Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20160614121430.54A8F6C0643@smtpvmsrv1.mitre.org>
Date: Tue, 14 Jun 2016 08:14:30 -0400 (EDT)
From: cve-assign@...re.org
To: tobias@...eckmann.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request for Denial of Service in pacman 5.0.1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> The package manager of Arch Linux, pacman, is vulnerable to a denial of
> service attack based on signature files. This issue is located in libalpm
> and therefore affects any other frontend
> 
> While an endless loop on itself is no security issue per-se

We assign CVE IDs to infinite loops in libraries, as long as a real or
plausible library-using application runs unattended, and presents an
attack surface in which the loop may be triggered by not-fully-trusted
input.

Use CVE-2016-5434 for this libalpm vulnerability.

(For example, someone may plausibly use libalpm as part of a web
application that receives packages with signatures from authors and,
after validity checks, hosts those packages for public download.)


> such a
> crafted file might trick the end-user to disable signature verification
> to get his updates installed. This, on the other hand, would open up
> possibilities for malicious packages to be installed.

Maybe, but this would not, by itself, be a reason to assign a CVE ID
unless the package manager suggested that course of action, e.g., a
dialog stating "A signature-verification process is running slowly.
Terminate that process and disable all future verification? [y/N]."
For example, if there were a signature-verification infinite loop that
only affected a GUI package manager, without that type of dialog, then
a CVE ID seems unlikely. First, it's unclear whether there are many
end users who have the expertise to determine that a loop is related
to signature verification, but also would jump to the conclusion that
disabling signature verification was a reasonable solution to their
immediate problem. More generally, any DoS bug in any package manager
might trick a non-expert end user into not bothering to install new
packages, and instead leaving old vulnerable packages installed
permanently. That is arguably a security impact, but it seems much too
indirect, so we don't want to assign CVE IDs to 100% of DoS bugs in
all package managers.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJXX/SSAAoJEHb/MwWLVhi2koIP/0JPOJFLF7Fs582+6wD8RvFD
PsTEcWc5X/80uL0yGREFI8Hvm1n7YBuINexgTWoEMfwHPoxvrwtUY2aNDrhAY77X
SnBobg5B4mrFDGZh0VcmU0vYhriwCx8KDTWF5AfVyQZ4mjmru2MBxF5KyQEQuBuY
SqhohAlc856KjO0vns17Kw284Eqs34iwQXIZ3nxSwBkJhfrokRaMunA3jGawdJku
BjQi8RK0TXir2wdyGA95ySIQP6Z5HlsaCjoUa+miuA8Fu7TITBCo31aKxEHfrIFn
F3zai0bxXz0jaly1TWz4uyAn2P7WL24V2rLlmFIH0z8+tzEKiIiaXjIlzz3JasKp
0yTI8uUSvUu61WIcBSQcAwRmTYTZ+Rz8IYVsbAS8pnWysXwySBReEnR/rkaKzLX+
qbREp2oMEoAiEjDAZMM20ObuXzn7NW2S/sLx9jMTdr8OJW7n567SBCO31IbN5Inu
lopHPR8d5sA3EYL17MGfgkLH9DdHbeZaxDPw41smmNdA04G//bZFChgab02H8uai
DLWOeaiS1m1zmGpRWCvcS4xm55G1kEdTfJVvj45w9G63BZZuYqzgun1ejG3eTIfz
zw4Ot7TzyZ7icGAWbrb68eBCisHmzNM7hVHuhRlj5EUuGsrAVHD5fgUGDaV1wvC/
6XwLFN7kxp5XkLVuq/V3
=UySW
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.