Branch: refs/heads/staging
  Home:   https://github.com/NixOS/nixpkgs
  Commit: 1708c369facc6809fb24abf01289145d7ad3b5c4
      
https://github.com/NixOS/nixpkgs/commit/1708c369facc6809fb24abf01289145d7ad3b5c4
  Author: Lancelot SIX <[email protected]>
  Date:   2016-09-11 (Sun, 11 Sep 2016)

  Changed paths:
    R pkgs/development/tools/misc/texinfo/6.1.nix
    A pkgs/development/tools/misc/texinfo/6.3.nix
    M pkgs/top-level/all-packages.nix

  Log Message:
  -----------
  texinfo: 6.1 -> 6.3

See http://lists.gnu.org/archive/html/info-gnu/2016-09/msg00004.html
for release anouncement


  Commit: 3ba99f83a7acd8644880b62aea5e3b31e1f1b57a
      
https://github.com/NixOS/nixpkgs/commit/3ba99f83a7acd8644880b62aea5e3b31e1f1b57a
  Author: Franz Pletz <[email protected]>
  Date:   2016-09-12 (Mon, 12 Sep 2016)

  Changed paths:
    M pkgs/development/libraries/glibc/common.nix
    M pkgs/development/libraries/glibc/default.nix

  Log Message:
  -----------
  glibc: enable stackprotection hardening

Enables previously manually disabled stackprotector and stackguard
randomization.

>From https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511811:

    If glibc is built with the --enable-stackguard-randomization option,
    each application gets a random canary value (at runtime) from /dev/urandom.
    If --enable-stackguard-randomization is absent, applications get a static
    canary value of "0xff0a0000". This is very unfortunate, because the
    attacker may be able to bypass the stack protection mechanism, by placing
    those 4 bytes in the canary word, before the actual canary check is
    performed (for example in memcpy-based buffer overflows).


  Commit: f07102891146852585dd0c8c00df0d3a19acdff3
      
https://github.com/NixOS/nixpkgs/commit/f07102891146852585dd0c8c00df0d3a19acdff3
  Author: Vladimír Čunát <[email protected]>
  Date:   2016-09-12 (Mon, 12 Sep 2016)

  Changed paths:
    M pkgs/development/libraries/glibc/common.nix
    M pkgs/development/libraries/glibc/default.nix

  Log Message:
  -----------
  Merge #18522: glibc: enable stackprotection hardening


  Commit: 8869ae47f81021ce6e07ad14c1f28d1055031443
      
https://github.com/NixOS/nixpkgs/commit/8869ae47f81021ce6e07ad14c1f28d1055031443
  Author: Vladimír Čunát <[email protected]>
  Date:   2016-09-12 (Mon, 12 Sep 2016)

  Changed paths:
    R pkgs/development/tools/misc/texinfo/6.1.nix
    A pkgs/development/tools/misc/texinfo/6.3.nix
    M pkgs/top-level/all-packages.nix

  Log Message:
  -----------
  Merge #18509: texinfo: 6.1 -> 6.3


Compare: https://github.com/NixOS/nixpkgs/compare/e6ea302c47c5...8869ae47f810
_______________________________________________
nix-commits mailing list
[email protected]
http://lists.science.uu.nl/mailman/listinfo/nix-commits

Reply via email to