From: Richard Purdie <richard.purdie@linuxfoundation.org>
To: randy.macleod@windriver.com, steve@sakoman.com,
openembedded-core@lists.openembedded.org,
Yogita.Urade@windriver.com
Cc: Kang Kai <kai.kang@windriver.com>
Subject: Re: [OE-core][mickledore 02/26] dmidecode: fix CVE-2023-30630
Date: Tue, 18 Jul 2023 23:18:28 +0100 [thread overview]
Message-ID: <fc40ac8b47f12ed9540e7489fe757b81f103eed5.camel@linuxfoundation.org> (raw)
In-Reply-To: <2bccf919-d8fe-6cb6-c913-ccfdad357f7a@windriver.com>
On Tue, 2023-07-18 at 17:48 -0400, Randy MacLeod via lists.openembedded.org wrote:
>
> Add Kai,
>
> On 2023-07-14 18:32, Steve Sakoman via lists.openembedded.org wrote:
> From: Yogita Urade <yogita.urade@windriver.com>
> >
> > Dmidecode before 3.5 allows -dump-bin to overwrite a local file.
> > This has security relevance because, for example, execution of
> > Dmidecode via Sudo is plausible.
> >
> > References:
> > https://nvd.nist.gov/vuln/detail/CVE-2023-30630
> > https://lists.nongnu.org/archive/html/dmidecode-devel/2023-04/msg00016.html
> > https://lists.nongnu.org/archive/html/dmidecode-devel/2023-04/msg00017.html
> >
> > Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
> > Signed-off-by: Steve Sakoman <steve@sakoman.com>
> > ---
> > .../dmidecode/CVE-2023-30630_1.patch | 237
> > ++++++++++++++++++
> > .../dmidecode/CVE-2023-30630_2.patch | 81 ++++++
> > .../dmidecode/CVE-2023-30630_3.patch | 69 +++++
> > .../dmidecode/CVE-2023-30630_4.patch | 137 ++++++++++
> >
>
> Summary:
>
> I think this can merge but we should agree on how to handle
> dmidecode.
>
> Details:
>
> These changes work but it's bringing back 4 patches rather than
> bumping the version to 3.5
> and picking up 2 patches. My conclusion is that it's okay but we
> should probably talk
> about how to maintain dmidecode since it just produces a bunch of
> programs for dumping
> HW DMI/SMBIOS info and doesn't provide a runtime ABI, we can
> probably update to 3.5
> ( or even 3.6 when that's out).
>
> Do you agree Steve?
>
>
> The patches back-ported are:
>
> ❯ rg -i "subject: \[PATCH\]" /tmp/dmidecode-mickledore-cve.eml
> 201:+Subject: [PATCH] dmidecode: Write the whole dump file at once
> 444:+Subject: [PATCH] dmidecode: Do not let --dump-bin overwrite an
> existing file
> 531:+Subject: [PATCH] Consistently use read_file() when reading from
> a dump file
> 606:+Subject: [PATCH] Don't read beyond sysfs entry point buffer
>
> Two of these patches would be picked up if we update mickledore to
> 3.5 - so let's look at what changed:
>
> ❯ git log --oneline dmidecode-3-4..dmidecode-3-5
>
> 484f893 (tag: dmidecode-3-5) Set the version to 3.5
> 8baf2f5 Fix a build warning when USE_MMAP isn't set
> b9ebecc dmioem: HPE type 242: Fix ID on 32-bit systems
> 189ca35 Ensure /dev/mem is a character device file
> 8427888 dmidecode: Use the right variable for -s bios-
> revision/firmware-revision
> 6ca381c dmidecode: Do not let --dump-bin overwrite an existing file
> <---------- Added.
> d8cfbc8 dmidecode: Write the whole dump file at
> once <---------- Added.
> 39b2dd7 dmidecode: Split table fetching from decoding
> 11b168f dmioem: Avoid intermediate buffer (HPE type 216)
> 9d2bbd5 dmioem: Decode HPE OEM Record 216
> 3d68350 dmidecode: Drop the CPUID exception list
> c1a2520 dmidecode: Add a --no-quirks option
> 67dc0b2 dmidecode: Fortify entry point length checks
> f801673 dmioem: Typo fix (Virutal -> Virtual)
> 90d1323 dmioem: Decode HPE OEM Record 242
> f50b925 dmioem: Update HPE OEM Record 238
> ac24b67 dmioem: Decode HPE OEM Record 230
> c3357b5 dmioem: Fix segmentation fault in dmi_hp_240_attr()
> a1a2258 dmioem: Decode HPE OEM Record 224
> fb8766a NEWS: Fix typo
>
> My summary of the changes above:
> - support additional HW,
>
> - fix bugs, typos and build warnings.
