-
-
Notifications
You must be signed in to change notification settings - Fork 15k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerability Roundup 14 #21289
Comments
A fix for #709669 was included in 4.8.14 |
Commit 86cf682 fixes |
libupnp is actually pupnp and can be found here: http://pupnp.sourceforge.net/ where it says 1.6.21 is out, but the downloads are all for 1.6.20. If anyone wants to investigate that, please! |
|
Looks like Xen needs more patches. Also, our Xen is running out of time. @michalpalka -- you seem to open issues about Xen, would you like to try upgrading Xen? |
@grahamc My schedule is full for the next 2 days, but will look at it on Friday |
That will be really helpful. Thank you so much, @michalpalka! |
We should quite likely drop samba3. |
@abbradar, @wkennington any ideas on what is wrong with samba here? |
@grahamc I've tried to update libkrb5 and Cyrus-SASL -- no luck so far. I'll spend more time on this later since this is a security issue but have no idea what happens. I left Samba 4.5.3 to build in the background but this is not an option for the release, isn't it?... |
Thank you for looking, @abbradar. Unfortunately backporting an update to 4.5.x wouldn't be good. I definitely wouldn't mind seeing unstable updated though, especially before 17.03 goes stable ( @michalpalka -- that is when I'd like Xen to be upgraded at the latest, hopefully) |
Samba, libkrb5 and Cyrus-SASL updates are in staging, because Cyrus-SASL is a systemd dependency. We now need to determine how to build new 4.4.* -- I'm on it but with no ideas currently. |
I did some investigation on libupnp. There is a 1.6.21 tag available but no tarball. |
@abbradar can you link each of those commits here to make it easier to keep track / ensure they get backported? |
b0a1028 covers Samba in staging. Others don't have a security issue assigned IIUC. I want to avoid having it backported as is now -- instead I'll try to have a maintenance release building. |
16.09 is covered by b2e80a5 |
This might work for libupnp #21317. |
Just updated the list with more vulnerabilities. |
I suspect we need to apply patches to xen, see: https://xenbits.xen.org/xsa/advisory-200.html and: an enterprising contributor may go back through old advisories and see if we missed anything :) |
We don't run debian's version of most, so we don't need patches. |
I just push my roundup branch which contains fixes for everything but the html5lib, will merge shortly. |
Switching to git tags means we don't get pre-generated configure scripts. Thusly, run bootstrap ourselves. For NixOS#21289 For CVE-2016-8863 (remote code execution)
Switching to git tags means we don't get pre-generated configure scripts. Thusly, run bootstrap ourselves. For #21289 For CVE-2016-8863 (remote code execution) (cherry picked from commit 0d3f0f0)
Merged and backported the branch. Just updated this issue with new vulnerabilities. :) (this issue is like the gift that keeps giving!) |
@the-kenny can you update flightgear? |
Just pushed patches for zlib to staging, will push to 16.09 shortly. |
@wkennington can you patch ceph? We're pretty old, I might mark it as broken otherwise. |
@grahamc The libupnp tarball would be available now: https://sourceforge.net/projects/pupnp/files/ |
Thank you, @bachp I already switched to their github mirror since it already had a good tag. |
Graham Christensen <notifications@github.com> writes:
@the-kenny can you update flightgear?
will do!
|
Sorry, I couldn't get around to finishing the html5lib update, got busy with work-related issues. |
Sorry it took so long. Holidays. Just pushed
bdc880e to master.
I'm not sure if this should be backported to our current stable release
as we skipped quite a few major releases. Any other comments on this?
Cheers
Moritz
Moritz Ulrich <moritz@tarn-vedra.de> writes:
… Graham Christensen ***@***.***> writes:
> @the-kenny can you update flightgear?
will do!
