Here are all the vulnerabilities from https://lwn.net/Vulnerabilities
since our last roundup.
cc: @peterhoeg @7c6f434c @bendlas @LnL7 @phanimahesh @vcunat @tavyc @joachifm.
_Note:_ The list of people CC'd on this issue participated in the last
roundup. If you participate on this roundup, I'll cc you on the next
one. If you don't participate in the next one, you won't be CC'd on
the one after that. If you would like to be CC'd on the next roundup,
add a comment to the most recent vulnerability roundup.
Permanent CC's: @joepie91, @phanimahesh, @the-kenny, @7c6f434c, @k0001, @peterhoeg
@NixOS/security-notifications
If you would like to be CC'd on _all_ roundups (or removed from the
list), open a PR editing
https://github.com/NixOS/security/blob/master/lwnvulns/src/bin/instructions.md.
details block below.reformat one last timeWithout further ado...
#714850](https://lwn.net/Vulnerabilities/714850/) (search, files) diffoscope: file overwrite#715043](https://lwn.net/Vulnerabilities/715043/) (search, files) firebird: access restriction bypass#715166](https://lwn.net/Vulnerabilities/715166/) (search, files) libass: denial of service#715170](https://lwn.net/Vulnerabilities/715170/) (search, files) libplist: three vulnerabilities#714582](https://lwn.net/Vulnerabilities/714582/) (search, files) lynx: invalid URL parsing#715167](https://lwn.net/Vulnerabilities/715167/) (search, files) nagios-core: privilege escalation#714852](https://lwn.net/Vulnerabilities/714852/) (search, files) postfixadmin: security bypass#714853](https://lwn.net/Vulnerabilities/714853/) (search, files) python-crypto: code execution#715038](https://lwn.net/Vulnerabilities/715038/) (search, files) zoneminder: information disclosure#715045](https://lwn.net/Vulnerabilities/715045/) (search, files) kernel: denial of service#715045](https://lwn.net/Vulnerabilities/715045/) (search, files) kernel: denial of service#715165](https://lwn.net/Vulnerabilities/715165/) (search, files) dropbear: code execution#715041](https://lwn.net/Vulnerabilities/715041/) (search, files) jitsi: user spoofing#715162](https://lwn.net/Vulnerabilities/715162/) (search, files) kernel: information disclosure#714581](https://lwn.net/Vulnerabilities/714581/) (search, files) libevent: three vulnerabilities#715042](https://lwn.net/Vulnerabilities/715042/) (search, files) netpbm: three vulnerabilities#714586](https://lwn.net/Vulnerabilities/714586/) (search, files) php5: three vulnerabilities#715036](https://lwn.net/Vulnerabilities/715036/) (search, files) python-peewee: largely unspecified#715168](https://lwn.net/Vulnerabilities/715168/) (search, files) qemu: multiple vulnerabilities#715169](https://lwn.net/Vulnerabilities/715169/) (search, files) redis: code execution#715037](https://lwn.net/Vulnerabilities/715037/) (search, files) sshrc: unspecified#715045](https://lwn.net/Vulnerabilities/715045/) (search, files) kernel: denial of service#715171](https://lwn.net/Vulnerabilities/715171/) (search, files) tomcat: denial of service#715171](https://lwn.net/Vulnerabilities/715171/) (search, files) tomcat: denial of service#715035](https://lwn.net/Vulnerabilities/715035/) (search, files) wireshark: denial of service#715044](https://lwn.net/Vulnerabilities/715044/) (search, files) mupdf: two vulnerabilities#715039](https://lwn.net/Vulnerabilities/715039/) (search, files) mupdf: denial of serviceredis is not vulnerable, it was updated to a more recent version for the last round up.
dropbear: fixed in 2016.74, we have it, both branches
I've already got a commit with qemu patches from a few hours ago that I didn't push to master yet. I will take care of the remaining qemu issues.
PHP vulnerabilities are fixed in the versions we are shipping.
I'm working on the Xen issues.
wireshark: the report is for 1.12.1, but 2.2.4 is also affected; fixed in 194d137bd3646b8e73901d5c01ee4e90d3dcf2a4 and cherry-picked
Tomcat is already fixed.
xen patched in cc4919da8968ccdd2e4f76cbdde7e2ed6c385130 / 142fd06afc50d9513477ab29c9be17e46e38248f
We have all the kernel issues covered
I have contacted the security team privately before, but I believe neovim has a serious vulnerability which was fixed in version 1.0.7. NixOS stable only has version 1.0.5.
Not sure if vim is also affected.
hey @wizeman, I thought I had covered that last roundup, thank you for bringing it up again here, I'll make sure it is patched this time around. I'm sorry I missed it last.
We don't have peewee in Nixpkgs so I am ticking it.
Libevent should be OK now.
We don't have pycrypto anymore but use pycryptodome. Maybe the latter is affected, I don't know.
I've updated diffoscope on master https://github.com/NixOS/nixpkgs/commit/de4643eb80ffa13b65c6e5e662235080c093b3e1. Not sure what to do with it on 16.09 though.
netpbm was fixed in last week's roundup.
Not finding sshrc in repo
Jitsi is at a newer version than listed on CVE
firebird fixed in 6c37a92 / d87a40e
libass is old
nagios-core is old.
We don't package postfixadmin.
We don't package zoneminder.
@wizeman is there any way you can work on updating stable to 0.1.7? It appears to be a fairly complex update, based on master's changes.
@FRidh Looks like the crypto vulnerability has been taken down by LWN. I emailed them asking about it.
@dezgeg @edolstra: is this diffoscope acceptable to backport to stable? https://github.com/NixOS/nixpkgs/commit/de4643eb80ffa13b65c6e5e662235080c093b3e1
I'm working on patches for the DCCP bug (cc @NeQuissimus, @fpletz). Just waiting on compilation to check.
Yes, diffoscope is most likely ok to upgrade in stable.
Would like to be CCd.
mupdf fixed in 6dfbb070fbfa48986c05c334996b8c3c47432cdd. The other mupdf issue is for mujs for which we already have the current git commit in which the issues are fixed.
libplist has been marked as insecure in 30cea5f02245a20022ea93f8eec2f4fe053ad97a. Checked it off above.
See comments to https://github.com/NixOS/nixpkgs/commit/afd59811a1f4b2037d77293064a4fee0ac91af6f. Maybe our gstreamer was still vulnerable. I'm preparing a bump to be on the safe side.
I just picked that diffoscope update to 16.09, so I suppose we can check it off.
The pycrypto issue turned out to be a duplicate. Thanks, everyone, for finishing this out without me. I've had a busy time since last Thursday. Great work!