From: "Mikko Rapeli" <mikko.rapeli@bmw.de>
To: <steve@sakoman.com>
Cc: <anuj.mittal@intel.com>, <openembedded-core@lists.openembedded.org>
Subject: Re: [OE-core] cups: whitelist CVE-2018-6553
Date: Thu, 19 Nov 2020 08:46:53 +0000 [thread overview]
Message-ID: <20201119084652.GW1246345@korppu> (raw)
In-Reply-To: <CAOSpxdZWBUh3UCDLoAgOgZvpgCBD6SGvRETcgjx2HHfKUuh_NQ@mail.gmail.com>
On Wed, Nov 18, 2020 at 02:12:18PM -1000, Steve Sakoman wrote:
> On Wed, Nov 18, 2020 at 1:56 PM Mittal, Anuj <anuj.mittal@intel.com> wrote:
> >
> > On Wed, 2020-11-18 at 05:25 -1000, Steve Sakoman wrote:
> > > This an Ububtu specific issue:
> > >
> > > The CUPS AppArmor profile incorrectly confined the dnssd backend
> > > due to use of hard links. A local attacker could possibly use this
> > > issue to escape confinement. This flaw affects versions prior to
> > > 2.2.7-1ubuntu2.1 in Ubuntu 18.04 LTS, prior to 2.2.4-7ubuntu3.1
> > > in Ubuntu 17.10, prior to 2.1.3-4ubuntu0.5 in Ubuntu 16.04 LTS,
> > > and prior to 1.7.2-0ubuntu1.10 in Ubuntu 14.04 LTS
> >
> > It doesn't affect the default configuration but someone in theory could
> > have extended the recipe to have AppArmor support and then it might be
> > vulnerable?
>
> I suppose if someone implemented AppArmor support and botched it in the
> same way as it was in Ubuntu, then yes they would have the same vulnerability!
>
> > Since this CVE is sort of distro specific and not package specific,
> > should this be part of recipe or the poky distro meta data?
>
> I'm open for suggestions. There are many ways people can take our
> standard recipes and implement a horribly insecure image. IMHO
> this is one of the more unlikely paths that someone would take :-)
>
> But if the community feels this is best in the poky distro metadata I have no
> issue with that.
I'd keep this CVE whitelist in cups recipe. CVEs details apply to an unmodified
poky version of the recipe. bbappends and other layers can do really weird things
including removing patches and downgrading SW versions which would also result
in bad CVE data overall but we can't possibly detect those cases inside the
recipe in poky or even distro configuration. Only way to be sure, is to review all
bbappends to recipes from all layers in product configurations. Devil is in
the details.
Cheers,
-Mikko
prev parent reply other threads:[~2020-11-19 8:46 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-11-18 15:25 [OE-core] cups: whitelist CVE-2018-6553 Steve Sakoman
2020-11-18 23:56 ` Anuj Mittal
2020-11-19 0:12 ` Steve Sakoman
2020-11-19 8:46 ` Mikko Rapeli [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20201119084652.GW1246345@korppu \
--to=mikko.rapeli@bmw.de \
--cc=anuj.mittal@intel.com \
--cc=openembedded-core@lists.openembedded.org \
--cc=steve@sakoman.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox