Bug 906803 (CVE-2013-6435) - VUL-1: CVE-2013-6435: rpm: Skipping rpm verification race
Summary: VUL-1: CVE-2013-6435: rpm: Skipping rpm verification race
Status: RESOLVED FIXED
Alias: CVE-2013-6435
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Deadline: 2014-12-12
Assignee: Michael Schröder
QA Contact: Security Team bot
URL:
Whiteboard: maint:released:sle11-sp3:60027 maint:...
Keywords:
Depends on:
Blocks:
 
Reported: 2014-11-24 10:56 UTC by Johannes Segitz
Modified: 2015-04-09 12:21 UTC (History)
3 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Johannes Segitz 2014-11-24 10:56:45 UTC
CRD: 2014-12-02, no CVE right now

Description of the issue:

RPM writes file contents to the target installation directory under a temporary name, and verifies its cryptographic signature only after the temporary file has been written completely. Under
certain conditions, the system interprets the unverified temporary file contents and extracts commands from it. This could allow an attacker to modify signed RPM files in such a way that they
execute code chosen by the attacker during package installation.

Details:
When a system administrator attempts to install the attached RPM file  (either with "rpm -i" or "yum install"), there is a non-zero probability that the file "/tmp/exploited" is created
because the system executes code which did not pass signature verification.

This exploits works by creating a large file in /etc/cron.d, which is then parsed by crond while it is still being written by rpm (with some probability, i.e., there is a race). rpm will
eventually remove the file, but if crond has already started reading it, that is too late.

Acknowledgements:
This issue was discovered by Florian Weimer of the Red Hat Product Security Team.
Comment 1 Johannes Segitz 2014-11-24 10:58:45 UTC
Created attachment 614700 [details]
Patch against rpm 4.11.1
Comment 3 Swamp Workflow Management 2014-11-24 23:00:26 UTC
bugbot adjusting priority
Comment 5 Swamp Workflow Management 2014-12-05 12:21:07 UTC
An update workflow for this issue was started.
This issue was rated as important.
Please submit fixed packages until 2014-12-12.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/59965
Comment 6 Johannes Segitz 2014-12-09 14:30:33 UTC
public
Comment 9 Michael Schröder 2014-12-11 13:06:37 UTC
Why would it be reasonable? The blob post is incorrect, there are two signatures: one over the header and one over the header and the payload.

(And the repository metadata contains a checksum over the complete file)
Comment 12 Swamp Workflow Management 2014-12-24 07:05:21 UTC
SUSE-SU-2014:1697-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (important)
Bug References: 892431,906803,908128
CVE References: CVE-2013-6435,CVE-2014-8118
Sources used:
SUSE Linux Enterprise Software Development Kit 11 SP3 (src):    rpm-4.4.2.3-37.60.2
SUSE Linux Enterprise Server 11 SP3 for VMware (src):    rpm-4.4.2.3-37.60.2
SUSE Linux Enterprise Server 11 SP3 (src):    rpm-4.4.2.3-37.60.2
SUSE Linux Enterprise Desktop 11 SP3 (src):    rpm-4.4.2.3-37.60.2
Comment 13 Swamp Workflow Management 2014-12-27 21:05:11 UTC
openSUSE-SU-2014:1716-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 892431,906803,908128
CVE References: CVE-2013-6435,CVE-2014-8118
Sources used:
openSUSE 13.2 (src):    python3-rpm-4.11.3-4.2, rpm-4.11.3-4.1, rpm-python-4.11.3-4.2
openSUSE 13.1 (src):    python3-rpm-4.11.1-6.9.1, rpm-4.11.1-6.9.1, rpm-python-4.11.1-6.9.1
openSUSE 12.3 (src):    python3-rpm-4.10.2-2.4.1, rpm-4.10.2-2.4.1, rpm-python-4.10.2-2.4.1
Comment 14 Leonardo Chiquitto 2015-01-07 16:48:41 UTC
Could this be the culprit of the broken installer (11-SP4)? Please see bsc#911228.
Comment 15 Michael Schröder 2015-01-07 16:55:22 UTC
As nobody knows why the installation fails I can't tell.
Comment 16 Swamp Workflow Management 2015-01-22 17:05:19 UTC
SUSE-SU-2015:0107-1: An update that solves two vulnerabilities and has two fixes is now available.

Category: security (important)
Bug References: 892431,906803,908128,911228
CVE References: CVE-2013-6435,CVE-2014-8118
Sources used:
SUSE Linux Enterprise Software Development Kit 12 (src):    rpm-4.11.2-10.1
SUSE Linux Enterprise Server 12 (src):    rpm-4.11.2-10.1, rpm-python-4.11.2-10.1
SUSE Linux Enterprise Desktop 12 (src):    rpm-4.11.2-10.1, rpm-python-4.11.2-10.1
Comment 17 Johannes Segitz 2015-04-09 12:21:51 UTC
all updates released