Bug 30758 - schroot new security issue CVE-2022-2787
Summary: schroot new security issue CVE-2022-2787
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 8
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA8-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2022-08-19 17:30 CEST by David Walser
Modified: 2022-09-16 21:41 CEST (History)
4 users (show)

See Also:
Source RPM: schroot-1.7.2-18.mga8.src.rpm
CVE: CVE-2022-2787
Status comment:


Attachments

Description David Walser 2022-08-19 17:30:30 CEST
Debian has issued an advisory on August 18:
https://www.debian.org/security/2022/dsa-5213

Mageia 8 is also affected.
David Walser 2022-08-19 17:30:37 CEST

Whiteboard: (none) => MGA8TOO

Comment 1 Lewis Smith 2022-08-24 11:17:26 CEST
Various people update this SRPM, so assigning this bug globally.

Assignee: bugsquad => pkg-bugs

Comment 2 Nicolas Salguero 2022-08-29 13:24:58 CEST
Suggested advisory:
========================

The updated packages fix a security vulnerability:

Schroot before 1.6.13 had too permissive rules on chroot or session names, allowing a denial of service on the schroot service for all users that may start a schroot session. (CVE-2022-2787)

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2787
https://www.debian.org/security/2022/dsa-5213
========================

Updated packages in core/updates_testing:
========================
dchroot-1.7.2-18.1.mga8
lib(64)sbuild1.7.2-1.7.2-18.1.mga8
lib(64)sbuild-devel-1.7.2-18.1.mga8
schroot-1.7.2-18.1.mga8

from SRPM:
schroot-1.7.2-18.1.mga8.src.rpm

Version: Cauldron => 8
CVE: (none) => CVE-2022-2787
CC: (none) => nicolas.salguero
Status: NEW => ASSIGNED
Assignee: pkg-bugs => qa-bugs
Source RPM: schroot-1.7.2-23.mga9.src.rpm => schroot-1.7.2-18.mga8.src.rpm
Whiteboard: MGA8TOO => (none)

Comment 3 Thomas Andrews 2022-09-13 03:50:51 CEST
Installed schroot and dependencies, then updated using qarepo. No installation issues.

This is completely unknown territory for me, but fortunately there are those who have been here before and blazed a trail to follow. For testing, I used copy-and-paste to apply the procedure outlined in https://bugs.mageia.org/show_bug.cgi?id=10166#c6 (Thank you, Claire!)

The test was successful, so I'm giving this an OK, and validating. Advisory in Comment 2.

Whiteboard: (none) => MGA8-64-OK
CC: (none) => andrewsfarm, sysadmin-bugs
Keywords: (none) => validated_update

Dave Hodgins 2022-09-16 19:54:17 CEST

CC: (none) => davidwhodgins
Keywords: (none) => advisory

Comment 4 Mageia Robot 2022-09-16 21:41:33 CEST
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2022-0329.html

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.