Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

nagios: 4.0.8 -> 4.2.3 (for CVE) #20763

Merged
merged 2 commits into from
Nov 28, 2016
Merged

nagios: 4.0.8 -> 4.2.3 (for CVE) #20763

merged 2 commits into from
Nov 28, 2016

Conversation

lsix
Copy link
Member

@lsix lsix commented Nov 28, 2016

Motivation for this change

Nagios update contains many security related fixes (see https://www.nagios.org/projects/nagios-core/history/4x/) . 5b6d52b should probably be backported to stable.

Nagios version 4.2.0 fixes:

Nagios version 4.2.2 fixes:

Nagios version 4.2.3 fixes:

Things done
  • Tested using sandboxing
    (nix.useSandbox on NixOS,
    or option build-use-sandbox in nix.conf
    on non-NixOS)
  • Built on platform(s)
    • NixOS
    • macOS
    • Linux
  • Tested compilation of all pkgs that depend on this change using nix-shell -p nox --run "nox-review wip"
  • Tested execution of all binary files (usually in ./result/bin/)
  • Fits CONTRIBUTING.md.

Sorry, something went wrong.

lsix added 2 commits November 28, 2016 09:55
This update includes many security related fixes.

Version 4.2.0 fixes:
- CVE-2008-4796
- CVE-2013-4214

Version 4.2.2 fixes:
- CVE-2016-9565

Version 4.2.3 fixes:
- CVE-2016-8641

See https://www.nagios.org/projects/nagios-core/history/4x/ for full
detail changes.

Unverified

This commit is not signed, but one or more authors requires that any commit attributed to them is signed.
@mention-bot
Copy link

@lsix, thanks for your PR! By analyzing the history of the files in this pull request, we identified @thoughtpolice and @edolstra to be potential reviewers.

@lsix lsix changed the title Update nagios nagios: 4.0.8 -> 4.2.3 (for CVE) Nov 28, 2016
@domenkozar domenkozar added the 1.severity: security Issues which raise a security issue, or PRs that fix one label Nov 28, 2016
};

patches = [ ./nagios.patch ];
buildInputs = [ php perl gd libpng zlib ];
buildInputs = [ php perl gd libpng zlib unzip ];
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does something about the patch for the CVE involve needing unzip? This is fine of course, but looks a bit like a mistake.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I do not think that unzip it is related to the CVE:

$ nix-build -A nagios
…
gcc -Wall -I.. -g -O2 -DHAVE_CONFIG_H -DNSCGI  -o summary.cgi summary.c ../common/shared.o getcgi.o cgiutils.o cgiauth.o macros-cgi.o  objects-cgi.o xobjects-cgi.o statusdata-cgi.o xstatusdata-cgi.o comments-cgi.o downtime-cgi.o ../lib/libnagios.a 
gcc -Wall -I.. -g -O2 -DHAVE_CONFIG_H -DNSCGI  -o tac.cgi tac.c ../common/shared.o getcgi.o cgiutils.o cgiauth.o macros-cgi.o  objects-cgi.o xobjects-cgi.o statusdata-cgi.o xstatusdata-cgi.o comments-cgi.o downtime-cgi.o ../lib/libnagios.a  
gcc -Wall -I.. -g -O2 -DHAVE_CONFIG_H -DNSCGI  -o statuswrl.cgi statuswrl.c ../common/shared.o getcgi.o cgiutils.o cgiauth.o macros-cgi.o  objects-cgi.o xobjects-cgi.o statusdata-cgi.o xstatusdata-cgi.o comments-cgi.o downtime-cgi.o ../lib/libnagios.a -lm 
gcc -Wall -I.. -g -O2 -DHAVE_CONFIG_H -DNSCGI  -o statusmap.cgi statusmap.c ../common/shared.o getcgi.o cgiutils.o cgiauth.o macros-cgi.o  objects-cgi.o xobjects-cgi.o statusdata-cgi.o xstatusdata-cgi.o comments-cgi.o downtime-cgi.o ../lib/libnagios.a -lgd  -lpng -ljpeg -lz -lm 
gcc -Wall -I.. -g -O2 -DHAVE_CONFIG_H -DNSCGI  -o trends.cgi trends.c ../common/shared.o getcgi.o cgiutils.o cgiauth.o macros-cgi.o  objects-cgi.o xobjects-cgi.o statusdata-cgi.o xstatusdata-cgi.o comments-cgi.o downtime-cgi.o ../lib/libnagios.a -lgd  -lpng -ljpeg -lz -lm 
gcc -Wall -I.. -g -O2 -DHAVE_CONFIG_H -DNSCGI  -o histogram.cgi histogram.c ../common/shared.o getcgi.o cgiutils.o cgiauth.o macros-cgi.o  objects-cgi.o xobjects-cgi.o statusdata-cgi.o xstatusdata-cgi.o comments-cgi.o downtime-cgi.o ../lib/libnagios.a -lgd  -lpng -ljpeg -lz -lm 
make[1]: Leaving directory '/tmp/nix-build-nagios-4.2.3.drv-0/nagios-4.2.3/cgi'
cd ./html && make
make[1]: Entering directory '/tmp/nix-build-nagios-4.2.3.drv-0/nagios-4.2.3/html'
(cd angularjs && unzip -u angular-1.3.9.zip)
/nix/store/mgdm9y2lhmyb74wwa42qhcl633vbwn26-bash-4.3-p46/bin/bash: unzip: command not found
make[1]: *** [Makefile:20: all] Error 127
make[1]: Leaving directory '/tmp/nix-build-nagios-4.2.3.drv-0/nagios-4.2.3/html'
make: *** [Makefile:75: all] Error 2
builder for ‘/nix/store/zisvfirpbs454rdskf92f31q02g3gv1b-nagios-4.2.3.drv’ failed with exit code 2
error: build of ‘/nix/store/zisvfirpbs454rdskf92f31q02g3gv1b-nagios-4.2.3.drv’ failed

This version seems to embed a web UI build on angularjs, and angular is embedded as a zip in the distribution. Not having it would mean that we would have to cherry-pick the security related updates from nagios-4.2.3 into nagios-4.0.8.

@grahamc
Copy link
Member

grahamc commented Nov 28, 2016

I'd merge and cherry-pick as soon as I heard back on the unzip.

@grahamc
Copy link
Member

grahamc commented Nov 28, 2016

Ok, LGTM, thank you. merging and backporting.

@grahamc grahamc merged commit 59695de into NixOS:master Nov 28, 2016
@grahamc
Copy link
Member

grahamc commented Nov 28, 2016

Backported at 7fc197f and a9523ed. Thank you!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
1.severity: security Issues which raise a security issue, or PRs that fix one
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants