Commit Graph

2571 Commits

Author SHA1 Message Date
xeji
bde4483d13
flashplayer: 31.0.0.108 -> 31.0.0.122 (#48126)
previous version was removed upstream (404)
2018-10-10 23:49:40 +02:00
adisbladis
ffc899dab1
firefox-beta-bin: 63.0b9 -> 63.0b13 2018-10-09 17:36:43 +08:00
adisbladis
c19fc34926
firefox-devedition-bin: 63.0b9 -> 63.0b13 2018-10-09 17:36:42 +08:00
worldofpeace
e5bea728ce eolie: 0.9.37 -> 0.9.41 (#47942) 2018-10-06 15:32:03 +02:00
Andreas Rammhold
248ed3575c tor-browser-bundle-bin: 8.0.1 -> 8.0.2
Update to latest version due to security updates and 8.0.1 not being
available on the mirrors anymore.

Release notes: https://blog.torproject.org/new-release-tor-browser-802
2018-10-06 14:49:19 +02:00
Corey O'Connor
ba2fe3c9a6 firefox: disable auto updates using distribution policies.
Resolves #33884
2018-10-03 07:22:49 -07:00
Andreas Rammhold
246d2848ff
firefox-esr-60: 60.2.1 -> 60.2.2 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:51:13 +02:00
Andreas Rammhold
e7785f1148
firefox: 62.0.2 -> 62.0.3 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:51:13 +02:00
Andreas Rammhold
64d02660cb
firefox-bin: 62.0.2 -> 62.0.3 [critical security fixes]
This update bumps the package to the latest stable version containing a
few security fixes:

- CVE-2018-12386: Type confusion in JavaScript
  A vulnerability in register allocation in JavaScript can lead to type
  confusion, allowing for an arbitrary read and write. This leads to
  remote code execution inside the sandboxed content process when
  triggered.

- CVE-2018-12387
  A vulnerability where the JavaScript JIT compiler inlines
  Array.prototype.push with multiple arguments that results in the stack
  pointer being off by 8 bytes after a bailout. This leaks a memory
  address to the calling function which can be used as part of an
  exploit inside the sandboxed content process.

Source: https://www.mozilla.org/en-US/security/advisories/mfsa2018-24/
2018-10-03 09:35:54 +02:00
Jörg Thalheim
c527619db6
Merge pull request #47485 from prusnak/remove-mozilla-plugins-trezor
mozilla-plugins/trezor: remove applications/networking/browsers/mozilla-plugins/trezor
2018-09-29 11:52:32 +01:00
Pavol Rusnak
62b15996a7
mozilla-plugins/trezor: remove applications/networking/browsers/mozilla-plugins/trezor
trezor-mozilla-plugin is no longer maintained software

package pkgs/servers/trezord should be used instead
2018-09-29 12:24:43 +02:00
Wael M. Nasreddine
fa46ce3828
browsh: 1.4.10 -> 1.4.13 2018-09-28 15:32:02 -07:00
Will Dietz
3f0ae25538
Merge pull request #47444 from dtzWill/fix/patchelf-chrome-virtualbox-and-treewide
google-chrome, treewide: fix patchelf usages to not crash constantly, patchelf as native
2018-09-28 14:25:05 -05:00
R. RyanTM
42af103ae3 otter-browser: 0.9.96 -> 0.9.99.3 (#46217)
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
otter-browser
2018-09-28 21:09:26 +02:00
Will Dietz
776e6da544 google-chrome: fix native inputs, otherwise uses wrong patchelf 2018-09-28 11:43:16 -05:00
Patrick Hilhorst
71eb7adfb2
vivaldi: 1.15.1147.64-1 -> 2.0.1309.29-2 2018-09-27 00:50:57 +02:00
worldofpeace
6cd28a468a eolie: 0.9.36 -> 0.9.37 (#47345) 2018-09-25 20:16:03 +02:00
adisbladis
3aaa9db32f
firefox-beta-bin: 63.0b6 -> 63.0b9 2018-09-25 22:55:22 +08:00
adisbladis
0aa0344804
firefox-devedition-bin: 63.0b6 -> 63.0b9 2018-09-25 22:55:21 +08:00
zimbatm
6060940c24 firefox-bin: fix channel patching
The patchPhase wasn't being applied at all.

