lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <7167a950-947d-4ecd-982a-6b86ab94a740@gmail.com>
Date: Tue, 15 Aug 2023 21:25:26 +0300
From: Adrean Boyadzhiev <adrean.boyadzhiev@...il.com>
To: gguninski@...il.com
Cc: fulldisclosure@...lists.org
Subject: Re: [FD] Anomaly in Fedora `dnf update`: md5 mismatch of result

Probably a completely different root cause, but I have noticed similar 
behavior with a Debian-based distribution during `# apt upgrade` and 
when there are many packages for update and the internet connection is 
not so good. I haven't investigated, but my assumptions were either Race 
Conditions within verification logic or some logic related to the timestamp.

> Also, isn't md5 deprecated and known to suck much?

To my knowledge `md5` should be ok for calculating hash sums, many 
prefer it since the algorithm is relatively fast and simple.


Best regards,

--
Adrean Boyadzhiev
https://lambdabit.io


On 8/14/23 14:43, Georgi Guninski wrote:
> In short, I found anomaly in Fedora 37 and would like to
> know if it is vulnerability.
>
> As root type in terminal:
> dnf update
>
> If there is kernel update, watch stdout and stderr for:
>
> ##On Mon Aug 14 05:33:29 AM UTC 2023
> (2/6): kernel-6.4.10-100.fc37.x86_64.rpm        1.2 MB/s | 140 kB     00:00
> /var/cache/dnf/updates-fd4d3d0d1c34d49a/packages/kernel-modules-extra-6.4.9-100.fc37_6.4.10-100.fc37.x86_64.drpm:
> md5 mismatch of result
>
> ##$ md5sum /var/cache/dnf/updates-fd4d3d0d1c34d49a/packages/kernel-modules-extra-6.4.9-100.fc37_6.4.10-100.fc37.x86_64.drpm
> 356ea04e06bd58db4a15c64e64432f1a
> /var/cache/dnf/updates-fd4d3d0d1c34d49a/packages/kernel-modules-extra-6.4.9-100.fc37_6.4.10-100.fc37.x86_64.drpm
>
> Another possible approach:  install  Fedora 37 in VM without internet
> access and then do `dnf update` (haven't tested this yet).
>
> After second download, the kernel update passes, but I don't
> understand why the second download via http://mirror should pass.
>
> Examining the dnf source is option.
>
> Open problem:  Can this be vulnerability, possibly assuming
> hostile mirror or network?
>
> Also, isn't md5 deprecated and known to suck much?
>

Download attachment "OpenPGP_0xC5FFCE15F846C301.asc" of type "application/pgp-keys" (670 bytes)

Download attachment "OpenPGP_signature.asc" of type "application/pgp-signature" (237 bytes)

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