Bug 1511623 (CVE-2017-15111)
Summary: | CVE-2017-15111 keycloak-httpd-client-install: unsafe /tmp log file in --log-file option in keycloak_cli.py | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | apevec, chrisw, jdennis, jjoyce, jschluet, kbasil, kseifried, lhh, lpeer, markmc, mburns, nkinder, osoukup, psampaio, rbryant, rhos-maint, sclewis, security-response-team, slinaber, slong, tdecacqu |
Target Milestone: | --- | Keywords: | Reopened, Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | keycloak 0.8 | Doc Type: | If docs needed, set a value |
Doc Text: |
It was discovered that keycloak-httpd-client-install uses a predictable log file name in /tmp. A local attacker could create a symbolic link to a sensitive location, possibly causing data corruption or denial of service.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-08-06 13:18:28 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1531296, 1531338, 1531339, 1531340, 1533190 | ||
Bug Blocks: | 1517252 |
Description
Pedro Sampaio
2017-11-09 18:02:36 UTC
Could you please explain the security issue, I do not follow from the terse "insecurely passes the script name for the log file creation" phrase. Created keycloak-httpd-client-install tracking bugs for this issue: Affects: fedora-all [bug 1531296] Upstream fix: https://github.com/jdennis/keycloak-httpd-client-install/commit/07f26e213196936fb328ea0c1d5a66a09d8b5440 Statement: Red Hat Product Security has rated this issue as having security impact of Low. This issue may be fixed in a future version of Red Hat Enterprise Linux. OpenStack users please note, this issue is present in: * Red Hat OpenStack Platform 9.0 (Mitaka) * Red Hat OpenStack Platform 10.0 (Newton) * Red Hat OpenStack Platform 11.0 (Ocata) If a fixed version of keycloak-httpd-client-install is made available in Red Hat Enterprise Linux, OpenStack customers should consume this package directly from the Red Hat Enterprise Linux channel (this occurs during normal updates). This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2137 https://access.redhat.com/errata/RHSA-2019:2137 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2017-15111 |