Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
28 commits
Select commit Hold shift + click to select a range
cd0289a
systemd: 253.5 -> 253.6
arianvp Jul 13, 2023
325dde7
Merge staging-next-23.05 into staging-23.05
github-actions[bot] Jul 16, 2023
c3f1611
Merge staging-next-23.05 into staging-23.05
github-actions[bot] Jul 17, 2023
1a46b9a
openssl_3: apply patch for CVE-2023-2975
mweinelt Jul 15, 2023
6dc808f
Merge release-23.05 into staging-next-23.05
github-actions[bot] Jul 18, 2023
b3dc16f
Merge staging-next-23.05 into staging-23.05
github-actions[bot] Jul 18, 2023
fabcd02
Merge release-23.05 into staging-next-23.05
github-actions[bot] Jul 19, 2023
cd176a9
Merge staging-next-23.05 into staging-23.05
github-actions[bot] Jul 19, 2023
1ac4de3
Merge release-23.05 into staging-next-23.05
github-actions[bot] Jul 20, 2023
653eb18
Merge staging-next-23.05 into staging-23.05
github-actions[bot] Jul 20, 2023
eddee0f
curl: apply patch for CVE-2023-32001
yayayayaka Jul 20, 2023
4d90e7c
Merge release-23.05 into staging-next-23.05
github-actions[bot] Jul 21, 2023
cb1b3ec
Merge staging-next-23.05 into staging-23.05
github-actions[bot] Jul 21, 2023
56602c3
Merge release-23.05 into staging-next-23.05
github-actions[bot] Jul 22, 2023
e2de54c
Merge staging-next-23.05 into staging-23.05
github-actions[bot] Jul 22, 2023
63735c2
gnutar: 1.34 -> 1.35
trofi Jul 19, 2023
cb6982e
Merge #243469: systemd: 253.5 -> 253.6
vcunat Jul 22, 2023
c9589f4
Merge #243938: openssl_3: apply patch for CVE-2023-2975
vcunat Jul 22, 2023
1f15680
Merge #244475: curl: apply patch for CVE-2023-32001
vcunat Jul 22, 2023
f933533
Merge #244802: gnutar: 1.34 -> 1.35
vcunat Jul 22, 2023
34d8335
python310Packages.aiohttp: 3.8.4 -> 3.8.5
vcunat Jul 22, 2023
c766620
Merge branch 'staging-23.05' into staging-next-23.05
vcunat Jul 22, 2023
ba6e2f3
Merge release-23.05 into staging-next-23.05
github-actions[bot] Jul 23, 2023
b33410d
gnutar: pull missing `libintl` dependency on Darwin
trofi Jul 23, 2023
d16f06a
Merge release-23.05 into staging-next-23.05
github-actions[bot] Jul 24, 2023
4cfa6dc
Merge release-23.05 into staging-next-23.05
github-actions[bot] Jul 25, 2023
2243d97
Merge release-23.05 into staging-next-23.05
github-actions[bot] Jul 26, 2023
8da2f3b
Merge release-23.05 into staging-next-23.05
github-actions[bot] Jul 27, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
54 changes: 54 additions & 0 deletions pkgs/development/libraries/openssl/3.0/CVE-2023-2975.patch
Original file line number Diff line number Diff line change
@@ -0,0 +1,54 @@
From 6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc Mon Sep 17 00:00:00 2001
From: Tomas Mraz <tomas@openssl.org>
Date: Tue, 4 Jul 2023 17:30:35 +0200
Subject: [PATCH] Do not ignore empty associated data with AES-SIV mode

The AES-SIV mode allows for multiple associated data items
authenticated separately with any of these being 0 length.

The provided implementation ignores such empty associated data
which is incorrect in regards to the RFC 5297 and is also
a security issue because such empty associated data then become
unauthenticated if an application expects to authenticate them.

Fixes CVE-2023-2975

Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/21384)

(cherry picked from commit c426c281cfc23ab182f7d7d7a35229e7db1494d9)
---
.../implementations/ciphers/cipher_aes_siv.c | 18 +++++++++++-------
1 file changed, 11 insertions(+), 7 deletions(-)

diff --git a/providers/implementations/ciphers/cipher_aes_siv.c b/providers/implementations/ciphers/cipher_aes_siv.c
index 45010b90db2a..b396c8651a32 100644
--- a/providers/implementations/ciphers/cipher_aes_siv.c
+++ b/providers/implementations/ciphers/cipher_aes_siv.c
@@ -120,14 +120,18 @@ static int siv_cipher(void *vctx, unsigned char *out, size_t *outl,
if (!ossl_prov_is_running())
return 0;

- if (inl == 0) {
- *outl = 0;
- return 1;
- }
+ /* Ignore just empty encryption/decryption call and not AAD. */
+ if (out != NULL) {
+ if (inl == 0) {
+ if (outl != NULL)
+ *outl = 0;
+ return 1;
+ }

- if (outsize < inl) {
- ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
- return 0;
+ if (outsize < inl) {
+ ERR_raise(ERR_LIB_PROV, PROV_R_OUTPUT_BUFFER_TOO_SMALL);
+ return 0;
+ }
}

if (ctx->hw->cipher(ctx, out, in, inl) <= 0)
3 changes: 3 additions & 0 deletions pkgs/development/libraries/openssl/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -251,6 +251,9 @@ in {
# This patch disables build-time detection.
./3.0/openssl-disable-kernel-detection.patch

# https://www.openssl.org/news/secadv/20230714.txt
./3.0/CVE-2023-2975.patch

(if stdenv.hostPlatform.isDarwin
then ./use-etc-ssl-certs-darwin.patch
else ./use-etc-ssl-certs.patch)
Expand Down
16 changes: 2 additions & 14 deletions pkgs/development/python-modules/aiohttp/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,6 @@
, stdenv
, buildPythonPackage
, fetchPypi
, fetchpatch
, pythonOlder
# build_requires
, setuptools
Expand Down Expand Up @@ -32,29 +31,18 @@

buildPythonPackage rec {
pname = "aiohttp";
version = "3.8.4";
version = "3.8.5";
format = "pyproject";

disabled = pythonOlder "3.6";

src = fetchPypi {
inherit pname version;
hash = "sha256-vy4akWLB5EG/gFof0WbiSdV0ygTgOzT5fikodp6Rq1w=";
hash = "sha256-uVUuxSzBR9vxlErHrJivdgLlHqLc0HbtGUyjwNHH0Lw=";
};

patches = [
(fetchpatch {
# https://github.com/aio-libs/aiohttp/pull/7178
url = "https://github.com/aio-libs/aiohttp/commit/5718879cdb6a98bf48810a994b78bc02abaf3e07.patch";
hash = "sha256-4UynkTZOzWzusQ2+MPZszhFA8I/PJNLeT/hHF/fASy8=";
})
];

postPatch = ''
sed -i '/--cov/d' setup.cfg

substituteInPlace setup.cfg \
--replace "charset-normalizer >=2.0, < 3.0" "charset-normalizer >=2.0, < 4.0"
'';

nativeBuildInputs = [
Expand Down
11 changes: 2 additions & 9 deletions pkgs/os-specific/linux/systemd/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -145,7 +145,7 @@ assert withUkify -> withEfi;
let
wantCurl = withRemote || withImportd;
wantGcrypt = withResolved || withImportd;
version = "253.5";
version = "253.6";

# Bump this variable on every (major) version change. See below (in the meson options list) for why.
# command:
Expand All @@ -162,7 +162,7 @@ stdenv.mkDerivation (finalAttrs: {
owner = "systemd";
repo = "systemd-stable";
rev = "v${version}";
hash = "sha256-B3A9AvpfZ8SYsiZvHnWO4RHs1/6EdczWF2NmrSqxQ7c=";
hash = "sha256-LZs6QuBe23W643bTuz+MD2pzHiapsBJBHoFXi/QjzG4=";
};

# On major changes, or when otherwise required, you *must* reformat the patches,
Expand Down Expand Up @@ -190,13 +190,6 @@ stdenv.mkDerivation (finalAttrs: {
./0017-core-don-t-taint-on-unmerged-usr.patch
./0018-tpm2_context_init-fix-driver-name-checking.patch
./0019-bootctl-also-print-efi-files-not-owned-by-systemd-in.patch

# https://github.com/systemd/systemd/pull/28000
(fetchpatch {
name = "fix-service-exit";
url = "https://github.com/systemd/systemd/commit/5f7f82ba625ee48d662c1f0286f44b8b0918d05d.patch";
sha256 = "sha256-pFRXpZjeVl5ZG/mOjHEuMg9zXq4Orwvdp+/LYTbR09I=";
})
] ++ lib.optional stdenv.hostPlatform.isMusl (
let
oe-core = fetchzip {
Expand Down
13 changes: 9 additions & 4 deletions pkgs/tools/archivers/gnutar/default.nix
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
{ lib, stdenv, fetchurl, autoreconfHook, acl }:
{ lib, stdenv, fetchurl, autoreconfHook, acl, libintl }:

# Note: this package is used for bootstrapping fetchurl, and thus
# cannot use fetchpatch! All mutable patches (generated by GitHub or
Expand All @@ -7,11 +7,11 @@

stdenv.mkDerivation rec {
pname = "gnutar";
version = "1.34";
version = "1.35";

src = fetchurl {
url = "mirror://gnu/tar/tar-${version}.tar.xz";
sha256 = "sha256-Y769JoecXh7qQ1Lw0DyZH5Zq6z3es8dEXJAlaNVBHSg=";
sha256 = "sha256-TWL/NzQux67XSFNTI5MMfPlKz3HDWRiCsmp+pQ8+3BY=";
};

# avoid retaining reference to CF during stdenv bootstrap
Expand All @@ -31,7 +31,12 @@ stdenv.mkDerivation rec {
outputs = [ "out" "info" ];

nativeBuildInputs = lib.optional stdenv.isDarwin autoreconfHook;
buildInputs = lib.optional stdenv.isLinux acl;
# Add libintl on Darwin specifically as it fails to link (or skip)
# NLS on it's own:
# "_libintl_textdomain", referenced from:
# _main in tar.o
# ld: symbol(s) not found for architecture x86_64
buildInputs = lib.optional stdenv.isLinux acl ++ lib.optional stdenv.isDarwin libintl;

# May have some issues with root compilation because the bootstrap tool
# cannot be used as a login shell for now.
Expand Down
34 changes: 34 additions & 0 deletions pkgs/tools/networking/curl/CVE-2023-32001.patch
Original file line number Diff line number Diff line change
@@ -0,0 +1,34 @@
From 0c667188e0c6cda615a036b8a2b4125f2c404dde Mon Sep 17 00:00:00 2001
From: SaltyMilk <soufiane.elmelcaoui@gmail.com>
Date: Mon, 10 Jul 2023 21:43:28 +0200
Subject: [PATCH] fopen: optimize

Closes #11419
---
lib/fopen.c | 12 ++++++------
1 file changed, 6 insertions(+), 6 deletions(-)

diff --git a/lib/fopen.c b/lib/fopen.c
index c9c9e3d6e73a2..b6e3cadddef65 100644
--- a/lib/fopen.c
+++ b/lib/fopen.c
@@ -56,13 +56,13 @@ CURLcode Curl_fopen(struct Curl_easy *data, const char *filename,
int fd = -1;
*tempname = NULL;

- if(stat(filename, &sb) == -1 || !S_ISREG(sb.st_mode)) {
- /* a non-regular file, fallback to direct fopen() */
- *fh = fopen(filename, FOPEN_WRITETEXT);
- if(*fh)
- return CURLE_OK;
+ *fh = fopen(filename, FOPEN_WRITETEXT);
+ if(!*fh)
goto fail;
- }
+ if(fstat(fileno(*fh), &sb) == -1 || !S_ISREG(sb.st_mode))
+ return CURLE_OK;
+ fclose(*fh);
+ *fh = NULL;

result = Curl_rand_hex(data, randsuffix, sizeof(randsuffix));
if(result)
3 changes: 3 additions & 0 deletions pkgs/tools/networking/curl/default.nix
Original file line number Diff line number Diff line change
Expand Up @@ -59,6 +59,9 @@ stdenv.mkDerivation (finalAttrs: {

patches = [
./7.79.1-darwin-no-systemconfiguration.patch

# Affected versions: 7.84.0 to and including 8.1.2
./CVE-2023-32001.patch
];

outputs = [ "bin" "dev" "out" "man" "devdoc" ];
Expand Down