Thanks for confirming.

Regards,
Soumya
________________________________
From: Vijay Anusuri <vanus...@mvista.com>
Sent: Tuesday, May 28, 2024 2:54 PM
To: Sambu, Soumya <soumya.sa...@windriver.com>
Cc: Marko, Peter <peter.ma...@siemens.com>; 
openembedded-core@lists.openembedded.org 
<openembedded-core@lists.openembedded.org>
Subject: Re: [OE-core][kirkstone][PATCH 1/1] util-linux: Fix CVE-2024-28085

CAUTION: This email comes from a non Wind River email account!
Do not click links or open attachments unless you recognize the sender and know 
the content is safe.
Hi Soumya,

Along with Debian, Suse also fixed the issue with those 4 dependent commits 
(https://bugzilla.suse.com/show_bug.cgi?id=1221831<https://urldefense.com/v3/__https://bugzilla.suse.com/show_bug.cgi?id=1221831__;!!AjveYdw8EvQ!cyCp4NgpbtgGBXs0V0Uc_ftkkCZ0pXkGBv7cZUX5W1b5fc3fwV5YiW9NC1NTgPsPW9XhRe-iBzfQtt9s1wA39lw$>).

Debian added the "--disable-use-tty-group" configure option during build along 
with patch for complete fix 
(https://launchpad.net/ubuntu/+source/util-linux/2.37.2-4ubuntu3.4<https://urldefense.com/v3/__https://launchpad.net/ubuntu/*source/util-linux/2.37.2-4ubuntu3.4__;Kw!!AjveYdw8EvQ!cyCp4NgpbtgGBXs0V0Uc_ftkkCZ0pXkGBv7cZUX5W1b5fc3fwV5YiW9NC1NTgPsPW9XhRe-iBzfQtt9sb_OVOXc$>).
 We already have that configure option in the recipe file.

I think we can go ahead with the debian patch fix.

Thanks & Regards,
Vijay

On Thu, Apr 25, 2024 at 8:56 AM Sambu, Soumya 
<soumya.sa...@windriver.com<mailto:soumya.sa...@windriver.com>> wrote:
Hi Peter,

Thank you for providing the details.

Based on the information regarding the vulnerability report and the commit 
history provided, it appears that our code is indeed vulnerable as the commit 
introducing the vulnerability still exists in our codebase.

Our util-linux version in the kirkstone branch is v2.37.4, and the vulnerable 
code was introduced in commit cdd3cc7fa4 back in 2013.

I've also noted that Debian is also fixing the CVE, along with the dependent 
commits mentioned in the offending commits list. They have already added 
upstream patches to address CVE-2024-28085 (839ff33b), as detailed in their 
commit here:  
https://salsa.debian.org/debian/util-linux/-/commit/839ff33b8002189411b679cc9ee99d1a99e099cb<https://urldefense.com/v3/__https://salsa.debian.org/debian/util-linux/-/commit/839ff33b8002189411b679cc9ee99d1a99e099cb__;!!AjveYdw8EvQ!cyCp4NgpbtgGBXs0V0Uc_ftkkCZ0pXkGBv7cZUX5W1b5fc3fwV5YiW9NC1NTgPsPW9XhRe-iBzfQtt9sw21x4gc$>.

Please review the provided information, and let me know if there's anything 
else we need to consider.

Best Regards,
Soumya
________________________________
From: Marko, Peter <peter.ma...@siemens.com<mailto:peter.ma...@siemens.com>>
Sent: Friday, April 19, 2024 10:11 PM
To: Sambu, Soumya 
<soumya.sa...@windriver.com<mailto:soumya.sa...@windriver.com>>; 
openembedded-core@lists.openembedded.org<mailto:openembedded-core@lists.openembedded.org>
 
<openembedded-core@lists.openembedded.org<mailto:openembedded-core@lists.openembedded.org>>;
 vanus...@mvista.com<mailto:vanus...@mvista.com> 
<vanus...@mvista.com<mailto:vanus...@mvista.com>>
Subject: RE: [OE-core][kirkstone][PATCH 1/1] util-linux: Fix CVE-2024-28085

CAUTION: This email comes from a non Wind River email account!
Do not click links or open attachments unless you recognize the sender and know 
the content is safe.

Identical patch was already submitted and then requested to be ignored because 
the issue is apparently introduced by one of the added patches.
https://lists.openembedded.org/g/openembedded-core/message/197670<https://urldefense.com/v3/__https://lists.openembedded.org/g/openembedded-core/message/197670__;!!AjveYdw8EvQ!cyCp4NgpbtgGBXs0V0Uc_ftkkCZ0pXkGBv7cZUX5W1b5fc3fwV5YiW9NC1NTgPsPW9XhRe-iBzfQtt9sRV9fOHI$>

Since the vulnerability report claims that our version IS vulnerable, it would 
be interesting to know where the truth is...
https://github.com/skyler-ferrante/CVE-2024-28085<https://urldefense.com/v3/__https://github.com/skyler-ferrante/CVE-2024-28085__;!!AjveYdw8EvQ!cyCp4NgpbtgGBXs0V0Uc_ftkkCZ0pXkGBv7cZUX5W1b5fc3fwV5YiW9NC1NTgPsPW9XhRe-iBzfQtt9s_sqIAQs$>
 -> The vulnerable code was introduced in commit cdd3cc7fa4 (2013).

Peter
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#199965): 
https://lists.openembedded.org/g/openembedded-core/message/199965
Mute This Topic: https://lists.openembedded.org/mt/105617913/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to