Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 474990 (CVE-2013-2217) - <dev-python/suds-0.6: Insecure temporary directory use when initializing file-based URL cache (CVE-2013-2217)
Summary: <dev-python/suds-0.6: Insecure temporary directory use when initializing file...
Status: RESOLVED FIXED
Alias: CVE-2013-2217
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2013-06-27 15:52 UTC by Agostino Sarubbo
Modified: 2016-11-20 05:57 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-06-27 15:52:50 UTC
From ${URL} :

  based on the public Red Hat Bugzilla report:
  [1] https://bugzilla.redhat.com/show_bug.cgi?id=978696

by Ralph Loader:

A insecure temporary directory use flaw was found in the way
python-suds, a Python SOAP web services client library, performed
initialization of its internal file-based URL cache (predictable
location was used for directory to store the cached files). A
local attacker could use this flaw to conduct symbolic link
attacks, possibly leading to their ability for example the
SOAP .wsdl metadata to redirect queries to a different host,
than originally intended.

The reasons for the current behaviour are detailed at:
[2] https://bugzilla.redhat.com/show_bug.cgi?id=978696#c4



@maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
Comment 1 Ian Delaney (RETIRED) gentoo-dev 2013-07-03 13:53:13 UTC
P.S.: There doesn't seem to be an upstream patch available yet (afaik),
      but the fix is obvious.

This messes with Python's tempfile.gettempdir() which has tripped up many a python testsuite.  Use of /tmp causes havoc with running the ebuild process as user for starters.  Could you prompt on the occasion of upstream making a proper patch apt for any distro.
Comment 2 Chris Reffett (RETIRED) gentoo-dev Security 2013-08-27 03:39:00 UTC
Proposed fix from Red Hat bugzie at [1]. Your call, Python team.

[1] https://bugzilla.redhat.com/attachment.cgi?id=766910&action=diff
Comment 3 Dirkjan Ochtman (RETIRED) gentoo-dev 2013-08-27 09:27:42 UTC
LGTM. Anyone wants to work through this?
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2013-09-24 22:04:26 UTC
CVE-2013-2217 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2217):
  cache.py in Suds 0.4, when tempdir is set to None, allows local users to
  redirect SOAP queries and possibly have other unspecified impact via a
  symlink attack on a cache file with a predictable name in /tmp/suds/.
Comment 5 Manuel Rüger (RETIRED) gentoo-dev 2015-06-13 08:55:44 UTC
This seems to be a somewhat active fork, that fixes the vulnerability and has new releases (currently v0.6): https://bitbucket.org/jurko/suds/
Comment 6 Ian Delaney (RETIRED) gentoo-dev 2015-06-15 02:06:48 UTC
(In reply to Manuel Rüger from comment #5)
> This seems to be a somewhat active fork, that fixes the vulnerability and
> has new releases (currently v0.6): https://bitbucket.org/jurko/suds/

A fork of the same name? What happens here (after 2 years)? A fork is generally renamed and is distinguishable.  In this case changing HOMEPAGE and SRC_URI might be 'wrong'.
Comment 7 Justin Lecher (RETIRED) gentoo-dev 2015-06-16 07:52:11 UTC
(In reply to Manuel Rüger from comment #5)
> This seems to be a somewhat active fork, that fixes the vulnerability and
> has new releases (currently v0.6): https://bitbucket.org/jurko/suds/

Here is the patch, but it doesn't apply cleanly to version 0.4.

https://bitbucket.org/jurko/suds/commits/3126ac3a406c37f9982f01ad0ca4ed42cf9a47cb/raw/
Comment 8 Justin Lecher (RETIRED) gentoo-dev 2015-06-16 08:01:37 UTC
(In reply to Ian Delaney from comment #6)
> (In reply to Manuel Rüger from comment #5)
> > This seems to be a somewhat active fork, that fixes the vulnerability and
> > has new releases (currently v0.6): https://bitbucket.org/jurko/suds/
> 
> A fork of the same name? What happens here (after 2 years)? A fork is
> generally renamed and is distinguishable.  In this case changing HOMEPAGE
> and SRC_URI might be 'wrong'.

it is called suds-jurko at some places.
Comment 9 Matthew Thode ( prometheanfire ) archtester Gentoo Infrastructure gentoo-dev Security 2015-07-25 04:10:46 UTC
I've bumped suds to be suds-jurko now (0.6).  we do a stablereq here for that?
Comment 10 Aaron Bauman (RETIRED) gentoo-dev 2016-07-18 10:04:30 UTC
As previously mentioned, the package was "forked" under the same cat/package.  The new code in >=dev-python/suds-0.6 is not vulnerable, which has been confirmed.

@maintainer(s), please drop the vulnerable 0.4 ebuild, which pulls in the old code base.
Comment 11 Aaron Bauman (RETIRED) gentoo-dev 2016-11-11 08:55:35 UTC
@maintainer(s), please cleanup the vulnerable version still in tree.
Comment 12 Aaron Bauman (RETIRED) gentoo-dev 2016-11-20 05:57:26 UTC
Cleaned:

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ce2ee59070980eded4044d8629b1b00ac67ee5fa

GLSA Vote: No