Skip to content

Commit edb2626

Browse files
committed
Merge branch 'staging-25.11' into staging-next-25.11
2 parents 7619927 + fced9eb commit edb2626

27 files changed

Lines changed: 195 additions & 135 deletions

File tree

pkgs/applications/graphics/ImageMagick/default.nix

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ stdenv.mkDerivation (finalAttrs: {
173173
configDestination=($out/share/ImageMagick-*)
174174
grep -v '/nix/store' $dev/lib/ImageMagick-*/config-Q16HDRI/configure.xml > $configDestination/configure.xml
175175
for file in "$dev"/bin/*-config; do
176-
substituteInPlace "$file" --replace pkg-config \
176+
substituteInPlace "$file" --replace-fail "$PKG_CONFIG" \
177177
"PKG_CONFIG_PATH='$dev/lib/pkgconfig' '$(command -v $PKG_CONFIG)'"
178178
done
179179
''

pkgs/by-name/al/alsa-lib/package.nix

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
lib,
33
stdenv,
44
fetchurl,
5+
fetchpatch,
56
alsa-topology-conf,
67
alsa-ucm-conf,
78
testers,
@@ -23,6 +24,11 @@ stdenv.mkDerivation (finalAttrs: {
2324
# "libs" field to declare locations for both native and 32bit plugins, in
2425
# order to support apps with 32bit sound running on x86_64 architecture.
2526
./alsa-plugin-conf-multilib.patch
27+
(fetchpatch {
28+
name = "CVE-2026-25068.patch";
29+
url = "https://github.com/alsa-project/alsa-lib/commit/5f7fe33002d2d98d84f72e381ec2cccc0d5d3d40.patch";
30+
hash = "sha256-4memtcg+FDOctX6wgiCdmnlG+IUS+5rL1f3LcsWS5lw=";
31+
})
2632
];
2733

2834
enableParallelBuilding = true;

pkgs/by-name/cr/cryptsetup/package.nix

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525

2626
stdenv.mkDerivation (finalAttrs: {
2727
pname = "cryptsetup";
28-
version = "2.8.3";
28+
version = "2.8.4";
2929

3030
outputs = [
3131
"bin"
@@ -39,7 +39,7 @@ stdenv.mkDerivation (finalAttrs: {
3939
url =
4040
"mirror://kernel/linux/utils/cryptsetup/v${lib.versions.majorMinor finalAttrs.version}/"
4141
+ "cryptsetup-${finalAttrs.version}.tar.xz";
42-
hash = "sha256-SoojuLnRoyUEUuQKzq1EIaA+RaOJVK0FlWNPQmaqgA8=";
42+
hash = "sha256-RD5G+JZMmsx4D0Va+7jiOqDo7X7FBM/FngT0BvoeioM=";
4343
};
4444

4545
patches = [

pkgs/by-name/ex/expat/package.nix

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
# files.
1919

2020
let
21-
version = "2.7.3";
21+
version = "2.7.4";
2222
tag = "R_${lib.replaceStrings [ "." ] [ "_" ] version}";
2323
in
2424
stdenv.mkDerivation (finalAttrs: {
@@ -29,7 +29,7 @@ stdenv.mkDerivation (finalAttrs: {
2929
url =
3030
with finalAttrs;
3131
"https://github.com/libexpat/libexpat/releases/download/${tag}/${pname}-${version}.tar.xz";
32-
hash = "sha256-cd+PQHBqe7CoClNnB56nXZHaT4xlxY7Fm837997Nq58=";
32+
hash = "sha256-npyrtFfB4J3pHbJwbYNlZFeSY46zvh+U27IUkwEIasA=";
3333
};
3434

3535
strictDeps = true;

pkgs/by-name/li/libvpx/package.nix

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -131,13 +131,13 @@ assert isCygwin -> unitTestsSupport && webmIOSupport && libyuvSupport;
131131

132132
stdenv.mkDerivation rec {
133133
pname = "libvpx";
134-
version = "1.15.2";
134+
version = "1.16.0";
135135

136136
src = fetchFromGitHub {
137137
owner = "webmproject";
138138
repo = "libvpx";
139139
rev = "v${version}";
140-
hash = "sha256-1F5Zlue2DY1yJXwfDfGeh3KcFTQVo9voHcGkgItKgh0=";
140+
hash = "sha256-z1Ov3BHnAGuayeY4D86oTRiDfuZ2Wpc4ZD7pXGaakVI=";
141141
};
142142

143143
postPatch = ''

pkgs/by-name/lo/lowdown/package.nix

Lines changed: 14 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,14 @@
1111
enableDarwinSandbox ? true,
1212
# for passthru.tests
1313
nix,
14+
lowdown-unsandboxed,
1415
}:
1516

1617
stdenv.mkDerivation rec {
1718
pname = "lowdown${
1819
lib.optionalString (stdenv.hostPlatform.isDarwin && !enableDarwinSandbox) "-unsandboxed"
1920
}";
20-
version = "2.0.2";
21+
version = "2.0.4";
2122

2223
outputs = [
2324
"out"
@@ -28,7 +29,7 @@ stdenv.mkDerivation rec {
2829

2930
src = fetchurl {
3031
url = "https://kristaps.bsd.lv/lowdown/snapshots/lowdown-${version}.tar.gz";
31-
hash = "sha512-cfzhuF4EnGmLJf5EGSIbWqJItY3npbRSALm+GarZ7SMU7Hr1xw0gtBFMpOdi5PBar4TgtvbnG4oRPh+COINGlA==";
32+
sha512 = "649a508b7727df6e7e1203abb3853e05f167b64832fd5e1271f142ccf782e600b1de73c72dc02673d7b175effdc54f2c0f60318208a968af9f9763d09cf4f9ef";
3233
};
3334

3435
nativeBuildInputs = [
@@ -38,6 +39,12 @@ stdenv.mkDerivation rec {
3839
]
3940
++ lib.optionals stdenv.hostPlatform.isDarwin [ fixDarwinDylibNames ];
4041

42+
postPatch = ''
43+
# fails test, some column width mismatch
44+
rm regress/table-footnotes.md
45+
rm regress/table-styles.md
46+
'';
47+
4148
# The Darwin sandbox calls fail inside Nix builds, presumably due to
4249
# being nested inside another sandbox.
4350
preConfigure = lib.optionalString (stdenv.hostPlatform.isDarwin && !enableDarwinSandbox) ''
@@ -74,32 +81,8 @@ stdenv.mkDerivation rec {
7481
"install_static"
7582
];
7683

77-
postInstall =
78-
let
79-
soVersion = "2";
80-
in
81-
82-
# Check that soVersion is up to date even if we are not on darwin
83-
lib.optionalString (enableShared && !stdenv.hostPlatform.isDarwin) ''
84-
test -f $lib/lib/liblowdown.so.${soVersion} || \
85-
die "postInstall: expected $lib/lib/liblowdown.so.${soVersion} is missing"
86-
''
87-
# Fix lib extension so that fixDarwinDylibNames detects it, see
88-
# <https://github.com/kristapsdz/lowdown/issues/87#issuecomment-1532243650>.
89-
+ lib.optionalString (enableShared && stdenv.hostPlatform.isDarwin) ''
90-
darwinDylib="$lib/lib/liblowdown.${soVersion}.dylib"
91-
mv "$lib/lib/liblowdown.so.${soVersion}" "$darwinDylib"
92-
93-
# Make sure we are re-creating a symbolic link here
94-
test -L "$lib/lib/liblowdown.so" || \
95-
die "postInstall: expected $lib/lib/liblowdown.so to be a symlink"
96-
ln -s "$darwinDylib" "$lib/lib/liblowdown.dylib"
97-
rm "$lib/lib/liblowdown.so"
98-
'';
99-
100-
doInstallCheck = true;
101-
102-
installCheckPhase = lib.optionalString (!stdenv.hostPlatform.isDarwin || !enableDarwinSandbox) ''
84+
doInstallCheck = !stdenv.hostPlatform.isDarwin || !enableDarwinSandbox;
85+
installCheckPhase = ''
10386
runHook preInstallCheck
10487
10588
echo '# TEST' > test.md
@@ -108,12 +91,12 @@ stdenv.mkDerivation rec {
10891
runHook postInstallCheck
10992
'';
11093

111-
doCheck = true;
94+
doCheck = !stdenv.hostPlatform.isDarwin || !enableDarwinSandbox;
11295
checkTarget = "regress";
11396

11497
passthru.tests = {
115-
# most important consumer in nixpkgs
116-
inherit nix;
98+
# most important consumers in nixpkgs
99+
inherit nix lowdown-unsandboxed;
117100
};
118101

119102
meta = {

pkgs/by-name/mi/mimir/package.nix

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@
77
}:
88
buildGoModule (finalAttrs: {
99
pname = "mimir";
10-
version = "3.0.1";
10+
version = "3.0.3";
1111

1212
src = fetchFromGitHub {
1313
rev = "mimir-${finalAttrs.version}";
1414
owner = "grafana";
1515
repo = "mimir";
16-
hash = "sha256-tYGzU/sn6KLLetDmAyph5u8bCocmfF4ZysTkOCSVf+U=";
16+
hash = "sha256-OUFmtHGGDU1+7EwfGVzrjPS2hqba0FfIuQl0V7up9Yk=";
1717
};
1818

1919
vendorHash = null;

pkgs/by-name/mo/modemmanager/package.nix

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,14 +32,14 @@
3232

3333
stdenv.mkDerivation rec {
3434
pname = "modemmanager";
35-
version = "1.24.0";
35+
version = "1.24.2";
3636

3737
src = fetchFromGitLab {
3838
domain = "gitlab.freedesktop.org";
3939
owner = "mobile-broadband";
4040
repo = "ModemManager";
4141
rev = version;
42-
hash = "sha256-3jI75aR2esmv5dkE4TrdCHIcCvtdOBKnBC5XLEKoVFs=";
42+
hash = "sha256-rBLOqpx7Y2BB6/xvhIw+rDEXsLtePhHLBvfpSuJzQik=";
4343
};
4444

4545
patches = [

pkgs/by-name/pu/publicsuffix-list/package.nix

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@
77

88
stdenvNoCC.mkDerivation {
99
pname = "publicsuffix-list";
10-
version = "0-unstable-2025-12-28";
10+
version = "0-unstable-2026-01-25";
1111

1212
src = fetchFromGitHub {
1313
owner = "publicsuffix";
1414
repo = "list";
15-
rev = "1ef6d3bc102c85d12e92be54ec0dad8ee990dd5f";
16-
hash = "sha256-rQdum6XLgfXwzpKTneakFmC80tOmlPFrZ8C7dfEnlSo=";
15+
rev = "6c40921fc61160568b101aff506d548ba3300ba6";
16+
hash = "sha256-BOSau54FwCHNLordlN0+I708acXSogjnfKINpfMeYcc=";
1717
};
1818

1919
dontBuild = true;
Lines changed: 47 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,47 @@
1+
From 731d698377dbd1f5b1b90efeb8094602ed59fc40 Mon Sep 17 00:00:00 2001
2+
From: Nils Bars <nils.bars@t-online.de>
3+
Date: Mon, 17 Jan 2022 16:53:16 +0000
4+
Subject: [PATCH] Fix null pointer dereference and use of uninitialized data
5+
6+
This fixes a bug that causes use of uninitialized heap data if `readbuf` fails
7+
to read as many bytes as indicated by the extra field length attribute.
8+
Furthermore, this fixes a null pointer dereference if an archive contains an
9+
`EF_UNIPATH` extra field but does not have a filename set.
10+
---
11+
fileio.c | 5 ++++-
12+
process.c | 6 +++++-
13+
2 files changed, 9 insertions(+), 2 deletions(-)
14+
15+
--- a/fileio.c
16+
+++ b/fileio.c
17+
@@ -2310,8 +2310,11 @@ int do_string(__G__ length, option) /*
18+
seek_zipf(__G__ G.cur_zipfile_bufstart - G.extra_bytes +
19+
(G.inptr-G.inbuf) + length);
20+
} else {
21+
- if (readbuf(__G__ (char *)G.extra_field, length) == 0)
22+
+ unsigned bytes_read = readbuf(__G__ (char *)G.extra_field, length);
23+
+ if (bytes_read == 0)
24+
return PK_EOF;
25+
+ if (bytes_read != length)
26+
+ return PK_ERR;
27+
/* Looks like here is where extra fields are read */
28+
if (getZip64Data(__G__ G.extra_field, length) != PK_COOL)
29+
{
30+
--- a/process.c
31+
+++ b/process.c
32+
@@ -2067,10 +2067,14 @@ int getUnicodeData(__G__ ef_buf, ef_len)
33+
G.unipath_checksum = makelong(offset + ef_buf);
34+
offset += 4;
35+
36+
+ if (!G.filename_full) {
37+
+ /* Check if we have a unicode extra section but no filename set */
38+
+ return PK_ERR;
39+
+ }
40+
+
41+
/*
42+
* Compute 32-bit crc
43+
*/
44+
-
45+
chksum = crc32(chksum, (uch *)(G.filename_full),
46+
strlen(G.filename_full));
47+

0 commit comments

Comments
 (0)