All of lore.kernel.org
 help / color / mirror / Atom feed
* [OE-core] cups: whitelist CVE-2018-6553
@ 2020-11-18 15:25 Steve Sakoman
  2020-11-18 23:56 ` Anuj Mittal
  0 siblings, 1 reply; 4+ messages in thread
From: Steve Sakoman @ 2020-11-18 15:25 UTC (permalink / raw)
  To: openembedded-core

This an Ububtu specific issue:

The CUPS AppArmor profile incorrectly confined the dnssd backend
due to use of hard links. A local attacker could possibly use this
issue to escape confinement. This flaw affects versions prior to
2.2.7-1ubuntu2.1 in Ubuntu 18.04 LTS, prior to 2.2.4-7ubuntu3.1
in Ubuntu 17.10, prior to 2.1.3-4ubuntu0.5 in Ubuntu 16.04 LTS,
 and prior to 1.7.2-0ubuntu1.10 in Ubuntu 14.04 LTS

Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
 meta/recipes-extended/cups/cups.inc | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/meta/recipes-extended/cups/cups.inc b/meta/recipes-extended/cups/cups.inc
index 87870e4aba..df8d4d284a 100644
--- a/meta/recipes-extended/cups/cups.inc
+++ b/meta/recipes-extended/cups/cups.inc
@@ -20,6 +20,9 @@ SRC_URI = "https://github.com/apple/cups/releases/download/v${PV}/${BP}-source.t
 UPSTREAM_CHECK_URI = "https://github.com/apple/cups/releases"
 UPSTREAM_CHECK_REGEX = "cups-(?P<pver>\d+\.\d+(\.\d+)?)-source.tar"
 
+# This is an Ubuntu only issue.
+CVE_CHECK_WHITELIST += "CVE-2018-6553"
+
 LEAD_SONAME = "libcupsdriver.so"
 
 CLEANBROKEN = "1"
-- 
2.17.1


^ permalink raw reply related	[flat|nested] 4+ messages in thread

* Re: [OE-core] cups: whitelist CVE-2018-6553
  2020-11-18 15:25 [OE-core] cups: whitelist CVE-2018-6553 Steve Sakoman
@ 2020-11-18 23:56 ` Anuj Mittal
  2020-11-19  0:12   ` Steve Sakoman
  0 siblings, 1 reply; 4+ messages in thread
From: Anuj Mittal @ 2020-11-18 23:56 UTC (permalink / raw)
  To: openembedded-core, steve

On Wed, 2020-11-18 at 05:25 -1000, Steve Sakoman wrote:
> This an Ububtu specific issue:
> 
> The CUPS AppArmor profile incorrectly confined the dnssd backend
> due to use of hard links. A local attacker could possibly use this
> issue to escape confinement. This flaw affects versions prior to
> 2.2.7-1ubuntu2.1 in Ubuntu 18.04 LTS, prior to 2.2.4-7ubuntu3.1
> in Ubuntu 17.10, prior to 2.1.3-4ubuntu0.5 in Ubuntu 16.04 LTS,
>  and prior to 1.7.2-0ubuntu1.10 in Ubuntu 14.04 LTS

It doesn't affect the default configuration but someone in theory could
have extended the recipe to have AppArmor support and then it might be
vulnerable?

Since this CVE is sort of distro specific and not package specific,
should this be part of recipe or the poky distro meta data?

Thanks,

Anuj

> 
> Signed-off-by: Steve Sakoman <steve@sakoman.com>
> ---
>  meta/recipes-extended/cups/cups.inc | 3 +++
>  1 file changed, 3 insertions(+)
> 
> diff --git a/meta/recipes-extended/cups/cups.inc b/meta/recipes-
> extended/cups/cups.inc
> index 87870e4aba..df8d4d284a 100644
> --- a/meta/recipes-extended/cups/cups.inc
> +++ b/meta/recipes-extended/cups/cups.inc
> @@ -20,6 +20,9 @@ SRC_URI = "
> https://github.com/apple/cups/releases/download/v${PV}/${BP}-source.t
>  UPSTREAM_CHECK_URI = "https://github.com/apple/cups/releases"
>  UPSTREAM_CHECK_REGEX = "cups-(?P<pver>\d+\.\d+(\.\d+)?)-source.tar"
>  
> +# This is an Ubuntu only issue.
> +CVE_CHECK_WHITELIST += "CVE-2018-6553"
> +
>  LEAD_SONAME = "libcupsdriver.so"
>  
>  CLEANBROKEN = "1"
> 
> 
> 


^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [OE-core] cups: whitelist CVE-2018-6553
  2020-11-18 23:56 ` Anuj Mittal
@ 2020-11-19  0:12   ` Steve Sakoman
  2020-11-19  8:46     ` Mikko Rapeli
  0 siblings, 1 reply; 4+ messages in thread
From: Steve Sakoman @ 2020-11-19  0:12 UTC (permalink / raw)
  To: Mittal, Anuj; +Cc: openembedded-core

On Wed, Nov 18, 2020 at 1:56 PM Mittal, Anuj <anuj.mittal@intel.com> wrote:
>
> On Wed, 2020-11-18 at 05:25 -1000, Steve Sakoman wrote:
> > This an Ububtu specific issue:
> >
> > The CUPS AppArmor profile incorrectly confined the dnssd backend
> > due to use of hard links. A local attacker could possibly use this
> > issue to escape confinement. This flaw affects versions prior to
> > 2.2.7-1ubuntu2.1 in Ubuntu 18.04 LTS, prior to 2.2.4-7ubuntu3.1
> > in Ubuntu 17.10, prior to 2.1.3-4ubuntu0.5 in Ubuntu 16.04 LTS,
> >  and prior to 1.7.2-0ubuntu1.10 in Ubuntu 14.04 LTS
>
> It doesn't affect the default configuration but someone in theory could
> have extended the recipe to have AppArmor support and then it might be
> vulnerable?

