Bug 11937 - pam new security issues CVE-2013-7041 and CVE-2014-2583
Summary: pam new security issues CVE-2013-7041 and CVE-2014-2583
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: i586 Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/626828/
Whiteboard: has_procedure advisory mga4-32-ok mga...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2013-12-10 01:54 CET by David Walser
Modified: 2015-05-12 21:38 CEST (History)
2 users (show)

See Also:
Source RPM: pam-1.1.8-6.mga4.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2013-12-10 01:54:37 CET
A CVE has been assigned for a security issue in PAM:
http://openwall.com/lists/oss-security/2013/12/09/16

The issue is that it uses case-insensitive matching when comparing hashes.

There is a patch linked in the RedHat bug:
https://bugzilla.redhat.com/show_bug.cgi?id=1038555#c2

Reproducible: 

Steps to Reproduce:
David Walser 2013-12-10 01:55:03 CET

Whiteboard: (none) => MGA3TOO

Dave Hodgins 2013-12-12 22:36:35 CET

Blocks: (none) => 11726

Comment 1 David Walser 2014-01-26 23:21:56 CET
Removing this from the Mageia 4 security tracker, as this will not be fixed before release.

Blocks: 11726 => (none)
Whiteboard: MGA3TOO => MGA4TOO, MGA3TOO

Comment 2 David Walser 2014-07-08 21:52:36 CEST
Fedora has added patches in RawHide from upstream pam's git to fix CVE-2013-7041 and CVE-2014-2583.  They also have posted detailed explanations of why each issue is very unlikely to be exploited:
https://bugzilla.redhat.com/show_bug.cgi?id=1038555#c9
https://bugzilla.redhat.com/show_bug.cgi?id=1080243#c13

I've added both patches in pam-1.1.8-8.mga5 to fix this in Cauldron.

I've also added patches for both in Mageia 3 and Mageia 4 SVN, so that they will be included in any future updates.

Version: Cauldron => 4
Summary: pam new security issue CVE-2013-7041 => pam new security issues CVE-2013-7041 and CVE-2014-2583
Whiteboard: MGA4TOO, MGA3TOO => MGA3TOO

Comment 3 David Walser 2014-12-18 18:56:21 CET
Fedora has issued an advisory for this on December 6:
https://lists.fedoraproject.org/pipermail/package-announce/2014-December/146370.html

Removing Mageia 3 from the whiteboard due to EOL.

URL: (none) => http://lwn.net/Vulnerabilities/626828/
Whiteboard: MGA3TOO => (none)

Comment 4 Nicolas Lécureuil 2015-05-11 00:25:19 CEST
pushed into 4 core/updates_testing

CC: (none) => mageia

Comment 5 David Walser 2015-05-11 00:32:55 CEST
Patched package uploaded for Mageia 4.

Advisory:
========================

Updated pam packages fix security vulnerabilities:

The pam_userdb module for Pam uses a case-insensitive method to compare hashed
passwords, which makes it easier for attackers to guess the password via a
brute force attack (CVE-2013-7041).

Multiple directory traversal vulnerabilities in pam_timestamp.c in the
pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create
aribitrary files or possibly bypass authentication via a .. (dot dot) in the
PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the
check_tty funtion, which is used by the format_timestamp_name function
(CVE-2014-2583).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7041
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583
https://lists.fedoraproject.org/pipermail/package-announce/2014-December/146370.html
========================

Updated packages in core/updates_testing:
========================
pam-1.1.8-7.1.mga4
pam-doc-1.1.8-7.1.mga4
libpam0-1.1.8-7.1.mga4
libpam-devel-1.1.8-7.1.mga4

from pam-1.1.8-7.1.mga4.src.rpm

Assignee: bugsquad => qa-bugs

Comment 6 claire robinson 2015-05-11 16:06:53 CEST
Testing complete mga4 32 

Minimal testing during mga5 final release cycle but ensured reboot/login/logout/MCC still OK

Whiteboard: (none) => has_procedure mga4-32-ok

Comment 7 claire robinson 2015-05-11 17:40:21 CEST
Advisory uploaded.

Whiteboard: has_procedure mga4-32-ok => has_procedure advisory mga4-32-ok

Comment 8 claire robinson 2015-05-12 15:34:24 CEST
Testing complete mga4 64, as comment 6

Validating.

Please push to 4 updates

Thanks

Keywords: (none) => validated_update
Whiteboard: has_procedure advisory mga4-32-ok => has_procedure advisory mga4-32-ok mga4-64-ok
CC: (none) => sysadmin-bugs

Comment 9 Mageia Robot 2015-05-12 21:38:27 CEST
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0213.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.