--
|
@the-kenny does neither not look like a critical network-facing service to me nor a serious security issue (I would not expect that malicious Nasal scripts are sent as email attachments any time soon). On the other hand it does not look the typical application, where people would expect the version to be stable all the time. I think both approaches (upgrading or not upgrading) are fine. |
fixes LWN vuln:709146 ref #21289: Vulnerability roundup 14
The PR from f3287b0 needs to be backported. |
@grahamc the new html5lib has quite some extra dependencies. I'll have a look at it. |
It's frustrating when breakage happens, but I do appreciate the work you and everyone else put into keeping NixOS updated and secure :-) |
We now have the latest html5lib in stable as well. |
It seems like openssh has fallen through the cracks. I didn't manage to fully fix it (yet) 661b5a9. |
@vcunat openssh hasn't fallen through the cracks, it hadn't been released yet when this was created. I just checked, it'll appear on next week's. |
Oh, now I see the tarball timestamp is Dec.19; I originally misread it as ~week earlier. |
I'm going to close out what we have and let the remainders come back next run. |
Good work, everyone - thank you all! |
Switching to git tags means we don't get pre-generated configure scripts. Thusly, run bootstrap ourselves. For NixOS#21289 For CVE-2016-8863 (remote code execution) (cherry picked from commit 0d3f0f0)
fixes LWN vuln:709146 ref NixOS#21289: Vulnerability roundup 14 (cherry picked from commit a737eff)
Here are all the vulnerabilities from https://lwn.net/Vulnerabilities
since our last roundup
This roundup is different from previous' due to Christmas: http://lists.science.uu.nl/pipermail/nix-dev/2016-December/022367.html
I will update this issue tomorrow and Wednesday with new issues.
cc: @NeQuissimus @bachp @domenkozar @makefu.
Note: The list of people CC'd on this issue participated in the last
roundup. If you participate on this roundup, I'll cc you on the next
one. If you don't participate in the next one, you won't be CC'd on
the one after that. If you would like to be CC'd on the next roundup,
add a comment to the most recent vulnerability roundup.
If you would like to be CC'd on all roundups, leave a comment and
tell @grahamc so.
Permanent CC's: @joepie91, @phanimahesh, @NixOS/security-notifications
(if you no longer want to be CC'd, ask to be removed from this list)
Notes on the list
isn't perfect, but is intended to help identify if a whole group
of reports is resolved already.
packages. For example, there are sometimes problems that impact
thunderbird, and firefox. LWN might report in one vulnerability
"thunderbird firefox". These names have been split to make sure
both packages get addressed.
a Github search by filename. These are to help, but may not return
results when we do in fact package the software. If a search
doesn't turn up, please try altering the search criteria or
looking in nixpkgs manually before asserting we don't have it.
Instructions:
vulnerable, tick the box or add a comment with the report number,
stating it isn't vulnerable.
either leave a comment on this issue saying so, even open a pull
request with the fix. If you open a PR, make sure to tag this
issue so we can coordinate.
"Triaged and Resolved Issues"
details
block below.Upon Completion ...
reformat
one last timeWithout further ado...
Assorted (18 issues)
#709844
(search, files) ceph: denial of service#709839
(search, files) gstreamer-plugins-good: denial of service#709841
(search, files) flightgear: file overwrites#709146
(search, files) python-html5lib: cross-site scripting#709843
(search, files) dcmtk: buffer overflows/underflows#709842
(search, files) python-bottle: CRLF attacks#709847
(search, files) zlib: multiple vulnerabilities#709745
(search, files) openjpeg2: two vulnerabilities#709743
(search, files) freeipa: two vulnerabilities#709664
(search, files) most: command execution#709666
(search, files) nagios: two vulnerabilities#709742
(search, files) tor: denial of service#709363
(search, files) apport: three vulnerabilities#709149
(search, files) apt: code execution#709669
(search, files) kernel: out of bounds stack read#709466
(search, files) libupnp: code execution#709661
(search, files) samba: three vulnerabilities#709162
(search, files) w3m: multiple vulnerabilitiesfirefox (3 issues)
#709468
(search, files) firefox: denial of service#709140
(search, files) mozilla: multiple vulnerabilities#709141
(search, files) mozilla: multiple vulnerabilitiesgame-music-emu (2 issues)
#709663
(search, files) game-music-emu: multiple vulnerabilities#709341
(search, files) game-music-emu: code executionkernel (2 issues)
#709853
(search, files) kernel: code execution#709851
(search, files) kernel: two vulnerabilitiestomcat (2 issues)
#709662
(search, files) tomcat: two vulnerabilities#709342
(search, files) tomcat: denial of servicexen (2 issues)
#709746
(search, files) xen: information leak#709670
(search, files) xen: multiple vulnerabilitiesThe text was updated successfully, but these errors were encountered: