
  Mozilla developers and community members Daniel Veditz and Philipp
  reported memory safety bugs present in Firefox ESR 60.2. Some of these
  bugs showed evidence of memory corruption and we presume that with
  enough effort that some of these could be exploited to run arbitrary
  code.

- CVE-2018-12390: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3
  Mozilla developers and community members Christian Holler, Bob Owen,
  Boris Zbarsky, Calixte Denizet, Jason Kratzer, Jed Davis, Taegeon Lee,
  Philipp, Ronald Crane, Raul Gurzau, Gary Kwong, Tyson Smith, Raymond
  Forbes, and Bogdan Tara reported memory safety bugs present in Firefox
  62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory
  corruption and we presume that with enough effort that some of these
  could be exploited to run arbitrary code.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-27/
2018-11-03 22:51:36 +11:00
Will Dietz
86cee9771b
Merge pull request #48672 from dtzWill/update/w3m-2018
w3m: 20161120 -> 20180125
2018-11-02 19:05:00 -05:00
Cole Mickens
45fd44c66d google-chrome-dev: add at-spi2-core dependency 2018-11-02 02:01:51 -07:00
Domen Kožar
89ede978a0
chromium: use jumbo builds to speedup compilation
On Hetzner machine with 1 core: 4h40m
On Hetzner machine with 8 cores: 1h20m
2018-11-01 17:51:51 +00:00
adisbladis
1756b0fb75
firefox-beta-bin: 64.0b3 -> 64.0b5 2018-10-30 18:33:04 +00:00
adisbladis
22c7bc1e0f
firefox-devedition-bin: 64.0b3 -> 64.0b5 2018-10-30 18:32:58 +00:00
Robert Schütz
cc161d738b qutebrowser: 1.5.1 -> 1.5.2 2018-10-30 14:10:44 +01:00
Joachim F
3272b9a2e9
Merge pull request #49173 from oxij/pkgs/update-tor-browser-again
firefoxPackages.tor-browser: 8.0.2 -> 8.0.3
2018-10-29 09:54:17 +00:00
Herwig Hochleitner
ed91407784 Revert "chromium: make gcc8 build available via buildWithGcc flag"
This partially reverts commit
b70ab5c405 (except for depending gnome2)

see #48922
2018-10-28 17:10:53 +01:00
Herwig Hochleitner
17585ff6d8 chromium: 70.0.3538.67 -> 70.0.3538.77 2018-10-28 16:00:46 +01:00
Herwig Hochleitner
b70ab5c405 chromium: make gcc8 build available via buildWithGcc flag 2018-10-28 16:00:46 +01:00
Herwig Hochleitner
7eea24db5d chromium/plugins: specify gcc instead of stdenv.cc 2018-10-28 16:00:46 +01:00
volth
d2daf0dd6f chromium: build with clang 2018-10-28 16:00:45 +01:00
SLNOS
87d0fe0049 firefoxPackages.tor-browser: 8.0.2 -> 8.0.3 2018-10-26 18:02:05 +00:00
José Romildo Malaquias
34964d6f3b vivaldi-ffmpeg-codecs: 69.0.3497.73 -> 70.0.3538.77 2018-10-25 18:28:59 -03:00
José Romildo Malaquias
3cd8c2240b vivaldi: 2.0.1309.29-2 -> 2.1.1337.36-1 2018-10-25 18:27:49 -03:00
Andreas Rammhold
d17ab805fd
Merge pull request #48862 from andir/firefox
firefox{,bin}: 62.0.3 -> 63.0 & nss: 3.38-> 3.39
2018-10-25 07:29:07 +02:00
Herwig Hochleitner
bb03fbc2c8 chromium: 69.0.3497.100 -> 70.0.3538.67 2018-10-24 19:38:51 +02:00
Will Dietz
8324a938e7 tor-browser-bundle-bin: 8.0.2 -> 8.0.3
https://gitweb.torproject.org/builders/tor-browser-build.git/tree/projects/tor-browser/Bundle-Data/Docs/ChangeLog.txt?h=tbb-8.0.3-build1
2018-10-24 10:45:55 -05:00
adisbladis
515f89bc3a
firefox-beta-bin: 63.0b14 -> 64.0b3 2018-10-24 13:57:07 +01:00
adisbladis
19b7cf3abd
firefox-devedition-bin: 63.0b14 -> 64.0b3 2018-10-24 13:57:06 +01:00
Andreas Rammhold
5137c04770
firefox-bin: 62.0.3 -> 63.0 2018-10-23 10:15:48 +02:00
Andreas Rammhold
277da59e47
firefox: 62.0.3 -> 63.0 2018-10-23 10:15:46 +02:00
Joachim F
c54c00465f
Merge pull request #48715 from oxij/pkgs/update-tor-browser
firefoxPackages.tor-browser: 7.5.6 -> 8.0.2
2018-10-22 18:28:14 +00:00
Jörg Thalheim
119d539d72
Merge pull request #47864 from uskudnik/add-brave-browser
brave: init at 0.24.0
2018-10-22 11:01:22 +01:00
SLNOS
0e3df42d64 firefoxPackages.tor-browser-8-0: apply a fix from bugzilla 2018-10-21 19:18:28 +00:00
worldofpeace
9d49b19ea5 eolie: 0.9.41 -> 0.9.45 (#48719) 2018-10-20 00:12:54 +02:00
SLNOS
bd7c0c8a6c firefoxPackages.tor-browser: 7.5.6 -> 8.0.2
Mostly usable now.
2018-10-19 16:46:55 +00:00
SLNOS
b21b9bbd6c firefoxPackages: indent 2018-10-19 16:46:41 +00:00
SLNOS
5ec27f3033 firefoxPackages: cleanup
Misc cleanups, but mainly this:

Before:
- `version` could mean either Firefox or TorBrowser version,
- `configureFlags` was hacky.

Now:
- `ffversion` is Firefox version, `tbversion` is TorBrowser version,
- `configureFlags` is much less hacky.
2018-10-19 16:46:28 +00:00
volth
337d140953 chromium: propagate stdenv for "chromium.override{ stdenv=gcc8Stdenv; }" (#48615) 2018-10-18 23:09:12 +02:00
Will Dietz
4249f77260 w3m: 20161120 -> 20180125
https://raw.githubusercontent.com/tats/w3m/v0.5.3+git20180125/NEWS

Include some CVE fixes it would appear.
2018-10-18 11:17:00 -05:00
volth
d767ba9996 chromium 71+: there is no more option 'use_gtk3' (#48595) 2018-10-17 23:04:15 +02:00
volth
d039722d0e chromium 71+: add at-spi2-core dependency (#48594) 2018-10-17 23:03:43 +02:00
volth
0c8cdb53f6 chromium: fix aarch64 build (#48586)
* chromium: fix aarch64 build

* chromium: use more stable urls
2018-10-17 01:21:29 +02:00
Urban Skudnik
c90ad779a0
brave: init at 0.25.2 2018-10-16 20:19:37 +02:00
volth
2ad99a662d chromium plugins: add meta.platforms (#48495)
to prevent their installation on aarch64
2018-10-16 18:11:41 +02:00
R. RyanTM
caa6ab0048 qutebrowser: 1.4.2 -> 1.5.1
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/qutebrowser/versions
2018-10-14 08:58:45 +02:00
adisbladis
00d7ce7ef1
firefox-beta-bin: 63.0b13 -> 63.0b14 2018-10-14 11:24:12 +08:00
adisbladis
726dd79151
firefox-devedition-bin: 63.0b13 -> 63.0b14 2018-10-14 11:24:03 +08:00
Will Dietz
ce6db5e36e chromium: update to 69.0.3497.100 (and others), ran update.sh 2018-10-12 12:20:35 +02:00
Will Dietz
4b7de150a8 chromium/update.sh: don't use remote builders, lots of copying for work 2018-10-12 12:20:35 +02:00
xeji
bde4483d13
flashplayer: 31.0.0.108 -> 31.0.0.122 (#48126)
previous version was removed upstream (404)
2018-10-10 23:49:40 +02:00
adisbladis
ffc899dab1
firefox-beta-bin: 63.0b9 -> 63.0b13 2018-10-09 17:36:43 +08:00
adisbladis
c19fc34926
firefox-devedition-bin: 63.0b9 -> 63.0b13 2018-10-09 17:36:42 +08:00
worldofpeace
e5bea728ce eolie: 0.9.37 -> 0.9.41 (#47942) 2018-10-06 15:32:03 +02:00
Andreas Rammhold
248ed3575c tor-browser-bundle-bin: 8.0.1 -> 8.0.2
Update to latest version due to security updates and 8.0.1 not being
available on the mirrors anymore.

Release notes: https://blog.torproject.org/new-release-tor-browser-802
2018-10-06 14:49:19 +02:00
Corey O'Connor
ba2fe3c9a6 firefox: disable auto updates using distribution policies.
Resolves #33884
2018-10-03 07:22:49 -07:00
Andreas Rammhold
246d2848ff
firefox-esr-60: 60.2.1 -> 60.2.2 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:51:13 +02:00
Andreas Rammhold
e7785f1148
firefox: 62.0.2 -> 62.0.3 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:51:13 +02:00
Andreas Rammhold
64d02660cb
firefox-bin: 62.0.2 -> 62.0.3 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:35:54 +02:00
Jörg Thalheim
c527619db6
Merge pull request #47485 from prusnak/remove-mozilla-plugins-trezor
mozilla-plugins/trezor: remove applications/networking/browsers/mozilla-plugins/trezor
2018-09-29 11:52:32 +01:00
Pavol Rusnak
62b15996a7
mozilla-plugins/trezor: remove applications/networking/browsers/mozilla-plugins/trezor
trezor-mozilla-plugin is no longer maintained software

package pkgs/servers/trezord should be used instead
2018-09-29 12:24:43 +02:00
Wael M. Nasreddine
fa46ce3828
browsh: 1.4.10 -> 1.4.13 2018-09-28 15:32:02 -07:00
Will Dietz
3f0ae25538
Merge pull request #47444 from dtzWill/fix/patchelf-chrome-virtualbox-and-treewide
google-chrome, treewide: fix patchelf usages to not crash constantly, patchelf as native
2018-09-28 14:25:05 -05:00
R. RyanTM
42af103ae3 otter-browser: 0.9.96 -> 0.9.99.3 (#46217)
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
otter-browser
2018-09-28 21:09:26 +02:00
Will Dietz
776e6da544 google-chrome: fix native inputs, otherwise uses wrong patchelf 2018-09-28 11:43:16 -05:00
Patrick Hilhorst
71eb7adfb2
vivaldi: 1.15.1147.64-1 -> 2.0.1309.29-2 2018-09-27 00:50:57 +02:00
worldofpeace
6cd28a468a eolie: 0.9.36 -> 0.9.37 (#47345) 2018-09-25 20:16:03 +02:00
adisbladis
3aaa9db32f
firefox-beta-bin: 63.0b6 -> 63.0b9 2018-09-25 22:55:22 +08:00
adisbladis
0aa0344804
firefox-devedition-bin: 63.0b6 -> 63.0b9 2018-09-25 22:55:21 +08:00
zimbatm
6060940c24 firefox-bin: fix channel patching
The patchPhase wasn't being applied at all.

