Hi Matthias,

On Thu, Jan 04, 2024 at 10:44:30PM +0100, Salvatore Bonaccorso wrote:
> Hi Matthias,
> 
> On Thu, Jan 04, 2024 at 09:30:44PM +0100, Matthias Klumpp wrote:
> > Hi!
> > 
> > Am Do., 4. Jan. 2024 um 20:51 Uhr schrieb Salvatore Bonaccorso
> > <car...@debian.org>:
> > >
> > > Source: packagekit
> > > Version: 1.2.6-5
> > > Severity: important
> > > Tags: security upstream
> > > X-Debbugs-Cc: car...@debian.org, Debian Security Team 
> > > <t...@security.debian.org>
> > >
> > > Hi,
> > >
> > > The following vulnerability was published for packagekit.
> > >
> > > CVE-2024-0217[0]:
> > > | A use-after-free flaw was found in PackageKitd. In some conditions,
> > > | the order of cleanup mechanics for a transaction could be impacted.
> > > | As a result, some memory access could occur on memory regions that
> > > | were previously freed. Once freed, a memory region can be reused for
> > > | other allocations and any previously stored data in this memory
> > > | region is considered lost.
> > >
> > > The only reference know so far is [1] which say as well that the issue
> > > should be fixed in 1.2.7 upstream. Do you happen to know more on it?
> > 
> > This might be the worst CVE I've seen in a while... PackageKit has
> > backends, so at the very least this CVE should state whether this
> > affects a backend only (in which case we might even be fine if we
> > don't ship it) or the daemon core, or a library. Judging from how this
> > is worded, it's likely one of the latter, which would be worse.
> > On the bug report, it is stated that "It was observed that under some
> > conditions, the order of cleanup mechanics for a transaction could be
> > impacted.", but there are no details given what these circumstances
> > even are.
> > Furthermore, Philip Withnall did quite a bit of larger rework on
> > PackageKit's transaction logic for 1.2.7, so whatever the issue is it
> > might have been accidentally fixed in a larger commit of that series.
> > 
> > But tbh, this CVE is so vague that I have no idea where I'd even look
> > for this (unless I wanted to repeat the work that went into finding
> > this and create random transaction states while running with address
> > sanitizer on).
> > Let's hope the reporter replies to the request in RH bugzilla.
> 
> Thanks for the very quick reply! 
> 
> Ok let's see if the reporter in the Red Hat bugzilla replies to the
> 'needinfo' request. Will update the bug here in case I notice earlier
> than you.
> 
> I had  expected that packagekit upstream get some information as well
> from Red Hat, so you as well :-)
> 
> Thanks a lot for your work!

Got a reply from Pedro Sampaio in 
https://bugzilla.redhat.com/show_bug.cgi?id=2256624#c3

It is mentioned that although the following is not a direct fix for
the issue, that the commit in v1.2.7 to reduce the impact is the
following:

https://github.com/PackageKit/PackageKit/commit/64278c9127e3333342b56ead99556161f7e86f79

Does that help you with your upstream hat on, and downstream in
Debian?

Regards,
Salvatore

Reply via email to