Bug 1556657 (CVE-2018-1080)
Summary: | CVE-2018-1080 pki-core: Mishandled ACL configuration in AAclAuthz.java reverses rules that allow and deny access | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sam Fowler <sfowler> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | alee, dsirrine, edewata, ftweedal, jswensso, kseifried, kwright, mharmsen, rhcs-maint, sfowler |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | PKI 10.6.1 | Doc Type: | If docs needed, set a value |
Doc Text: |
Dogtag PKI, through version 10.6.1, has a vulnerability in AAclAuthz.java that, under certain configurations, causes the application of ACL allow and deny rules to be reversed. If a server is configured to process allow rules before deny rules (authz.evaluateOrder=allow,deny), then allow rules will deny access and deny rules will grant access. This may result in an escalation of privileges or have other unintended consequences.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2018-10-30 00:02:11 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1556658, 1556660, 1558108, 1580527, 1589307 | ||
Bug Blocks: | 1556659 |
Description
Sam Fowler
2018-03-15 01:28:47 UTC
Created pki-core tracking bugs for this issue: Affects: fedora-all [bug 1556658] Acknowledgments: Name: Fraser Tweedale (Red Hat) Gerrit review: https://review.gerrithub.io/#/c/404435/ Fix merged to upstream master: b54975f4cac60e2f4332b08414f1b5ea4de62601 Statement: This issue affects the versions of pkicore as shipped with Red Hat Certificate System 9. Red Hat Product Security has rated this issue as having security impact of Low. Please also note that all instances of "authz.evaluateOrder" are set to "deny,allow" by default. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. This looks to be fixed in 10.6.1 as opposed to 10.5.1. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:1979 https://access.redhat.com/errata/RHSA-2018:1979 Kurt and Sam, I have closed current version the associated bug: * https://bugzilla.redhat.com/show_bug.cgi?id=1558108 Please feel free to close this one accordingly. Thanks, -- MAtt |