I suppose if someone implemented AppArmor support and botched it in the
same way as it was in Ubuntu, then yes they would have the same vulnerability!

> Since this CVE is sort of distro specific and not package specific,
> should this be part of recipe or the poky distro meta data?

I'm open for suggestions.  There are many ways people can take our
standard recipes and implement a horribly insecure image. IMHO
this is one of the more unlikely paths that someone would take :-)

But if the community feels this is best in the poky distro metadata I have no
issue with that.

Steve
>
> Thanks,
>
> Anuj
>
> >
> > Signed-off-by: Steve Sakoman <steve@sakoman.com>
> > ---
> >  meta/recipes-extended/cups/cups.inc | 3 +++
> >  1 file changed, 3 insertions(+)
> >
> > diff --git a/meta/recipes-extended/cups/cups.inc b/meta/recipes-
> > extended/cups/cups.inc
> > index 87870e4aba..df8d4d284a 100644
> > --- a/meta/recipes-extended/cups/cups.inc
> > +++ b/meta/recipes-extended/cups/cups.inc
> > @@ -20,6 +20,9 @@ SRC_URI = "
> > https://github.com/apple/cups/releases/download/v${PV}/${BP}-source.t
> >  UPSTREAM_CHECK_URI = "https://github.com/apple/cups/releases"
> >  UPSTREAM_CHECK_REGEX = "cups-(?P<pver>\d+\.\d+(\.\d+)?)-source.tar"
> >
> > +# This is an Ubuntu only issue.
> > +CVE_CHECK_WHITELIST += "CVE-2018-6553"
> > +
> >  LEAD_SONAME = "libcupsdriver.so"
> >
> >  CLEANBROKEN = "1"
> >
> > 
> >
>

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [OE-core] cups: whitelist CVE-2018-6553
  2020-11-19  0:12   ` Steve Sakoman
@ 2020-11-19  8:46     ` Mikko Rapeli
  0 siblings, 0 replies; 4+ messages in thread
From: Mikko Rapeli @ 2020-11-19  8:46 UTC (permalink / raw)
  To: steve; +Cc: anuj.mittal, openembedded-core

On Wed, Nov 18, 2020 at 02:12:18PM -1000, Steve Sakoman wrote:
> On Wed, Nov 18, 2020 at 1:56 PM Mittal, Anuj <anuj.mittal@intel.com> wrote:
> >
> > On Wed, 2020-11-18 at 05:25 -1000, Steve Sakoman wrote:
> > > This an Ububtu specific issue:
> > >
> > > The CUPS AppArmor profile incorrectly confined the dnssd backend
> > > due to use of hard links. A local attacker could possibly use this
> > > issue to escape confinement. This flaw affects versions prior to
> > > 2.2.7-1ubuntu2.1 in Ubuntu 18.04 LTS, prior to 2.2.4-7ubuntu3.1
> > > in Ubuntu 17.10, prior to 2.1.3-4ubuntu0.5 in Ubuntu 16.04 LTS,
> > >  and prior to 1.7.2-0ubuntu1.10 in Ubuntu 14.04 LTS
> >
> > It doesn't affect the default configuration but someone in theory could
> > have extended the recipe to have AppArmor support and then it might be
> > vulnerable?
> 
> I suppose if someone implemented AppArmor support and botched it in the
> same way as it was in Ubuntu, then yes they would have the same vulnerability!
> 
> > Since this CVE is sort of distro specific and not package specific,
> > should this be part of recipe or the poky distro meta data?
> 
> I'm open for suggestions.  There are many ways people can take our
> standard recipes and implement a horribly insecure image. IMHO
> this is one of the more unlikely paths that someone would take :-)
> 
> But if the community feels this is best in the poky distro metadata I have no
> issue with that.

I'd keep this CVE whitelist in cups recipe. CVEs details apply to an unmodified
poky version of the recipe. bbappends and other layers can do really weird things
including removing patches and downgrading SW versions which would also result
in bad CVE data overall but we can't possibly detect those cases inside the
recipe in poky or even distro configuration. Only way to be sure, is to review all
bbappends to recipes from all layers in product configurations. Devil is in
the details.

Cheers,

-Mikko

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2020-11-19  8:46 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-11-18 15:25 [OE-core] cups: whitelist CVE-2018-6553 Steve Sakoman
2020-11-18 23:56 ` Anuj Mittal
2020-11-19  0:12   ` Steve Sakoman
2020-11-19  8:46     ` Mikko Rapeli

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.