Re: CVE's and older versions of software

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2022-02-16 at 22:50 -0500, Demi Marie Obenour wrote:
> On 2/16/22 18:05, Adam Williamson wrote:
> > On Wed, 2022-02-16 at 14:20 -0500, Steven A. Falco wrote:
> > > On 2/16/22 01:58 PM, Dan Horák wrote:
> > > > On Wed, 16 Feb 2022 13:53:04 -0500
> > > > "Steven A. Falco" <stevenfalco@xxxxxxxxx> wrote:
> > > > 
> > > > > There are some CVE's against KiCad that have been fixed in
> > > > > the latest version, namely KiCad 6.0.2.  I've built that for
> > > > > F36 and Rawhide.
> > > > > 
> > > > > I have not released KiCad 6.0.2 into Fedora 34 and 35,
> > > > > because my understanding is that by policy, we don't
> > > > > generally allow "major version" updates in stable Fedora
> > > > > releases.  Thus F34 and F35 still ship KiCad 5.1.12, which is
> > > > > affected by the CVE's.
> > > > > 
> > > > > I could easily build KiCad 6.0.2 for F34 / F35 - in fact, I
> > > > > have done so in the KiCad Copr repository.
> > > > > 
> > > > > So, should this situation be an exception to the policy of
> > > > > "no major version changes in a stable release"?
> > > > 
> > > > as often, it depends :-)
> > > > 
> > > > - what's the severity level of the CVEs?
> > > > - does KiCad 6 come with substantial changes like UI redesign,
> > > > compatibility issues with previous release, etc?
> > > 
> > > The vulnerability is rated as "7.8 -
> > > CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", whatever that
> > > means. :-)
> > > 
> > > Basically, attempting to read a malicious file can cause a buffer
> > > overflow, and then execute malicious code.
> > > 
> > > KiCad is not suid, so the risk would be to an individual user
> > > rather than the whole system.
> 
> As shown in https://xkcd.com/1200/, this is not a mitigation in
> practice, because most Linux systems are single-user, which means
> that
> a user compromise is effectively equivalent to root compromise
> 
> > > KiCad 6 does have UI changes and files it creates cannot be read
> > > by KiCad 5 or earlier.
> > > 
> > > I contacted upstream, and I know what patches form a part of the
> > > solution, but they don't apply cleanly to KiCad 5.  I might be
> > > able to sort them out...
> > 
> > The 'ideal' solution is to backport the security fix, yes. If
> > you're
> > not able to do this, or find anyone else who can do it for you, I
> > guess
> > it kinda becomes a judgment call whether fixing the security issue
> > is
> > "worth" the compatibility problems. I don't think we have a
> > definite
> > guide/policy to what to do if the optimal solution isn't practical,
> > here?
> 
> Security researcher here.  My view is that there are some packages
> for
> which the release cycle needs to be that of upstream, even if Fedora
> has a different one.  Browser engines and the Linux kernel certainly
> fall into that category, and complex desktop software such as KiCad
> might as well.  I would rather take the compatibility breakage a bit
> early than have an insecure system.
> 
Fedora Linux user here +1 on these comments by Demi

Stephen Snow
> _______________________________________________
> devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
> To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
> Fedora Code of Conduct:
> https://docs.fedoraproject.org/en-US/project/code-of-conduct/
> List Guidelines:
> https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx
> Do not reply to spam on the list, report it:
> https://pagure.io/fedora-infrastructure
_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Users]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]

  Powered by Linux