This patch re-enables that and also re-thinks the setting that we want
to have. Turning off the auto-update is more accurate and doesn't lose
information like it did before.
2018-09-25 16:48:07 +02:00
Andreas Rammhold
24c58bd1cc
Merge pull request #47257 from taku0/firefox-bin-62.0.2
firefox, firefox-bin:: 61.0.2 -> 62.0.2,  firefox-esr: 60.2.0esr -> 60.2.1esr [Moderate security fixes]
2018-09-24 17:54:26 +02:00
taku0
e5778a9991 firefox-esr: 60.2.0esr -> 60.2.1esr 2018-09-24 09:13:03 +09:00
Joachim Fasting
f2ba1a4284
tor-browser-bundle-bin: 8.0 -> 8.0.1 2018-09-22 20:13:55 +02:00
taku0
da9823672f firefox: 61.0.2 -> 62.0.2 2018-09-22 03:13:50 +09:00
taku0
5b79f81a39 firefox-bin: 61.0.2 -> 62.0.2 2018-09-22 03:12:20 +09:00
R. RyanTM
da78d3e829 links2: 2.16 -> 2.17
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/links2/versions
2018-09-20 08:34:23 -07:00
xeji
5c7406c608
Merge pull request #46758 from lluchs/vivaldi-1.15.1147.64-1
vivaldi: 1.15.1147.42-1 -> 1.15.1147.64-1
2018-09-17 15:46:11 +02:00
Lukas Werling
478e1fe369 vivaldi-ffmpeg-codecs: 61.0.3163.91 -> 69.0.3497.73 2018-09-16 20:53:50 +02:00
Lukas Werling
eb275c96f2 vivaldi: 1.15.1147.42-1 -> 1.15.1147.64-1 2018-09-16 20:53:04 +02:00
adisbladis
c7a789100f
firefox-beta-bin: 62.0b20 -> 63.0b6 2018-09-16 11:09:42 +08:00
adisbladis
8e19799469
firefox-devedition-bin: 62.0b20 -> 63.0b6 2018-09-16 11:09:39 +08:00
Michael Raskin
a9e50ec21a
Merge pull request #46643 from taku0/flashplayer-31.0.0.108
flashplayer: 30.0.0.154 -> 31.0.0.108 [Important security fix]
2018-09-14 11:25:59 +00:00
taku0
417cbb9307 flashplayer: 30.0.0.154 -> 31.0.0.108 2018-09-14 08:12:12 +09:00
Joachim Fasting
aacf68a635
tor-browser-bundle-bin: stdenv.shell -> runtimeShell in wrapper 2018-09-13 17:45:50 +02:00
Joachim Fasting
546e511edc
tor-browser-bundle-bin: parameterize icon theme 2018-09-13 17:45:49 +02:00
Joachim Fasting
5710ee3bef
tor-browser-bundle-bin: add gsettings-schemas
See https://github.com/NixOS/nixpkgs/issues/46587
2018-09-13 17:45:43 +02:00
xeji
decd819911
Merge pull request #46556 from rnhmjoj/lastpass
qutebrowser: patch all python scripts
2018-09-12 23:51:40 +02:00
worldofpeace
508e353fd4 eolie: 0.9.35 -> 0.9.36 2018-09-12 02:25:31 -04:00
rnhmjoj
cf2603f144
qutebrowser: patch all python scripts 2018-09-12 03:35:26 +02:00
Florian Bruhin
84a0dc8191
qutebrowser: Fix patching of standarddir.py
The original patch was broken since a85e19a5e1 because an `APPNAME` variable was introduced there.
2018-09-11 20:33:25 +02:00
Joachim Fasting
ed5283fcf5
tor-browser-bundle-bin: 7.5.6 -> 8.0 2018-09-11 13:27:27 +02:00
Yuriy Taraday
c098f143b4 chromium: 68.0.3440.106 -> 69.0.3497.81
Also update to build with external gn.
2018-09-07 23:34:47 +04:00
Michael Raskin
f9a0679297
Merge pull request #46157 from taku0/firefox-bin-62.0
firefox,  firefox-bin: 61.0.2 -> 62.0,  firefox-esr: 60.1.0esr -> 60.2.0esr, remove 52.9.0esr [Critical security fixes]
2018-09-07 12:10:47 +00:00
taku0
0a3f07077b firefox-esr: 60.1.0esr -> 60.2.0esr, mark 52.9.0esr insecure 2018-09-07 08:14:48 +09:00
Michele Guerini Rocco
eadb7b1589 qutebrowser: patch scripts (#37316) 2018-09-05 19:06:18 +02:00