Skip to content
This repository has been archived by the owner on May 9, 2022. It is now read-only.

/var/tmp/system-upgrade temporary directory creation vulnerability #44

Closed
ghost opened this issue Feb 20, 2014 · 4 comments
Closed

/var/tmp/system-upgrade temporary directory creation vulnerability #44

ghost opened this issue Feb 20, 2014 · 4 comments
Labels
Milestone

Comments

@ghost
Copy link

ghost commented Feb 20, 2014

Michael Scherer of Red Hat reports:
While trying to upgrade my F19 to F20 using fedup, I noticed that it use
a directory in /var/tmp/, with a fixed known name.
cachedir = '/var/tmp/fedora-upgrade'

One note, in fedup 0.8.0 (F20) the directory is now /var/tmp/system-upgrade
As per https://bugzilla.redhat.com/show_bug.cgi?id=1066679

Suggest you use Python mkdtemp():

http://kurt.seifried.org/2012/03/14/creating-temporary-files-securely/

Thanks.

@wgwoods
Copy link
Contributor

wgwoods commented Feb 20, 2014

It's actually a download cache; everything that is downloaded there is verified - either by downloading via https (metadata) or checking GPG signatures (RPMs, boot images).

But, sure, I'll move it to /var/cache, which will "fix" this "vulnerability", I guess.

@wgwoods wgwoods changed the title edup: /var/tmp/system-upgrade temporary directory creation vulnerability /var/tmp/system-upgrade temporary directory creation vulnerability May 15, 2014
@wgwoods wgwoods added this to the 0.9.0 milestone May 15, 2014
@wgwoods wgwoods added the bug label May 15, 2014
@ghost
Copy link
Author

ghost commented Oct 15, 2014

So this would allow an attacker to prevent updates from happening, allowing them to then exploit a known vuln after it should have been fixed ("upgrade freeze attack").

@wgwoods
Copy link
Contributor

wgwoods commented Oct 17, 2014

I'm sorry - what would do that?

Are you saying there's still a problem, or are you describing the previous bug, or have I introduced a new problem?

@ghost
Copy link
Author

ghost commented Oct 18, 2014

My point was this issue would allow a local user to prevent the system from being updated, hence why this issue is worth fixing (from a security perspective).

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

No branches or pull requests

1 participant