Here are all the vulnerabilities from https://lwn.net/Vulnerabilities
since our last hunt
cc: @FRidh, @fpletz, @rasendubi, @NeQuissimus, @joepie91, and @NixOS/security-notifications.
_Note:_ The list of people CC'd on this issue participated in the last
hunt. If you participate on this hunt, I'll cc you on the next one. If
you don't participate in the next one, you won't be CC'd on the one
after that. If you would like to be CC'd on the next hunt. If you
would like to be CC'd on the next hunt, add a comment to the most
recent vulnerability roundup. If you would like to be CC'd on _all_
hunts, leave a comment and tell @grahamc so.
details block below.Without further ado...
#669529](https://lwn.net/Vulnerabilities/669529/) (search, files) libvirt: path traversal#706399](https://lwn.net/Vulnerabilities/706399/) (search, files) monit: cross-site request forgery#706117](https://lwn.net/Vulnerabilities/706117/) (search, files) qemu: multiple vulnerabilities#706117](https://lwn.net/Vulnerabilities/706117/) (search, files) qemu: multiple vulnerabilities#706114](https://lwn.net/Vulnerabilities/706114/) (search, files) dracut: information disclosure#658311](https://lwn.net/Vulnerabilities/658311/) (search, files) shutter: code execution#706397](https://lwn.net/Vulnerabilities/706397/) (search, files) terminology: command execution#619813](https://lwn.net/Vulnerabilities/619813/) (search, files) tnftp: command execution#706479](https://lwn.net/Vulnerabilities/706479/) (search, files) tre: code execution#569768](https://lwn.net/Vulnerabilities/569768/) (search, files) xinetd: privilege escalation/code execution#706473](https://lwn.net/Vulnerabilities/706473/) (search, files) chromium-browser: multiple vulnerabilities#706116](https://lwn.net/Vulnerabilities/706116/) (search, files) kernel: two vulnerabilities#706478](https://lwn.net/Vulnerabilities/706478/) (search, files) libgit2: unspecified#706021](https://lwn.net/Vulnerabilities/706021/) (search, files) mariadb: unspecified vulnerability#706021](https://lwn.net/Vulnerabilities/706021/) (search, files) mariadb: unspecified vulnerability#706401](https://lwn.net/Vulnerabilities/706401/) (search, files) mysql-community-server: multiple unspecified vulnerabilities#706402](https://lwn.net/Vulnerabilities/706402/) (search, files) opera: multiple vulnerabilties#706400](https://lwn.net/Vulnerabilities/706400/) (search, files) python-cryptography: returns empty byte-string#706475](https://lwn.net/Vulnerabilities/706475/) (search, files) rh-mysql56-mysql: privilege escalation#705673](https://lwn.net/Vulnerabilities/705673/) (search, files) jasper: multiple vulnerabilities#705824](https://lwn.net/Vulnerabilities/705824/) (search, files) jasper: multiple vulnerabilities#656982](https://lwn.net/Vulnerabilities/656982/) (search, files) ntp: multiple vulnerabilities#661765](https://lwn.net/Vulnerabilities/661765/) (search, files) ntp: multiple vulnerabilities#673451](https://lwn.net/Vulnerabilities/673451/) (search, files) ntp: missing check for zero originate timestamp#674069](https://lwn.net/Vulnerabilities/674069/) (search, files) ntp: multiple vulnerabilitiesWe have pillow 3.4.2 on master and stable so
705913 (search, files) python-imaging: two vulnerabilities
is irrelevant.
77cdbb9e3af9fcdd6edafa74695f6b00bdd89748 and ca250267989c68bead978615809c1cf9d05d00e5 fix
#706400 (search, files) python-cryptography: returns empty byte-string
Fixed jasper in https://github.com/NixOS/nixpkgs/pull/20466
Curl seems to been fixed already.
kmicu pointed out I failed to exclude vulnerability roundup 8's list, fixing... please hold.
@grahamc Hereby requesting a CC for the next roundup and every one after that :)
Fixed the list, the things which had been checked off (due to already being fixed) have been removed from this list. Resume :)
Sudo was addressed already.
With the latest kernels, we have those vulnerabilities covered.
qemu has a 2.8.0-rc0, which fixed the vulns, do we want an RC?
mariadb needs updates for
Fixes for the following security vulnerabilities:
CVE-2016-7440
CVE-2016-5584
https://mariadb.com/kb/en/mariadb/mariadb-10119-release-notes/
done xD
I marked off rh-mysql56-mysql because we don't have 5.6
qemu has a 2.8.0-rc0, which fixed the vulns, do we want an RC?
Probably not, especially since it is -> .8. Is there a patch other distros are shipping?
We are good for ntp.
For qemu, I am not sure, I just went and checked their website.
Chromium is fine, we have the version that fixed the vuln.
Patch for xinetd incoming. in my rollup
Shutter patch in my rollup
@rickynils do we need to be upgrading our libvirt to cover this issue? https://lwn.net/Vulnerabilities/669529/
@fpletz can you take a look at the qemu vulns? there is a big list of CVEs now.
@Mic92 how do you want to handle this monit issue? backport the patch, or backport an upgrade to monit?
@grahamc We have libvirt 2.2.0 both in master and release-16.09 and it includes the fix for CVE-2015-5313 (https://github.com/libvirt/libvirt/commit/034e47c338b13a95cf02106a3af912c1c5f818d7), so we should be fine.
Thank you for checking in to that, @rickynils -- it wasn't so clear to me. Checked it as done!
For qemu, only CVE-2016-7994 & CVE-2016-8668 had to be fixed.
Done in f4a318b528cacdd5c960bf66662131ecbdb2536f. Testing build on 16.09 right now and will push when finished.
@fpletz can you comment and CC me when you've backported the qemu fix? I have an advisory ready to post when you do. Thank you!
Requesting a cc on next hunt
@grahamc Went to sleep too soon. :) Pushed to release-16.09.
All done, thank you all! :) :) :)