Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.
This update was made based on information from https://repology.org/metapackage/gegl/versions.
These checks were done:
- built on NixOS
- ran ‘/nix/store/2w7m19f387zkwhxbv6k2p8nrrlwqimpn-gegl-0.3.34/bin/gegl -h’ got 0 exit code
- ran ‘/nix/store/2w7m19f387zkwhxbv6k2p8nrrlwqimpn-gegl-0.3.34/bin/gegl --help’ got 0 exit code
- found 0.3.34 with grep in /nix/store/2w7m19f387zkwhxbv6k2p8nrrlwqimpn-gegl-0.3.34
- directory tree listing: https://gist.github.com/96c792a5cd60943effce7884fc50cc3a
I've rebuild all packages that depend on gpgme and everything seems fine
so far (there are a few failures but the ones I've checked are unrelated
to gpgme).
Upstream release notes (Noteworthy changes in version 1.11.1):
* Fixed build problems in the 1.11.0 release.
* Added C++ interfaces which were planned for 1.11.0.
The 1.11.0 release came with these changes:
* New encryption API to support direct key specification including
hidden recipients option and taking keys from a file. This also
allows to enforce the use of a subkey.
* New encryption flag for the new API to enforce the use of plain
mail addresses (addr-spec).
* The import API can now tell whether v3 keys are skipped. These old
and basically broken keys are not anymore supported by GnuPG 2.1.
* The decrypt and verify API will now return the MIME flag as
specified by RFC-4880bis.
* The offline mode now has an effect on gpg by disabling all network
access. [#3831]
* A failed OpenPGP verification how returns the fingerprint of the
intended key if a recent gpg version was used for signature
creation.
* New tool gpgme-json as native messaging server for web browsers.
As of now public key encryption and decryption is supported.
Requires Libgpg-error 1.29.
* New context flag "request-origin" which has an effect when used
with GnuPG 2.2.6 or later.
* New context flag "no-symkey-cache" which has an effect when used
with GnuPG 2.2.7 or later.
* New convenience constant GPGME_KEYLIST_MODE_LOCATE.
* Improved the Python documentation.
* Fixed a potential regression with GnuPG 2.2.6 or later.
* Fixed a crash in the Python bindings on 32 bit platforms. [#3892]
* Various minor fixes.
Critical CVE-2018-6085: Use after free in Disk Cache. Reported by Ned Williamson on 2018-03-28
Critical CVE-2018-6086: Use after free in Disk Cache. Reported by Ned Williamson on 2018-03-30
High CVE-2018-6087: Use after free in WebAssembly. Reported by Anonymous on 2018-02-20
High CVE-2018-6088: Use after free in PDFium. Reported by Anonymous on 2018-03-15
High CVE-2018-6089: Same origin policy bypass in Service Worker. Reported by Rob Wu on 2018-02-04
High CVE-2018-6090: Heap buffer overflow in Skia. Reported by ZhanJia Song on 2018-03-12
High CVE-2018-6091: Incorrect handling of plug-ins by Service Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-10-05
High CVE-2018-6092: Integer overflow in WebAssembly. Reported by Natalie Silvanovich of Google Project Zero on 2018-03-08
Medium CVE-2018-6093: Same origin bypass in Service Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-11-01
Medium CVE-2018-6094: Exploit hardening regression in Oilpan. Reported by Chris Rohlf on 2016-08-01
Medium CVE-2018-6095: Lack of meaningful user interaction requirement before file upload. Reported by Abdulrahman Alqabandi (@qab) on 2016-08-11
Medium CVE-2018-6096: Fullscreen UI spoof. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-19
Medium CVE-2018-6097: Fullscreen UI spoof. Reported by xisigr of Tencent's Xuanwu Lab on 2018-01-26
Medium CVE-2018-6098: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-01-03
Medium CVE-2018-6099: CORS bypass in ServiceWorker. Reported by Jun Kokatsu (@shhnjk) on 2018-02-03
Medium CVE-2018-6100: URL spoof in Omnibox. Reported by Lnyas Zhang on 2018-02-11
Medium CVE-2018-6101: Insufficient protection of remote debugging prototol in DevTools . Reported by Rob Wu on 2018-02-19
Medium CVE-2018-6102: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-20
Medium CVE-2018-6103: UI spoof in Permissions. Reported by Khalil Zhani on 2018-02-24
Medium CVE-2018-6104: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-03-08
Medium CVE-2018-6105: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-01-18
Medium CVE-2018-6106: Incorrect handling of promises in V8. Reported by lokihardt of Google Project Zero on 2018-01-25
Medium CVE-2018-6107: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-02
Medium CVE-2018-6108: URL spoof in Omnibox. Reported by Khalil Zhani on 2018-02-27
Low CVE-2018-6109: Incorrect handling of files by FileAPI. Reported by Dominik Weber (@DoWeb_) on 2017-04-10
Low CVE-2018-6110: Incorrect handling of plaintext files via file:// . Reported by Wenxiang Qian (aka blastxiang) on 2017-10-24
Low CVE-2018-6111: Heap-use-after-free in DevTools. Reported by Khalil Zhani on 2017-11-02
Low CVE-2018-6112: Incorrect URL handling in DevTools. Reported by Rob Wu on 2017-12-29
Low CVE-2018-6113: URL spoof in Navigation. Reported by Khalil Zhani on 2018-01-25
Low CVE-2018-6114: CSP bypass. Reported by Lnyas Zhang on 2018-02-13
Low CVE-2018-6115: SmartScreen bypass in downloads. Reported by James Feher on 2018-03-07
Low CVE-2018-6116: Incorrect low memory handling in WebAssembly. Reported by Jin from Chengdu Security Response Center of Qihoo 360 Technology Co. Ltd. on 2018-03-15
Low CVE-2018-6117: Confusing autofill settings. Reported by Spencer Dailey on 2018-03-15
Low CVE-2018-6084: Incorrect use of Distributed Objects in Google Software Updater on MacOS. Reported by Ian Beer of Google Project Zero on 2018-03-15
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.
This update was made based on information from https://repology.org/metapackage/atom/versions.
These checks were done:
- built on NixOS
- ran ‘/nix/store/q560gnycgnl44jmldg5y2a9akg47q8kb-atom-1.26.0/bin/apm -h’ got 0 exit code
- ran ‘/nix/store/q560gnycgnl44jmldg5y2a9akg47q8kb-atom-1.26.0/bin/apm --help’ got 0 exit code
- ran ‘/nix/store/q560gnycgnl44jmldg5y2a9akg47q8kb-atom-1.26.0/bin/apm help’ got 0 exit code
- ran ‘/nix/store/q560gnycgnl44jmldg5y2a9akg47q8kb-atom-1.26.0/bin/atom help’ got 0 exit code
- ran ‘/nix/store/q560gnycgnl44jmldg5y2a9akg47q8kb-atom-1.26.0/bin/.atom-wrapped help’ got 0 exit code
- found 1.26.0 with grep in /nix/store/q560gnycgnl44jmldg5y2a9akg47q8kb-atom-1.26.0
- directory tree listing: https://gist.github.com/10c433ad7807e5aeaa581f442b89dd6c
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.
This update was made based on information from https://repology.org/metapackage/arangodb/versions.
These checks were done:
- built on NixOS
- ran ‘/nix/store/lh49lm0kdkijvg9q9kzmacnclh5x2s4m-arangodb-3.3.7/bin/foxx-manager --help’ got 0 exit code
- ran ‘/nix/store/lh49lm0kdkijvg9q9kzmacnclh5x2s4m-arangodb-3.3.7/bin/foxx-manager help’ got 0 exit code
- ran ‘/nix/store/lh49lm0kdkijvg9q9kzmacnclh5x2s4m-arangodb-3.3.7/bin/arangobench --help’ got 0 exit code
- ran ‘/nix/store/lh49lm0kdkijvg9q9kzmacnclh5x2s4m-arangodb-3.3.7/bin/arangodump --help’ got 0 exit code
- ran ‘/nix/store/lh49lm0kdkijvg9q9kzmacnclh5x2s4m-arangodb-3.3.7/bin/arangoexport --help’ got 0 exit code
- ran ‘/nix/store/lh49lm0kdkijvg9q9kzmacnclh5x2s4m-arangodb-3.3.7/bin/arangoimp --help’ got 0 exit code
- ran ‘/nix/store/lh49lm0kdkijvg9q9kzmacnclh5x2s4m-arangodb-3.3.7/bin/arangorestore --help’ got 0 exit code
- ran ‘/nix/store/lh49lm0kdkijvg9q9kzmacnclh5x2s4m-arangodb-3.3.7/bin/arangosh --help’ got 0 exit code
- ran ‘/nix/store/lh49lm0kdkijvg9q9kzmacnclh5x2s4m-arangodb-3.3.7/bin/arangovpack --help’ got 0 exit code
- ran ‘/nix/store/lh49lm0kdkijvg9q9kzmacnclh5x2s4m-arangodb-3.3.7/bin/arango-dfdb --help’ got 0 exit code
- ran ‘/nix/store/lh49lm0kdkijvg9q9kzmacnclh5x2s4m-arangodb-3.3.7/bin/arango-init-database --help’ got 0 exit code
- ran ‘/nix/store/lh49lm0kdkijvg9q9kzmacnclh5x2s4m-arangodb-3.3.7/bin/arango-secure-installation --help’ got 0 exit code
- ran ‘/nix/store/lh49lm0kdkijvg9q9kzmacnclh5x2s4m-arangodb-3.3.7/bin/arangod --help’ got 0 exit code
- found 3.3.7 with grep in /nix/store/lh49lm0kdkijvg9q9kzmacnclh5x2s4m-arangodb-3.3.7
- directory tree listing: https://gist.github.com/3fef3cf0eb3977fe8d69df9bbbedc5a9
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.
This update was made based on information from https://repology.org/metapackage/chromedriver/versions.
