add CVE-2026-31433 to security.toml#3454
Conversation
… moment Co-authored-by: Alexandre Aubin <4533074+alexAubin@users.noreply.github.com>
| fixed_in_version.bookworm = "6.1.999" # FIXME : to be updated once we know the actual version number | ||
| fixed_in_version.trixie = "6.12.999" # FIXME : to be updated once we know the actual version number |
There was a problem hiding this comment.
| fixed_in_version.bookworm = "6.1.999" # FIXME : to be updated once we know the actual version number | |
| fixed_in_version.trixie = "6.12.999" # FIXME : to be updated once we know the actual version number | |
| fixed_in_version.bookworm = "6.1.170-1" | |
| fixed_in_version.trixie = "6.12.85-1" |
|
@alexAubin I might be misreading the code, but if I understand correctly, the system package we match here is simply |
|
@tituspijean Yes, good point. I had taken the name from https://security-tracker.debian.org/tracker/CVE-2026-31431 where the package is called as such. But it actually links to https://tracker.debian.org/pkg/linux which includes a long list of binaries. The closest match I can find with Also I believe the arch name here will be specific to the machine's arch. |
|
hmm but Yunohost system upgrade also offers a lib upgrade with same version than kernel: Maybe it should be added as well?
|
|
pushed a commit based on arch names for this package available there: https://packages.debian.org/search?suite=default&arch=armhf&searchon=names&keywords=linux-image- |
|
The plot thickens ... on an RPi I don't have any of the debian kernel packages but I do have I do have the |
Hmm can't find track of this in debian packages https://packages.debian.org/search?suite=default§ion=all&arch=any&searchon=names&keywords=rpiv6 Have you already been offered an upgrade with the patch for this arch?
amd64 YNH 12.x shows: |
|
Then I would suggest to patch the code that looks for the package version: iif the package is Example on my server: Additionally, downloading the |
Is that a scripting suggestion (i.e. changing https://github.com/YunoHost/yunohost/blob/57020f46441556a246affb72aa6b9effb71e382d/src/diagnosers/00-basesystem.py probably) or just finding people using the 4 arch and get the value to update manually this PR ?
Yes I guess this is an evolution required in the security.toml structure: add a "comment" field (to allow adding instructions), or a "action" field (bash command that would open a confirmation popup and be run by the system, but maybe too instrusive). |
|
We also need to keep in mind that there are many cases. For instance in case of lxc we need to check the kernel version on the host. And the host could have a different Debian version or also an other Debian distribution. Also we can have a case when the workaround was applied without upgradings the kernel. So to me at last for this CVE the easiest and the strongest way to check is by running a script.
Seem to me a good idea. |
uuuh but I would expect |
Yes it's true but depending of the distribution of the host it might be complicated to know if the versions has been patched or not I'm my option because it could be any Linux distribution so having an exhaustive list of patched version is probably really complicated. |
No description provided.