Here are all the vulnerabilities from https://lwn.net/Vulnerabilities
since our last hunt.
By each issue is a link to code search for the package name, and
a Github search by filename. These are to help, but may not return
results when we do in fact package the software. If a search
doesn't turn up, please try altering the search criteria or
looking in nixpkgs manually before asserting we don't have it.
Triage a report: If we don't have the software or our version isn't
vulnerable, tick the box or add a comment with the report number,
stating it isn't vulnerable.
details
block below.Without further ado...
#703983
](https://lwn.net/Vulnerabilities/703983/) (search, files) epiphany: unspecified#704470
](https://lwn.net/Vulnerabilities/704470/) (search, files) libX11: insufficient validation#704249
](https://lwn.net/Vulnerabilities/704249/) (search, files) openslp: code execution#703983
](https://lwn.net/Vulnerabilities/703983/) (search, files) epiphany: unspecified#703767
](https://lwn.net/Vulnerabilities/703767/) (search, files) chromium-browser: multiple vulnerabilities#703987
](https://lwn.net/Vulnerabilities/703987/) (search, files) asterisk: denial of service[x] [#703975
](https://lwn.net/Vulnerabilities/703975/) (search, files) java-1.8.0-openjdk: multiple vulnerabilities
[x] [#704120
](https://lwn.net/Vulnerabilities/704120/) (search, files) kernel: multiple vulnerabilities
#704469
](https://lwn.net/Vulnerabilities/704469/) (search, files) kernel: denial of serviceTriaged and Resolved Issues
#704466
](https://lwn.net/Vulnerabilities/704466/) (search, files) php: multiple vulnerabilities#704467
](https://lwn.net/Vulnerabilities/704467/) (search, files) php-pecl-zip: multiple vulnerabilities#704248
](https://lwn.net/Vulnerabilities/704248/) (search, files) bind: denial of service#704589
](https://lwn.net/Vulnerabilities/704589/) (search, files) mysql: multiple unspecified vulnerabilities#703978
](https://lwn.net/Vulnerabilities/703978/) (search, files) dwarfutils: three vulnerabilities#704586
](https://lwn.net/Vulnerabilities/704586/) (search, files) virtualbox: multiple unspecified vulnerabilities#704468
](https://lwn.net/Vulnerabilities/704468/) (search, files) kdump: denial of service#703977
](https://lwn.net/Vulnerabilities/703977/) (search, files) tor: denial of service#703979
](https://lwn.net/Vulnerabilities/703979/) (search, files) libgd2: two vulnerabilities[x] [#703984
](https://lwn.net/Vulnerabilities/703984/) (search, files) libgit2: two vulnerabilities
[x] [#704471
](https://lwn.net/Vulnerabilities/704471/) (search, files) qemu: denial of service
#703985
](https://lwn.net/Vulnerabilities/703985/) (search, files) qemu: three vulnerabilities5456d8f00729a5591d66208bd175cee24bd6fb59 0f42ee7c8893cf62d9a15402ad32f58d5c381e1b were ported in 732930b and bd2568a (php upgrades) to 16.09
cc people who participated in the last one: @DamienCassou @NeQuissimus @aszlig @jgeerds.
Firefox updates by @edolstra (thank you for backporting) https://github.com/NixOS/nixpkgs/compare/bd2568a2f927...0195ab84607a
I'll take care of the kernel notifications. We need to update 4.1.x
Thank you :) Looks like 4.9 is out of date (rc2?) -- could you also look to see if the other kernels are seriously out of date, and just make a note here?
I think qemu is covered by what we have.
The OpenJDK one is definitely covered, I updated that yesterday
I was just dreading that update :)
I just collapsed the done items to make the rest easier to find.
Whoa, I didn't actually expect updates on all the kernels! :100: :trophy:
Might as well :D
I let each of them go beyond the asking for modules, which is generally where they fail if anything is wrong. I don't have the time to build 5 full kernels right now :D
I'll do a merge and build them all on my build box today.
It would take me a while:
â–¶ cat /proc/cpuinfo | grep 'model name' | head -1
model name : Intel(R) Core(TM) m3-6Y30 CPU @ 0.90GHz
You have the same epiphany notice twice and I would think it is not covered. But it seems to be part of GNOME 3.20/3.22 and I know there are a few PRs for that right now. Not sure if we'd break something... The epiphany files are auto-generated. (currently 3.20.3, needs 3.20.4)
I usually ping @DamienCassou about Gnome issues (is @DamienCassou the one for that? :))
And I can't find libX11 in nixpkgs. I am not very familiar with X, so it might be in some other file but I am not sure where to look.
Not sure who to ping on X11. I bet @vcunat knows?
https://github.com/NixOS/nixpkgs/commit/9db03c1cf18e215ca9559e8f8a629dc6b1ad5385 should probably be backported.
That X advisory was fixed weeks ago in 53612bb0f. EDIT: it seems to me that SUSE guys were just rather late in this case.
For future reference, I do seem to be the most active in updating basic X packages, and I do watch their announcement ML.
@NeQuissimus re epiphany being listed twice, the second search is for webkitgtk.
OK FWIW everything in the list (except Chromium) has a PR in for it. I'm running builds for the remaining PRs now and will hopefully have most of them done by morning, where we'll merge. OpenJDK hasn't been backported because the patch doesn't apply cleanly. I'm hoping Tim will check that out.
Thank you everyone, for your great help! #6 is done :)
Most helpful comment
For future reference, I do seem to be the most active in updating basic X packages, and I do watch their announcement ML.