-
-
Notifications
You must be signed in to change notification settings - Fork 14.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerability Roundup 7 #20078
Comments
cc @FRidh, @fpletz, @NeQuissimus, @vcunat who participated last time. Also:
PS: I'm unusually busy this morning, and won't be able to participate as much as normal. I'll have some time here and there. Feel free to conscript your friends to help finish this out ;) |
The |
@rycee Thank you for the patches and what-not! When you push a commit to a branch, can you add a comment on this issue with the package, and the sha that you fixed it in? that'll help me do the summary at the end. |
@grahamc Sorry, I missed that. I'll make sure to include the commit hashes in the future. |
Django (not yet on LWN): 6ad14d4, 58ad105, b806e14 https://www.djangoproject.com/weblog/2016/nov/01/security-releases/ We should remove Django 1.5 and 1.6 as they're not maintained upstream anymore. One of the users of Django 1.6 in nixpks, reviewboard, is maintaining a version with security patches, maybe switch to this: https://www.reviewboard.org/news/2016/11/01/new-django-1-6-11-5-security-releases/ I'm currently investigating and will open a PR shortly if all goes well. |
I just took a quick look at |
|
@NeQuissimus: tar may pose problems due to being involved in bootstrapping. |
@vcunat This is how far I got:
|
Patches from Debian and upstream git repo. Fixes: * CVE-2016-6836 * CVE-2016-7155 * CVE-2016-7156 * CVE-2016-7157 * CVE-2016-7421 * CVE-2016-7422 * CVE-2016-7423 * CVE-2016-7466 * CVE-2016-8909 * CVE-2016-8910 * CVE-2016-9102 * CVE-2016-9103 * CVE-2016-9104 * CVE-2016-9105 * CVE-2016-9106 cc #20078
Patches from Debian and upstream git repo. Fixes: * CVE-2016-6836 * CVE-2016-7155 * CVE-2016-7156 * CVE-2016-7157 * CVE-2016-7421 * CVE-2016-7422 * CVE-2016-7423 * CVE-2016-7466 * CVE-2016-8909 * CVE-2016-8910 * CVE-2016-9102 * CVE-2016-9103 * CVE-2016-9104 * CVE-2016-9105 * CVE-2016-9106 cc #20078 (cherry picked from commit 25c0193)
Fixes CVE-2016-8682, CVE-2016-8683, CVE-2016-8684. cc #20078 (cherry picked from commit 04db88d)
Fixes: - CVE-2016-8704 - CVE-2016-8705 - CVE-2016-8706 Closes #20079. cc #20078
Fixes: - CVE-2016-8704 - CVE-2016-8705 - CVE-2016-8706 Closes #20079. cc #20078 (cherry picked from commit a94bd88)
@vcunat can you help me out with fixing the tar issue? I'd love to understand how that process works. |
BTW thank you everyone for help with this roundup. I've had an incredibly busy week, and regret not being more involved. I'll do a summary on this one shortly. |
I'm closing out this issue for now, but it is important to note hydra hasn't passed in some time: https://hydra.nixos.org/build/43025591 can someone diagnose this issue and try and get a fix in? Also, we really need to get this tar issue fixed. @vcunat If not you, who could show me the process here? |
@grahamc What's the issue with tar? I can help. |
Thank you for the nss patch, @shlevy! Regarding tar, it is mishandling |
Testing a fix |
Will link to jobsets shortly... |
Well, I wanted to link to evals but the loop is taking too long ( @edolstra @rbvermaa everyting good with hydra?) http://hydra.nixos.org/jobset/nixos/staging http://hydra.nixos.org/jobset/nixos/staging-16.09 I'll check back in the morning. |
It does compilation during eval! http://hydra.nixos.org/jobset/nixos/staging#tabs-errors |
Using git would complicate the bootstrapping process and make it longer, so it's nicer to avoid that like shlevy did. |
I can post a few lines about (linux stdenv) bootstrapping here/somewhere, if you're still interested. |
Yes please! |
The build-during-eval is due to the cjdns test... |
cc NixOS#20078 (cherry picked from commit 2b2f273)
Patches from Debian and upstream git repo. Fixes: * CVE-2016-6836 * CVE-2016-7155 * CVE-2016-7156 * CVE-2016-7157 * CVE-2016-7421 * CVE-2016-7422 * CVE-2016-7423 * CVE-2016-7466 * CVE-2016-8909 * CVE-2016-8910 * CVE-2016-9102 * CVE-2016-9103 * CVE-2016-9104 * CVE-2016-9105 * CVE-2016-9106 cc NixOS#20078 (cherry picked from commit 25c0193)
Fixes CVE-2016-8682, CVE-2016-8683, CVE-2016-8684. cc NixOS#20078 (cherry picked from commit 04db88d)
cc NixOS#20078 (cherry picked from commit 64902ae)
Fixes: - CVE-2016-8704 - CVE-2016-8705 - CVE-2016-8706 Closes NixOS#20079. cc NixOS#20078 (cherry picked from commit a94bd88)
Here are all the vulnerabilities from https://lwn.net/Vulnerabilities
since our last hunt.
Notes on the list
isn't perfect, but is intended to help identify if a whole group
of reports is resolved already.
For example, there are sometimes problems that impact thunderbird,
and firefox. LWN might report in one vulnerability "thunderbird
firefox". These names have been split to make sure both packages get
addressed.
a Github search by filename. These are to help, but may not return
results when we do in fact package the software. If a search
doesn't turn up, please try altering the search criteria or
looking in nixpkgs manually before asserting we don't have it.
Instructions:
vulnerable, tick the box or add a comment with the report number,
stating it isn't vulnerable.
either leave a comment on this issue saying so, even open a pull
request with the fix. If you open a PR, make sure to tag this
issue so we can coordinate.
"Triaged and Resolved Issues"
details
block below.Upon Completion ...
summary.
Without further ado...
Assorted (21 issues)
#705119
(search, files) cairo: denial of service#704699
(search, files) nspr, nss: information disclosure#705125
(search, files) imagemagick: multiple vulnerabilities#705216
(search, files) tar: file overwrite#705214
(search, files) memcached: code execution#704699
(search, files) nspr, nss: information disclosure#704698
(search, files) nginx: privilege escalation#704922
(search, files) nodejs-tough-cookie: denial of service#705213
(search, files) libxml2: code execution#703767
(search, files) chromium-browser: multiple vulnerabilities#704924
(search, files) tre: code execution#704712
(search, files) mozilla: two vulnerabilities#704702
(search, files) perl-Image-Info: information disclosure#705124
(search, files) chromium: denial of service#704834
(search, files) openstack-manila-ui: cross-site scripting#705120
(search, files) qemu-kvm: multiple vulnerabilities#668545
(search, files) libpng: read underflow#620056
(search, files) sssd: restriction bypass#704701
(search, files) qemu: three vulnerabilities#704697
(search, files) asterisk: two vulnerabilities#704712
(search, files) mozilla: two vulnerabilitiesgraphicsmagick (3 issues)
#704703
(search, files) graphicsmagick: three vulnerabilities#704711
(search, files) graphicsmagick: multiple vulnerabilities#704704
(search, files) graphicsmagick: multiple vulnerabilitieskernel (2 issues)
#704737
(search, files) kernel: local privilege escalation (Dirty COW)#704714
(search, files) kernel: three vulnerabilitiesmariadb (2 issues)
#705212
(search, files) mysql: unspecified vulnerability#705211
(search, files) mariadb: multiple unspecified vulnerabilitiesmysql (2 issues)
#705212
(search, files) mysql: unspecified vulnerability#705211
(search, files) mariadb: multiple unspecified vulnerabilitiespotrace (2 issues)
#704700
(search, files) potrace: multiple vulnerabilities#639578
(search, files) potrace: denial of serviceThe text was updated successfully, but these errors were encountered: