all messages for Guix-related lists mirrored at yhetil.org
 help / color / mirror / code / Atom feed
From: Mark H Weaver <mhw@netris.org>
To: guix-devel@gnu.org
Subject: Unpatched security vulnerabilities in GNU IceCat
Date: Wed, 12 Aug 2015 21:17:33 -0400	[thread overview]
Message-ID: <87fv3ong0i.fsf@netris.org> (raw)

I've pushed an update to the GNU IceCat 31.8 package in GNU Guix that
fixes some of the security vulnerabilities fixed upstream in Firefox ESR
38.2, listed here:

  https://www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/

Unfortunately, I was not able to backport all of the fixes mentioned
there, because some of the underlying code has changed dramatically
between versions 31 and 38.  Specifically, I was unable to address the
following issues:

(the commit IDs below are for the 'gecko-dev' git mirror)

* https://www.mozilla.org/en-US/security/advisories/mfsa2015-90/
  (CVE-2015-4487) (mozilla bug 1171603).  Although the advisory claims
  that it's fixed in ESR 38.2, I was unable to find any commit
  mentioning bug 1171603 on the esr38 branch.  However, I did find
  commits b6e7f5efcf6ff0307b0b3def8d037621e76f920d and
  52ee71547cdcbf7c0da5df53c5182f623d9df384 on their master branch.
  I can probably backport these with some effort, but ran into
  difficulties in my initial attempt.

* https://www.mozilla.org/en-US/security/advisories/mfsa2015-87/
  (CVE-2015-4484) (mozilla bug 1171540).  The underlying code has
  changed radically and I have no idea how to proceed.  Upstream
  commit 6e1f2aeeaedc1042bce1983552cd38169edef38e.

* https://www.mozilla.org/en-US/security/advisories/mfsa2015-82/
  (CVE-2015-4478) (mozilla bug 1105914).  I was unable to find any
  commit in the upstream repository that's tagged with this bug.

* https://www.mozilla.org/en-US/security/advisories/mfsa2015-79/
  (CVE-2015-4473) (mozilla bugs 1182711, 1146213, 1178890).  I was able
  to backport the fix for bug 1178890, but I was unable to backport the
  other two, which are fixed in upstream commits
  2edecbf4333665b8fad36b94069d780cde4de908 and
  f1c0791994791a94e065aa1755bd96b34dc7b7dc.

I don't expect anyone to fix these problems in version 31, so we're
probably stuck until GNU IceCat 38.x is released.  Hopefully that will
be soon.

If anyone would like to attempt to backport the missing bits above,
please let me know!

      Mark

             reply	other threads:[~2015-08-13  1:17 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-08-13  1:17 Mark H Weaver [this message]
2015-08-14 22:15 ` Unpatched security vulnerabilities in GNU IceCat Mark H Weaver

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87fv3ong0i.fsf@netris.org \
    --to=mhw@netris.org \
    --cc=guix-devel@gnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this external index

	https://git.savannah.gnu.org/cgit/guix.git

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.