Bug 935119 (CVE-2015-4625) - VUL-1: CVE-2015-4625: polkit: cookie generation wrapping with 32bit counter
Summary: VUL-1: CVE-2015-4625: polkit: cookie generation wrapping with 32bit counter
Status: RESOLVED FIXED
Alias: CVE-2015-4625
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Minor
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/117796/
Whiteboard: CVSSv2:RedHat:CVE-2015-4625:1.0:(AV:L...
Keywords:
Depends on:
Blocks:
 
Reported: 2015-06-17 15:02 UTC by Marcus Meissner
Modified: 2016-04-27 19:40 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2015-06-17 15:02:05 UTC
CVE-2015-4625

original posting:
http://seclists.org/oss-sec/2015/q2/659

From: Colin Walters <walters () verbum org>
Date: Mon, 08 Jun 2015 08:24:50 -0400

See:

http://lists.freedesktop.org/archives/polkit-devel/2015-May/000419.html
And because mailman breaks threading across months:
http://lists.freedesktop.org/archives/polkit-devel/2015-June/000425.html

followup:

Your message seems to be about various security analysis posted to a
mailing-list thread with about 10 messages, accompanied by at least
two bug reports:

  https://bugs.freedesktop.org/show_bug.cgi?id=90837
  https://bugs.freedesktop.org/show_bug.cgi?id=90832

with a total of about 15 comments. In this situation, we're not sure
that there's any practical way for us to distill that into a consensus
statement of what the CVE or CVEs would be for.

The original 2015-05-29 message seems to be about clients whereas the
first 2015-06-03 message seems to be about users or uids. Is there any
polkit documentation that suggests that two clients are allowed to
interfere with each other as long as they have the same uid? (This is
in the general case where at least one of the two clients is executing
with substantial restrictions.)

For purposes of CVE, we may be able to model this as a situation in
which the (realistically exploitable) counter wraparound is a clear
implementation error and can have a CVE ID, but the concept of uid
matching is a design change that is essentially outside the scope of
CVE. Would that be OK?

cve assignment:
http://seclists.org/oss-sec/2015/q2/736


          https://bugs.freedesktop.org/show_bug.cgi?id=90837
          https://bugs.freedesktop.org/show_bug.cgi?id=90832


This can have a single CVE ID, CVE-2015-4625.

    this
    approach passes through the uid of the caller from the setuid binary,
    ensuring that we only look up `AuthenticationAgent`s that were created
    by a matching uid.


With only this change, the original report of "another process can
generate 2^32 authentication sessions and just disconnect immediately.
The counter gets incremented but the cookies never get removed from
the list, until eventually counter wraps and a second cookie is
minted." would still be considered an implementation error, but it
could no longer be considered "exploitable" in the context of the
current polkit security model. In other words, because the two
concerns (90832 and 90837) are not independent vulnerabilities, there
should not be two CVE IDs.
Comment 1 Swamp Workflow Management 2015-06-17 22:00:37 UTC
bugbot adjusting priority
Comment 2 Marcus Meissner 2015-10-02 11:34:14 UTC
the way PolicyKit0 works is entirely different, so this should not affect the SLE11 PolicyKit.
Comment 4 Swamp Workflow Management 2015-10-14 08:10:33 UTC
openSUSE-SU-2015:1734-1: An update that fixes four vulnerabilities is now available.

Category: security (important)
Bug References: 933922,935119,939246,943816
CVE References: CVE-2015-3218,CVE-2015-3255,CVE-2015-3256,CVE-2015-4625
Sources used:
openSUSE 13.2 (src):    polkit-0.113-3.8.1
openSUSE 13.1 (src):    polkit-0.113-9.1
Comment 6 Swamp Workflow Management 2015-10-28 11:10:56 UTC
SUSE-SU-2015:1838-1: An update that solves four vulnerabilities and has two fixes is now available.

Category: security (moderate)
Bug References: 912889,933922,935119,939246,943816,950114
CVE References: CVE-2015-3218,CVE-2015-3255,CVE-2015-3256,CVE-2015-4625
Sources used:
SUSE Linux Enterprise Workstation Extension 12 (src):    polkit-0.113-4.1
SUSE Linux Enterprise Software Development Kit 12 (src):    polkit-0.113-4.1
SUSE Linux Enterprise Server 12 (src):    polkit-0.113-4.1
SUSE Linux Enterprise Desktop 12 (src):    polkit-0.113-4.1
Comment 7 Swamp Workflow Management 2015-11-06 17:11:39 UTC
openSUSE-SU-2015:1927-1: An update that solves four vulnerabilities and has two fixes is now available.

Category: security (moderate)
Bug References: 912889,933922,935119,939246,943816,950114
CVE References: CVE-2015-3218,CVE-2015-3255,CVE-2015-3256,CVE-2015-4625
Sources used:
openSUSE Leap 42.1 (src):    polkit-0.113-6.1
Comment 8 Marcus Meissner 2015-11-27 10:09:27 UTC
released