Here are all the vulnerabilities from https://lwn.net/Vulnerabilities
since our last roundup.
cc: @fpletz @FRidh @Mic92 @7c6f434c @LnL7 @bachp .
_Note:_ The list of people CC'd on this issue participated in the last
roundup. If you participate on this roundup, I'll cc you on the next
one. If you don't participate in the next one, you won't be CC'd on
the one after that. If you would like to be CC'd on the next roundup,
add a comment to the most recent vulnerability roundup.
Permanent CC's: @joepie91, @phanimahesh, @the-kenny,
@NixOS/security-notifications
If you would like to be CC'd on _all_ roundups (or removed from the
list), open a PR editing
https://github.com/NixOS/security/blob/master/lwnvulns/src/bin/instructions.md.
details block below.reformat one last timeWithout further ado...
#711581](https://lwn.net/Vulnerabilities/711581/) (search, files) ark: code execution#711782](https://lwn.net/Vulnerabilities/711782/) (search, files) qemu: multiple vulnerabilities#645632](https://lwn.net/Vulnerabilities/645632/) (search, files) fuse: privilege escalation#711858](https://lwn.net/Vulnerabilities/711858/) (search, files) icinga: cross-site scripting#711775](https://lwn.net/Vulnerabilities/711775/) (search, files) icoutils: three vulnerabilities#711459](https://lwn.net/Vulnerabilities/711459/) (search, files) python-psaml2: XML external entity attacks#711583](https://lwn.net/Vulnerabilities/711583/) (search, files) rabbitmq-server: authentication bypass#711774](https://lwn.net/Vulnerabilities/711774/) (search, files) wordpress: multiple vulnerabilities#711780](https://lwn.net/Vulnerabilities/711780/) (search, files) apache: denial of service#711463](https://lwn.net/Vulnerabilities/711463/) (search, files) bind: denial of service#711457](https://lwn.net/Vulnerabilities/711457/) (search, files) bind: three denial of service flaws#652803](https://lwn.net/Vulnerabilities/652803/) (search, files) freeradius: insufficient certificate verification#710286](https://lwn.net/Vulnerabilities/710286/) (search, files) openjpeg2: multiple vulnerabilities#711464](https://lwn.net/Vulnerabilities/711464/) (search, files) gnutls: multiple vulnerabilities#711458](https://lwn.net/Vulnerabilities/711458/) (search, files) ikiwiki: three vulnerabilities#711329](https://lwn.net/Vulnerabilities/711329/) (search, files) kernel: denial of service#711777](https://lwn.net/Vulnerabilities/711777/) (search, files) tiff: three vulnerabilities#598449](https://lwn.net/Vulnerabilities/598449/) (search, files) miniupnpc: denial of service#711779](https://lwn.net/Vulnerabilities/711779/) (search, files) onionshare: file injection#711776](https://lwn.net/Vulnerabilities/711776/) (search, files) pdns: multiple vulnerabilities#711461](https://lwn.net/Vulnerabilities/711461/) (search, files) qpid-java: information disclosure#711462](https://lwn.net/Vulnerabilities/711462/) (search, files) springframework-security: security constraint bypass#711330](https://lwn.net/Vulnerabilities/711330/) (search, files) webkit2gtk: multiple vulnerabilities#711856](https://lwn.net/Vulnerabilities/711856/) (search, files) SimGear: file overwrites#711582](https://lwn.net/Vulnerabilities/711582/) (search, files) docker: privilege escalation#711781](https://lwn.net/Vulnerabilities/711781/) (search, files) irssi: out of bounds read#711586](https://lwn.net/Vulnerabilities/711586/) (search, files) libgit2: multiple vulnerabilities#711778](https://lwn.net/Vulnerabilities/711778/) (search, files) libx11: denial of service#711324](https://lwn.net/Vulnerabilities/711324/) (search, files) phpBB: two vulnerabilities#711325](https://lwn.net/Vulnerabilities/711325/) (search, files) phpmyadmin: two vulnerabilities#657322](https://lwn.net/Vulnerabilities/657322/) (search, files) vzctl: insecure ploop-based containers#711587](https://lwn.net/Vulnerabilities/711587/) (search, files) webmin: largely unspecifiedOur libX11 is not vulnerable. According to the Debian commit the problem was introduced after 1.6.4 release as an incorrect attempt to fix a memory leak. So, our version may only leak memory. I'd personally wait for a release for this one.
Our simgear doesn't seem to be vulnerable either: The Fedora alert is about 2016.3.1 and we're on 2016.4.3.
I'll push an update to 2016.4.4 in a few hours.
libgit2: we have a fresh enough version
libupnp: https://github.com/NixOS/nixpkgs/commit/3be6e9fc5af88fca55ba3b3a2f8be46ed21c9f35 (not related to this roundup)
We have Docker 1.12.6, which closes the vulnerability mentioned
gnutls: their advisories possibly imply that 3.4 branch is no longer maintained at this point, though I see no explicit saying of that. In any case, master and 16.09 have 3.4 as the default which was last updated on Dec 08 upstream.
Does someone have an idea how to handle the ark issues? Do we need to update all of KDE?
Actually I think the ark issue is already fixed in https://github.com/NixOS/nixpkgs/commit/7d01fff5160b12f2ce6795c028a1178bcd33805a
Thanks for the research and looking y'all did today. I wasn't able to do very much due to working on secret side projects, but am carving out some time now.
ikiwiki: done
libtiff: took all patches from Debian, on both active branches.
pdns: fixed in 1fe51342a98638d32349e0930afe6c1751e612ef (for notes later)
Bind addressed in 2fd0a9f3c74a29e87952c7657aed8194258a83c4 and 7b34209e1bb5d38106115e52506a2ed777608672 (thank you, @peti)
@bachp I suspect we need to fix ark on 16.09. Can you check in to that?
php security update ported to stable, except the php71 part which is not relevant there.
We should definitely upgrade our qemu version as initiated by @7c6f434c with the 2.8 version.
@nlewo thanks
@grahamc I cherry-picked to stable, but I used the merge commit; not sure if I should have picked one-by-one
Re: qemu_28: NixPkgs-wise it is a no-brainer; NixOS tests need to be re-checked by people actually using NixOS and its tests, I guess.
Amazing, @nlewo, thank you so much! How did you find the patches?
@7c6f434c Nice! _Extremely_ timely on those, thank you! Usually I pick one by one, but this should be fine :)
I'll see about running tests with qemu_28.
@7c6f434c There are some tests that are declared in nixos/release.nix but I don't know if the CI executes them. I'm responsible of two of them and I'll try to run them with qemu 2.8.
@grahamc By reading mails associated to the CVE desc on http://cve.mitre.org. I also get some information from https://security-tracker.debian.org (which is really nice).
@nlewo if you submit a PR changing the default to 2.8, I can easily run the tests.
@grahamc I will try if I can backport the patch. I think it is this one here: https://github.com/KDE/ark/commit/82fdfd24d46966a117fa625b68784735a40f9065
Special thank you to @nlewo and @bachp for getting those more annoying ones (IMO...) done, @7c6f434c for merging and cherry-picking commits, @vcunat for finding like a million patches that we were missing on debian ...! @the-kenny for so quickly triaging the flight package, @globin for tagging his libupnp patch despite being in this issue (very useful for making sure it gets in the notices) and @NeQuissimus, and any other anonymous triagers out there!
@grahamc Last minute fix for libopus: 140d135ee2e2f2ea538591fe25719c9c91d4651e
Most helpful comment
Our simgear doesn't seem to be vulnerable either: The Fedora alert is about
2016.3.1and we're on2016.4.3.I'll push an update to
2016.4.4in a few hours.