Closed grahamc closed 7 years ago
I tried updating botan with
commit 81879537edc27b40075563fff55a59ad06526d17
Author: Graham Christensen <graham@grahamc.com>
Date: Wed Dec 28 07:08:13 2016 -0500
botan: 1.10.13 -> 1.10.14
CVE-2016-9132
diff --git a/pkgs/development/libraries/botan/default.nix b/pkgs/development/libraries/botan/default.nix
index 6e8a8cd..69e8f17 100644
--- a/pkgs/development/libraries/botan/default.nix
+++ b/pkgs/development/libraries/botan/default.nix
@@ -2,7 +2,7 @@
callPackage ./generic.nix (args // {
baseVersion = "1.10";
- revision = "13";
- sha256 = "144vl65z7bys43sxgb09mbisyf2nmh49wh0d957y0ksa9cyrgv13";
+ revision = "14";
+ sha256 = "072czy26vfjcqjww4qccsd29fzkb6mb8czamr4x76rdi9lwhpv8h";
extraConfigureFlags = "--with-gnump";
})
but get a build error:
In file included from src/asn1/ber_dec.cpp:11:0:
build/include/botan/internal/safeint.h: In constructor 'Botan::Integer_Overflow_Detected::Integer_Overflow_Detected(const string&, int)':
build/include/botan/internal/safeint.h:20:67: error: 'to_string' is not a member of 'std'
Exception("Integer overflow detected at " + file + ":" + std::to_string(line))
^
build/include/botan/internal/safeint.h:20:67: note: suggested alternatives:
In file included from build/include/botan/exceptn.h:12:0,
from build/include/botan/asn1_int.h:12,
from build/include/botan/asn1_oid.h:11,
from build/include/botan/ber_dec.h:11,
from src/asn1/ber_dec.cpp:8:
build/include/botan/parsing.h:56:23: note: 'Botan::to_string'
BOTAN_DLL std::string to_string(u64bit n, size_t min_len = 0);
^
In file included from build/include/botan/asn1_oid.h:11:0,
from build/include/botan/ber_dec.h:11,
from src/asn1/ber_dec.cpp:8:
build/include/botan/asn1_int.h:94:13: note: 'Botan::ASN1::to_string'
std::string to_string(const BER_Object& obj);
^
make: *** [Makefile:633: build/lib/asn1_ber_dec.o] Error 1
@grahamc Can you add me to the permanent-CC list please?
@wkennington second bump on Ceph, we're 2 major versions behind, 9.x hasn't seen an update in ages, and there don't seem to be any distros I can take the security patches from. I may mark as broken soon.
re: botan
: fixed, stable version wasn't enforcing C++11 for some reason.
Thank you, @7c6f434c! botan patches: https://github.com/NixOS/nixpkgs/compare/04736aef42e6...21d4d54a38b3
imagemagick
: I have updated to the latest repository release tag, no idea if it fixes all the vulnerabilities.
Also updated dovecot
gdk-pixbuf: 421a7f37f and f3d383553e6.
@vcunat any idea what's going wrong with the openssh test?
No idea. That's why I had reverted that update in 661b5a987.
re SSH: I was able to reproduce the issue locally.
qemu CVE-2016-9911 adressed by #21482.
@vcunat, @LnL7
applying:
diff --git a/nixos/modules/services/networking/ssh/sshd.nix b/nixos/modules/services/networking/ssh/sshd.nix
index 073391f..80659f1 100644
--- a/nixos/modules/services/networking/ssh/sshd.nix
+++ b/nixos/modules/services/networking/ssh/sshd.nix
@@ -264,8 +264,7 @@ in
StandardInput = "socket";
} else {
Restart = "always";
- Type = "forking";
- PIDFile = "/run/sshd.pid";
+ Type = "simple";
});
};
@@ -322,8 +321,6 @@ in
services.openssh.extraConfig = mkOrder 0
''
- PidFile /run/sshd.pid
-
Protocol 2
UsePAM yes
has fixed it for me:
* sshd(8): Improve handling of SIGHUP by checking to see if sshd is
already daemonised at startup and skipping the call to daemon(3)
if it is. This ensures that a SIGHUP restart of sshd(8) will
retain the same process-ID as the initial execution. sshd(8) will
also now unlink the PidFile prior to SIGHUP restart and re-create
it after a successful restart, rather than leaving a stale file in
the case of a configuration error. bz#2641
what do you think of this solution / backporting?
I know little about this stuff. In master it'll be good to switch to --with-systemd
, I guess, though that's not security-related. /cc openssh maintainer @aneeshusa. Context: previous comment and 661b5a9.
@vcunat / @aneeshusa -- they don't create any sort of --with-systemd
flag. That patch was rejected. The change they made makes it properly realize it is already backgrounded and not background itself if it is called by an init system. That is why my patch works, without adding a --with-systemd flag.
That's also how I understood it, if simple also works with services.openssh.startWhenNeeded
it should be fine.
I marked ceph as broken.
Thank you, everyone, for their work!
Here are all the vulnerabilities from https://lwn.net/Vulnerabilities since our last roundup.
cc: @joachifm @michalpalka @abbradar @bachp @LnL7 @the-kenny @Mic92 @FRidh @bjornfor @vcunat.
Note: The list of people CC'd on this issue participated in the last roundup. If you participate on this roundup, I'll cc you on the next one. If you don't participate in the next one, you won't be CC'd on the one after that. If you would like to be CC'd on the next roundup, add a comment to the most recent vulnerability roundup. If you would like to be CC'd on all roundups, leave a comment and tell @grahamc so.
Permanent CC's: @joepie91, @phanimahesh, @NixOS/security-notifications (if you no longer want to be CC'd, ask to be removed from this list)
Notes on the list
Instructions:
details
block below.Upon Completion ...
reformat
one last timeWithout further ado...
Assorted (17 issues)
#710086
(search, files) kernel: denial of service#710210
(search, files) libcrypto++: denial of service#710082
(search, files) openssh: multiple vulnerabilities#709844
(search, files) ceph: denial of service#710085
(search, files) gdk-pixbuf2: unspecified#709987
(search, files) graphicsmagick: denial of service#709988
(search, files) imagemagick: code execution#710084
(search, files) botan: integer overflow#710209
(search, files) exim4: information leak#710214
(search, files) httpd: three vulnerabilities#709984
(search, files) imagemagick: code execution#709986
(search, files) msgpuck: two denial of service flaws#710212
(search, files) qemu: denial of service#671098
(search, files) shellinabox: DNS rebinding#710213
(search, files) spip: two vulnerabilities#710087
(search, files) squid: two vulnerabilities#709993
(search, files) xen: two vulnerabilitiesgstreamer-plugins-good (2 issues)
#318382
(search, files) gstreamer-plugins-good: heap buffer overflows#709839
(search, files) gstreamer-plugins-good: denial of service