Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

RUSTSEC-2022-0103

Incorrect signature verification on gzip-compressed install images
Back to all
CVE

RUSTSEC-2022-0103

Incorrect signature verification on gzip-compressed install images

The coreos-installer is a program to fetch a disk image and

stream it to a target disk.

During the installation process the installation image gpg

signatures are verified.

The signature verification can be bypassed for gzip-compressed

images due to a flaw in gzip coreos-installer wrapper.

When the decoder encounters the gzip trailer, it signals EOF

to its output and does not continue reading from its input.

As a result, earlier wrappers don't notice that they've reached

EOF.

In particular, the GPG wrapper does not check the exit code of GPG.

Thus, if an attacker can substitute an attacker-controlled

gzipped disk image, installation will complete successfully

without a valid signature.

This vulnerability impacts only specific, User-Provisioned

Infrastructure (UPI) installation methods where coreos-installer

is used and where gzip-compressed images are configured as

the installation source.

The Installer-Provisioned Infrastructure (IPI) bare-metal

installs do use coreos-installer, but this installation

method uses an install image embedded in the live OS image

(ISO or PXE image), therefore is not affected by this

vulnerability.

This vulnerability is specific to some upstream Fedora

CoreOS installation flows.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
-
C
H
U
0
-
3.1
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
C
H
U
-

Related Resources

No items found.

References

https://crates.io/crates/coreos-installer, https://rustsec.org/advisories/RUSTSEC-2022-0103.html, https://bugzilla.redhat.com/show_bug.cgi?id=2011862, https://nvd.nist.gov/vuln/detail/CVE-2021-20319

Severity

7.8

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
7.8
EPSS Probability
0%
EPSS Percentile
0%
Introduced Version
0.0.0-0
Fix Available
0.10.1

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading