Bug 1849651

Summary: CVE-2020-14019 RHEL8.3: rtslib: weak permissions for /etc/target/saveconfig.json
Product: Red Hat Enterprise Linux 8 Reporter: Maurizio Lombardi <mlombard>
Component: python-rtslibAssignee: Maurizio Lombardi <mlombard>
Status: CLOSED ERRATA QA Contact: Filip Suba <fsuba>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 8.3CC: fsuba
Target Milestone: rcKeywords: Bugfix, Rebase
Target Release: 8.0Flags: pm-rhel: mirror+
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
: 1855171 (view as bug list) Environment:
Last Closed: 2020-11-04 01:51:53 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1855171    

Description Maurizio Lombardi 2020-06-22 12:41:30 UTC
Description of problem:

-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved. 

Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1. delete the old saveconfig.json file (if any)
2. open targetcli, save and exit
3. saveconfig.json is re-created with wrong perms

Additional info:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14019

Comment 5 Filip Suba 2020-08-19 09:49:50 UTC
Verified with python-rtslib-2.1.73-2.el8.
# ls -l
...
-rw-------.  1 root root   69 Aug 19 05:46 saveconfig.json

Comment 8 errata-xmlrpc 2020-11-04 01:51:53 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (python-rtslib bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHEA-2020:4505