X-Original-To: alpine-devel@lists.alpinelinux.org Received: from mail-ua0-f170.google.com (mail-ua0-f170.google.com [209.85.217.170]) by lists.alpinelinux.org (Postfix) with ESMTP id DD9E55C4F60 for ; Tue, 17 Apr 2018 15:01:45 +0000 (GMT) Received: by mail-ua0-f170.google.com with SMTP id q38so12758400uad.5 for ; Tue, 17 Apr 2018 08:01:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=BTl4N2ca8xStybDqFhJjPDigoci/Oi6gvu+K9qvyuLE=; b=IZxq2tS+Tp43RaG7jXMoW+H6YC+LQLTQsW2zejPdqf8u4fHY7JlB1ZLoR1aozoeGf8 4GFDeoEirXXZn1I86U5X7eZP42vRt+vKHd7n5591xkliQDLVz15Xi5p/BG/lPF8Uo0Qz RL4XBZ1CFgZwSiJiz+uKVCzxItmDD1OhQKpybXy7l0ejcfLjeVH8yW5Txct5NLlcrAbj pyjkgdP0r3VaG6rgv4yzLAvlmzaf/xHuSdNUeOUUyMxnxqKpiQZbSrq702LxFLUOQMCZ coIlZ2T5LGGNGOSLaiGfT4UNe3BqRZAHYMpUHBjByXUj+gi8HIYYG/6ssh+7affMcwVc VwSQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=BTl4N2ca8xStybDqFhJjPDigoci/Oi6gvu+K9qvyuLE=; b=YdOSs5TWZvQY/H8Y3mF/ii0NGky1At9DQ1xAnPmhPPTVNPST2V2L75MyN3SVt6fZPG Pu5F/uxyi6PoSQ+aDkVEjhLR0Um166w7OaWqy5ivj/kbZDpxPwh316Fq7QJi5nE3/YS0 snCrkl2neufUdHPrb1he/HVoTep/k7OGGWw8/LrqdrI5y9EkUatUmd9WYI7nLAuSUCk6 PqR5y5Hk7kqvaFJUETx+QVhH9NLcP6HjEmqhclo9R++0KLroBdxoMNL5/03X2FHA6XkM jqN/HiDouQAQvamuFKsbL73gtZvsFSnMjpKr7RgYT9lX/gJWm8V+EcBMl2EwCQUqpcgh iq1g== X-Gm-Message-State: ALQs6tDG3rC8+i4O94gbm5rR5qUSIi29DlcCPK5l5SWykUsdM96GJ+MI o4UdE08IvaqhYipU3wW5eHZJU7mmMKOGKZXn30I= X-Google-Smtp-Source: AIpwx49MiuzYlFbxlmHPY17zu/6p8EY5NcQWj6FBXTIa8aOaBGVkMdJ798kJHd5dtw2WQIJ+ZBdqFKeQkYVQ3PvmXLE= X-Received: by 10.176.83.143 with SMTP id k15mr1715584uaa.40.1523977305152; Tue, 17 Apr 2018 08:01:45 -0700 (PDT) X-Mailinglist: alpine-devel Precedence: list List-Id: Alpine Development List-Unsubscribe: List-Post: List-Help: List-Subscribe: MIME-Version: 1.0 Received: by 10.159.34.202 with HTTP; Tue, 17 Apr 2018 08:01:44 -0700 (PDT) In-Reply-To: References: From: Leonardo Arena Date: Tue, 17 Apr 2018 17:01:44 +0200 Message-ID: Subject: Re: [alpine-devel] Patching CVE-2016-4074 in jq To: Ariel Zelivansky Cc: Alpine-devel Content-Type: multipart/alternative; boundary="f403045e36d0eb615b056a0c9d4b" --f403045e36d0eb615b056a0c9d4b Content-Type: text/plain; charset="UTF-8" Hi, On Tue, Apr 17, 2018 at 3:07 PM, Ariel Zelivansky wrote: > Hi, > > It has been brought to my attention that the current jq package in alpine > is vulnerable to CVE-2016-4074 > . > thank you for bringing this to our attention. This has been now fixed in edge. I'll see if it can be backported to stable branches too. > > The fix for this issue was released a while back on their master branch > but no one packaged it into release. On the project website > the latest jq release is 1.5, which was > released more than two years ago. It is vulnerable to this CVE. > > It is worth mentioning someone on the project GitHub someone released > 1.6rc1 last year and it includes the fix for this issue. You might want to > consider packaging this release but I am not very familiar with the jq > release process or found any documentation of it. > > The alpine jq package > patches > CVE-2015-8863 so I think it should also patch this issue for the meanwhile. > You can see the correspondence on this issue > and the fix > > . > > This was fixed in 1.5-r1 package. Best regards, /eo --f403045e36d0eb615b056a0c9d4b Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Hi,

On Tue, Apr 17, 2018 at 3:07 PM, Ariel Zelivansky <ariel@twi= stlock.com> wrote:
Hi,

It has been brought to my attention that th= e current jq package in alpine is vulnerable to=C2=A0CVE-= 2016-4074.


thank you fo= r bringing this to our attention. This has been now fixed in edge. I'll= see if it can be backported to stable branches too.
=C2=A0

The= fix for this issue was released a while back on their master branch but no= one packaged it into release. On the project website=C2=A0the latest jq release is 1= .5, which was released more than two years ago. It is vulnerable to this CV= E.

It is worth mentioning someone on the project G= itHub someone released 1.6rc1 last year and it includes the fix for this is= sue. You might want to consider packaging this release but I am not very fa= miliar with the jq release process or found any documentation of it.
<= div>
The alpine jq package=C2=A0patches = CVE-2015-8863 so I think it should also patch this issue for the meanwhile.= You can see the=C2=A0correspondence on this issue and the fix.


This was fixed in 1.5-r1= package.

Best regards,

/eo
--f403045e36d0eb615b056a0c9d4b-- --- Unsubscribe: alpine-devel+unsubscribe@lists.alpinelinux.org Help: alpine-devel+help@lists.alpinelinux.org ---