Here are all the vulnerabilities from https://lwn.net/Vulnerabilities
since our last roundup.
cc: @vcunat @the-kenny @7c6f434c @globin @bachp @nlewo @fpletz @NeQuissimus. (nice goup!)
_Note:_ The list of people CC'd on this issue participated in the last
roundup. If you participate on this roundup, I'll cc you on the next
one. If you don't participate in the next one, you won't be CC'd on
the one after that. If you would like to be CC'd on the next roundup,
add a comment to the most recent vulnerability roundup.
Permanent CC's: @joepie91, @phanimahesh, @the-kenny,
@NixOS/security-notifications
If you would like to be CC'd on _all_ roundups (or removed from the
list), open a PR editing
https://github.com/NixOS/security/blob/master/lwnvulns/src/bin/instructions.md.
details block below.reformat one last timeWithout further ado...
#712299](https://lwn.net/Vulnerabilities/712299/) (search, files) ed: denial of service#712364](https://lwn.net/Vulnerabilities/712364/) (search, files) gd: two denial of service flaws#712065](https://lwn.net/Vulnerabilities/712065/) (search, files) libav: multiple vulnerabilities#640613](https://lwn.net/Vulnerabilities/640613/) (search, files) ppp: denial of service#662269](https://lwn.net/Vulnerabilities/662269/) (search, files) squid: nonce replay vulnerability#711945](https://lwn.net/Vulnerabilities/711945/) (search, files) webkit2gtk: multiple vulnerabilities#712297](https://lwn.net/Vulnerabilities/712297/) (search, files) groovy: code execution#712057](https://lwn.net/Vulnerabilities/712057/) (search, files) java: multiple vulnerabilities#712058](https://lwn.net/Vulnerabilities/712058/) (search, files) java: multiple vulnerabilities#712059](https://lwn.net/Vulnerabilities/712059/) (search, files) java: two unspecified vulnerabilities#712369](https://lwn.net/Vulnerabilities/712369/) (search, files) kernel: privilege escalation#712067](https://lwn.net/Vulnerabilities/712067/) (search, files) mariadb: multiple unspecified vulnerabilities#712068](https://lwn.net/Vulnerabilities/712068/) (search, files) mysql: multiple vulnerabilities#712068](https://lwn.net/Vulnerabilities/712068/) (search, files) mysql: multiple vulnerabilities#642649](https://lwn.net/Vulnerabilities/642649/) (search, files) DirectFB: two vulnerabilities#480386](https://lwn.net/Vulnerabilities/480386/) (search, files) cvs: remote code execution#644511](https://lwn.net/Vulnerabilities/644511/) (search, files) dcraw: denial of service#712370](https://lwn.net/Vulnerabilities/712370/) (search, files) firejail: three vulnerabilities#712359](https://lwn.net/Vulnerabilities/712359/) (search, files) hesiod: two vulnerabilities#712300](https://lwn.net/Vulnerabilities/712300/) (search, files) libnl3: privilege escalation#712363](https://lwn.net/Vulnerabilities/712363/) (search, files) tiff: code execution#610398](https://lwn.net/Vulnerabilities/610398/) (search, files) lua: code execution#712060](https://lwn.net/Vulnerabilities/712060/) (search, files) mapserver: code execution#712298](https://lwn.net/Vulnerabilities/712298/) (search, files) opus: code execution#712155](https://lwn.net/Vulnerabilities/712155/) (search, files) php: code execution#711946](https://lwn.net/Vulnerabilities/711946/) (search, files) php-PHPMailer: information disclosure#712371](https://lwn.net/Vulnerabilities/712371/) (search, files) t1lib: code execution#712304](https://lwn.net/Vulnerabilities/712304/) (search, files) xtrabackup: information disclosurelua5_1: that's an old bug
Re: qemu: what is the current status of maybe-we-should-update-to-2.8?
firejail: old story
I never saw a PR come through trying 2.8, and I'd still like to try it. Note cvs is an old bug, but we are vulnerable :)
tiff: we already apply debian/patches/17-CVE-2017-5225.patch since the last roundup, so that should be OK.
libopus: OK since 140d135e.
ed is good on master but needs a backport to stable. It _looks_ like all three commits to ed can be backported. what do you think, @vcunat?
It's just 1.13 -> 1.14.1 and some nitpicks along. I'd think the update is safe (but a mass rebuild).
OK I'll hold on to that backport until later.
webkitgtk: the version on master should be OK, but we have 2.12 as the default on 16.09, so it's probably vulnerable. I can't see any complaints since we updated the default on master, and the versions should be compatible (in this direction), so I think we should switch.
Sounds fine to me, re: webkitgtk. Not ideal, but nor is webkitgtk ;)
I set up a PR to push changes to: https://github.com/NixOS/nixpkgs/pull/22131 you can both push to that branch, I think. Also that branch is building in a hydra (link in the description.)
t1lib: I believe CVE-2011-5244 was fixed by our particular patch for CVE-2010-2642. That patch from Gentoo is certainly equal to the one we apply (taken from Arch).
Collapsed the done items. Almost half done :o
~Might be good to upgrade mariadb to 10.2.x before 17.03 branch-off.~ 10.2 isn't stable.
Java and kernel are fine
So is our Groovy version
馃憤 I collapsed the completed tasks.
As dar as I can tell squid on 16.09 is not vulnerable. It has the same version as master 3.5.23 and the issue only mentiones 3.4 and 3.5.0.1 through 3.5.1.
EDIT: I just noticed it is ticked ;) Never mind.
We already have a fixed version of ed (1.14.1) and not present on release (1.13) because the issue was introduced in 1.14.
We're safe on the second qemu issue (CVE-2016-10028) because we don't build our qemu with virtio-gpu-3d enabled.
The first qemu issue (CVE-2016-9923) is fixed in 2.8.0 and the patch is not easily applicable to our version.
Pushed fixes for libav, ppp and gd to #22131.
I think we can go ahead and upgrade qemu: https://github.com/NixOS/nixpkgs/pull/22134 but probably shouldn't do so for stable... :/ hard question. We don't really have a way to track vulnerabilities we know NixOS has but aren't fixing.
Is there any known incompatible change for Qemu 2.8 (or any regressions)? Qemu looks like software where just doing the upgrade could be safe.
squid: old stuff
@bachp technically, one of the links references a bug in 3.5.22
Just pushed new qemus everywhere. Good work, all done! Thank you! :D
Most helpful comment
webkitgtk: the version on master should be OK, but we have 2.12 as the default on 16.09, so it's probably vulnerable. I can't see any complaints since we updated the default on master, and the versions should be compatible (in this direction), so I think we should switch.