These checks were done:
- built on NixOS
- ran ‘/nix/store/bnjr4qgd68lh8fdz2hxz7qrc1zvvxkni-chromedriver-2.38/bin/chromedriver -h’ got 0 exit code
- ran ‘/nix/store/bnjr4qgd68lh8fdz2hxz7qrc1zvvxkni-chromedriver-2.38/bin/chromedriver --help’ got 0 exit code
- found 2.38 with grep in /nix/store/bnjr4qgd68lh8fdz2hxz7qrc1zvvxkni-chromedriver-2.38
- directory tree listing: https://gist.github.com/8ba491f60826e1ad2389e69f92fb6116
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.
This update was made based on information from https://repology.org/metapackage/caja/versions.
These checks were done:
- built on NixOS
- ran ‘/nix/store/sssawkcdpbaprvkllgc2xyklribdizd2-caja-1.21.0/bin/caja -h’ got 0 exit code
- ran ‘/nix/store/sssawkcdpbaprvkllgc2xyklribdizd2-caja-1.21.0/bin/caja --help’ got 0 exit code
- ran ‘/nix/store/sssawkcdpbaprvkllgc2xyklribdizd2-caja-1.21.0/bin/caja-connect-server -h’ got 0 exit code
- ran ‘/nix/store/sssawkcdpbaprvkllgc2xyklribdizd2-caja-1.21.0/bin/caja-connect-server --help’ got 0 exit code
- ran ‘/nix/store/sssawkcdpbaprvkllgc2xyklribdizd2-caja-1.21.0/bin/.caja-wrapped -h’ got 0 exit code
- ran ‘/nix/store/sssawkcdpbaprvkllgc2xyklribdizd2-caja-1.21.0/bin/.caja-wrapped --help’ got 0 exit code
- ran ‘/nix/store/sssawkcdpbaprvkllgc2xyklribdizd2-caja-1.21.0/bin/.caja-connect-server-wrapped -h’ got 0 exit code
- ran ‘/nix/store/sssawkcdpbaprvkllgc2xyklribdizd2-caja-1.21.0/bin/.caja-connect-server-wrapped --help’ got 0 exit code
- found 1.21.0 with grep in /nix/store/sssawkcdpbaprvkllgc2xyklribdizd2-caja-1.21.0
- directory tree listing: https://gist.github.com/eed0de1f462096e2dbac08cdcb6344bd
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.
This update was made based on information from https://repology.org/metapackage/acpid/versions.
These checks were done:
- built on NixOS
- ran ‘/nix/store/vm7myzc830jgh1q5xmjc726xgw8fh933-acpid-2.0.29/bin/acpi_listen -h’ got 0 exit code
- ran ‘/nix/store/vm7myzc830jgh1q5xmjc726xgw8fh933-acpid-2.0.29/bin/acpi_listen --help’ got 0 exit code
- ran ‘/nix/store/vm7myzc830jgh1q5xmjc726xgw8fh933-acpid-2.0.29/bin/acpi_listen -v’ and found version 2.0.29
- ran ‘/nix/store/vm7myzc830jgh1q5xmjc726xgw8fh933-acpid-2.0.29/bin/acpi_listen --version’ and found version 2.0.29
- ran ‘/nix/store/vm7myzc830jgh1q5xmjc726xgw8fh933-acpid-2.0.29/bin/acpid help’ got 0 exit code
- ran ‘/nix/store/vm7myzc830jgh1q5xmjc726xgw8fh933-acpid-2.0.29/bin/acpid -v’ and found version 2.0.29
- ran ‘/nix/store/vm7myzc830jgh1q5xmjc726xgw8fh933-acpid-2.0.29/bin/acpid --version’ and found version 2.0.29
- found 2.0.29 with grep in /nix/store/vm7myzc830jgh1q5xmjc726xgw8fh933-acpid-2.0.29
- directory tree listing: https://gist.github.com/48210d03059b65f940b06df3ebb636d1
Semi-automatic update generated by https://github.com/ryantm/nixpkgs-update tools.
This update was made based on information from https://repology.org/metapackage/jpegoptim/versions.
These checks were done:
- built on NixOS
- ran ‘/nix/store/c0w9l7rcn6kx098z11nx3x5q53dvcvmd-jpegoptim-1.4.6/bin/jpegoptim -h’ got 0 exit code
- ran ‘/nix/store/c0w9l7rcn6kx098z11nx3x5q53dvcvmd-jpegoptim-1.4.6/bin/jpegoptim --help’ got 0 exit code
- ran ‘/nix/store/c0w9l7rcn6kx098z11nx3x5q53dvcvmd-jpegoptim-1.4.6/bin/jpegoptim help’ got 0 exit code
- found 1.4.6 with grep in /nix/store/c0w9l7rcn6kx098z11nx3x5q53dvcvmd-jpegoptim-1.4.6
- directory tree listing: https://gist.github.com/ccc6411a2aca02d1769831b9c561f6b4
Update to current vulnix which features greatly improved whitelist
handling among others.
- Temporarly disable flake8 until #39206 is solved.
- Split docs into own output.
* Never modify tabstop. This causes incompatibilities with other
utilities that expect tabs to always be 8 spaces.
* Add standard boilerplate for system-level filetype plugins.