This patch re-enables that and also re-thinks the setting that we want
to have. Turning off the auto-update is more accurate and doesn't lose
information like it did before.
2018-09-25 16:48:07 +02:00
Andreas Rammhold
24c58bd1cc
Merge pull request #47257 from taku0/firefox-bin-62.0.2
firefox, firefox-bin:: 61.0.2 -> 62.0.2,  firefox-esr: 60.2.0esr -> 60.2.1esr [Moderate security fixes]
2018-09-24 17:54:26 +02:00
taku0
e5778a9991 firefox-esr: 60.2.0esr -> 60.2.1esr 2018-09-24 09:13:03 +09:00
Joachim Fasting
f2ba1a4284
tor-browser-bundle-bin: 8.0 -> 8.0.1 2018-09-22 20:13:55 +02:00
taku0
da9823672f firefox: 61.0.2 -> 62.0.2 2018-09-22 03:13:50 +09:00
taku0
5b79f81a39 firefox-bin: 61.0.2 -> 62.0.2 2018-09-22 03:12:20 +09:00
R. RyanTM
da78d3e829 links2: 2.16 -> 2.17
Semi-automatic update generated by
https://github.com/ryantm/nixpkgs-update tools. This update was made
based on information from
https://repology.org/metapackage/links2/versions
2018-09-20 08:34:23 -07:00
xeji
5c7406c608
Merge pull request #46758 from lluchs/vivaldi-1.15.1147.64-1
vivaldi: 1.15.1147.42-1 -> 1.15.1147.64-1
2018-09-17 15:46:11 +02:00
Lukas Werling
478e1fe369 vivaldi-ffmpeg-codecs: 61.0.3163.91 -> 69.0.3497.73 2018-09-16 20:53:50 +02:00
Lukas Werling
eb275c96f2 vivaldi: 1.15.1147.42-1 -> 1.15.1147.64-1 2018-09-16 20:53:04 +02:00
adisbladis
c7a789100f
firefox-beta-bin: 62.0b20 -> 63.0b6 2018-09-16 11:09:42 +08:00
adisbladis
8e19799469
firefox-devedition-bin: 62.0b20 -> 63.0b6 2018-09-16 11:09:39 +08:00
Michael Raskin
a9e50ec21a
Merge pull request #46643 from taku0/flashplayer-31.0.0.108
flashplayer: 30.0.0.154 -> 31.0.0.108 [Important security fix]
2018-09-14 11:25:59 +00:00
taku0
417cbb9307 flashplayer: 30.0.0.154 -> 31.0.0.108 2018-09-14 08:12:12 +09:00
Joachim Fasting
aacf68a635
tor-browser-bundle-bin: stdenv.shell -> runtimeShell in wrapper 2018-09-13 17:45:50 +02:00
Joachim Fasting
546e511edc
tor-browser-bundle-bin: parameterize icon theme 2018-09-13 17:45:49 +02:00
Joachim Fasting
5710ee3bef
tor-browser-bundle-bin: add gsettings-schemas
See https://github.com/NixOS/nixpkgs/issues/46587
2018-09-13 17:45:43 +02:00
xeji
decd819911
Merge pull request #46556 from rnhmjoj/lastpass
qutebrowser: patch all python scripts
2018-09-12 23:51:40 +02:00
worldofpeace
508e353fd4 eolie: 0.9.35 -> 0.9.36 2018-09-12 02:25:31 -04:00
rnhmjoj
cf2603f144
qutebrowser: patch all python scripts 2018-09-12 03:35:26 +02:00
Florian Bruhin
84a0dc8191
qutebrowser: Fix patching of standarddir.py
The original patch was broken since a85e19a5e1 because an `APPNAME` variable was introduced there.
2018-09-11 20:33:25 +02:00
Joachim Fasting
ed5283fcf5
tor-browser-bundle-bin: 7.5.6 -> 8.0 2018-09-11 13:27:27 +02:00
Yuriy Taraday
c098f143b4 chromium: 68.0.3440.106 -> 69.0.3497.81
Also update to build with external gn.
2018-09-07 23:34:47 +04:00
Michael Raskin
f9a0679297
Merge pull request #46157 from taku0/firefox-bin-62.0
firefox,  firefox-bin: 61.0.2 -> 62.0,  firefox-esr: 60.1.0esr -> 60.2.0esr, remove 52.9.0esr [Critical security fixes]
2018-09-07 12:10:47 +00:00
taku0
0a3f07077b firefox-esr: 60.1.0esr -> 60.2.0esr, mark 52.9.0esr insecure 2018-09-07 08:14:48 +09:00
Michele Guerini Rocco
eadb7b1589 qutebrowser: patch scripts (#37316) 2018-09-05 19:06:18 +02:00
Bart Brouns
bf0cec40ca qutebrowser: 1.4.1 -> 1.4.2 (#46096) 2018-09-05 16:35:12 +02:00
Samuel Dionne-Riel
7ec9a333df qtchan: Fixes build from Qt upgrade. (#46082)
Uses an upstream fix.
2018-09-05 08:23:29 +02:00
taku0
26cbfe1035 firefox: 61.0.2 -> 62.0 2018-09-04 21:16:46 +09:00
taku0
12723b105c firefox-bin: 61.0.2 -> 62.0 2018-09-04 21:13:35 +09:00
John Ericson
2c4a75e9ef
Merge pull request #45820 from obsidiansystems/dont-use-obsolete-platform-aliases
treewide: Dont use obsolete platform aliases
2018-08-31 09:56:10 -04:00