Report forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>: Bug#1087697; Package initramfs-tools.
(Sun, 17 Nov 2024 12:09:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Matan Liber <matan@pentera.io>:
New Bug report received and forwarded. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Sun, 17 Nov 2024 12:09:02 GMT) (full text, mbox, link).
Package: initramfs-tools
Version: 0.136ubuntu6.7
vulnerability identified in mkinitramfs that could lead to a Denial of
Service (DoS) condition on affected systems. Using mkinitramfs with
the environment variable LD_LIBRARY_PATH causes machines to fail boot
due to missing libraries in the initramfs images. A full report is
attached.
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>: Bug#1087697; Package initramfs-tools.
(Sun, 17 Nov 2024 19:33:01 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Sun, 17 Nov 2024 19:33:01 GMT) (full text, mbox, link).
To: Matan Liber <matan@pentera.io>, 1087697@bugs.debian.org
Cc: submit@bugs.debian.org
Subject: Re: Bug#1087697: Mkinitramfs causes machines to fail booting when
used with LD_LIBRARY_PATH
Date: Sun, 17 Nov 2024 20:29:49 +0100
Control: notfound -1 0.136ubuntu6.7
Control: found -1 0.145
FWIW, this is similar to what was handled in #944929 fixed with commit
e2ad67899850 ("hook-functions: preloaded libraries should not end up
in the initramfs").
Regards,
Salvatore
No longer marked as found in versions 0.136ubuntu6.7.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to submit@bugs.debian.org.
(Sun, 17 Nov 2024 19:33:01 GMT) (full text, mbox, link).
Marked as found in versions initramfs-tools/0.145.
Request was from Salvatore Bonaccorso <carnil@debian.org>
to submit@bugs.debian.org.
(Sun, 17 Nov 2024 19:33:02 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>: Bug#1087697; Package initramfs-tools.
(Sun, 17 Nov 2024 19:33:02 GMT) (full text, mbox, link).
Acknowledgement sent
to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Sun, 17 Nov 2024 19:33:02 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Debian kernel team <debian-kernel@lists.debian.org>: Bug#1087697; Package initramfs-tools.
(Sun, 24 Nov 2024 20:51:01 GMT) (full text, mbox, link).
Acknowledgement sent
to Ben Hutchings <ben@decadent.org.uk>:
Extra info received and forwarded to list. Copy sent to Debian kernel team <debian-kernel@lists.debian.org>.
(Sun, 24 Nov 2024 20:51:01 GMT) (full text, mbox, link).
On Sun, 17 Nov 2024 14:04:54 +0200 Matan Liber <matan@pentera.io>
wrote:
> Package: initramfs-tools
> Version: 0.136ubuntu6.7
>
> vulnerability identified in mkinitramfs that could lead to a Denial
of
> Service (DoS) condition on affected systems. Using mkinitramfs with
> the environment variable LD_LIBRARY_PATH causes machines to fail boot
> due to missing libraries in the initramfs images. A full report is
> attached.
This isn't a security vulnerability. If an attacker can control
LD_LIBRARY_PATH for a user session then they can already cause
arbitrary code to be run as that user.
I may address this as an issue of robustness, but it's not going to
have a high priority.
Ben.
--
Ben Hutchings
Any smoothly functioning technology is indistinguishable
from a rigged demo.
Debbugs is free software and licensed under the terms of the GNU General
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.