>
> - internal program restructuring: 39b2dd7 dmidecode: Split table
> fetching from decoding
>
> I was a bit concerned about:
>
>
> 3d68350 dmidecode: Drop the CPUID exception list
>
> but it's pretty arcane (1) and only affects HW from 2008 or earlier
>
> so we should be okay with that change!
This discussion seems like it is starting to appear on a number of
recipes each time we have to backport CVE fixes.
The policy is very clear for good reasons. We do not take upgrades
where there are mixes of features and fixes. We only take upgrades
where they are part of some kind of stable series that the upstream is
promoting/supporting.
The policy is like this to make things clear cut. Yes, there are fuzzy
cases where you can make the argument but that is not the policy.
You can make this argument for many different pieces of software and I
don't want to see this discussion happening every time. I really don't
want to keep seeing this discussion coming back up either. There is
risk starting to make guesses about what feature changes do and these
are not the risks we've stated the stable series supports.
If someone wants to maintain a branch where they upgrade all the
software to the latest versions they can feel free to do so but it will
look a lot like master.
Cheers,
Richard
next prev parent reply other threads:[~2023-07-18 22:18 UTC|newest]
Thread overview: 35+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-07-14 22:32 [OE-core][mickledore 00/26] Patch review Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 01/26] python3-requests: fix CVE-2023-32681 Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 02/26] dmidecode: fix CVE-2023-30630 Steve Sakoman
2023-07-18 21:48 ` Randy MacLeod
2023-07-18 22:18 ` Richard Purdie [this message]
2023-07-18 22:32 ` Steve Sakoman
2023-07-19 0:06 ` Randy MacLeod
2023-07-20 23:28 ` Randy MacLeod
2023-07-14 22:32 ` [OE-core][mickledore 03/26] ghostscript: fix CVE-2023-36664 Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 04/26] erofs-utils: fix CVE-2023-33551/CVE-2023-33552 Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 05/26] diffutils: update 3.9 -> 3.10 Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 06/26] freetype: upgrade 2.13.0 -> 2.13.1 Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 07/26] gstreamer1.0: upgrade 1.22.3 -> 1.22.4 Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 08/26] libassuan: upgrade 2.5.5 -> 2.5.6 Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 09/26] libksba: upgrade 1.6.3 -> 1.6.4 Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 10/26] libx11: upgrade 1.8.5 -> 1.8.6 Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 11/26] lttng-ust: upgrade 2.13.5 -> 2.13.6 Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 12/26] libproxy: fetch from git Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 13/26] weston: Cleanup and fix x11 and xwayland dependencies Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 14/26] baremetal-helloworld: Fix race condition Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 15/26] cargo.bbclass: set up cargo environment in common do_compile Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 16/26] rust-common.bbclass: move musl-specific linking fix from rust-source.inc Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 17/26] libxcrypt: fix hard-coded ".so" extension Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 18/26] ifupdown: install missing directories Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 19/26] recipetool: Fix inherit in created -native* recipes Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 20/26] kernel: config modules directories are handled by kernel-module-split Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 21/26] kernel-module-split: install config modules directories only when they are needed Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 22/26] kernel-module-split: use context manager to open files Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 23/26] kernel-module-split: make autoload and probeconf distribution specific Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 24/26] testimage/oeqa: Drop testimage_dump_host functionality Steve Sakoman
2023-07-14 22:32 ` [OE-core][mickledore 25/26] selftest: multiconfig-image-packager: try to respect IMAGE_LINK_NAME Steve Sakoman
2023-07-14 22:33 ` [OE-core][mickledore 26/26] image-artifact-names: include ${IMAGE_NAME_SUFFIX} directly in both ${IMAGE_NAME} and ${IMAGE_LINK_NAME} Steve Sakoman
2023-07-17 8:38 ` Martin Jansa
2023-07-17 9:23 ` Richard Purdie
2023-07-17 14:26 ` Steve Sakoman
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=fc40ac8b47f12ed9540e7489fe757b81f103eed5.camel@linuxfoundation.org \
--to=richard.purdie@linuxfoundation.org \
--cc=Yogita.Urade@windriver.com \
--cc=kai.kang@windriver.com \
--cc=openembedded-core@lists.openembedded.org \
--cc=randy.macleod@windriver.com \
--cc=steve@sakoman.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox