Bug 2153688
| Summary: | Bad permissions for files shipped by libvirt-client | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 8 | Reporter: | Michal Privoznik <mprivozn> | |
| Component: | libvirt | Assignee: | Michal Privoznik <mprivozn> | |
| Status: | CLOSED ERRATA | QA Contact: | yalzhang <yalzhang> | |
| Severity: | high | Docs Contact: | ||
| Priority: | high | |||
| Version: | --- | CC: | gveitmic, jdenemar, jsuchane, lmen, mprivozn, rmetrich, virt-maint, yalzhang, ymankad | |
| Target Milestone: | rc | Keywords: | Triaged, Upstream, ZStream | |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
|
| Hardware: | All | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | libvirt-8.0.0-13.module+el8.8.0+17719+f18c2d1b | Doc Type: | Bug Fix | |
| Doc Text: |
Cause:
Some scripts installed by libvirt RPMs have bad permissions (writable by root group).
Consequence:
This is potentially dangerous as a member of a root group (which is usually just root, but okay) could change the contents of the script.
Fix:
Scripts are now installed with rwxr-xr-x mode (i.e. writable only by root user).
Result:
Scripts are now writable by root user only.
|
Story Points: | --- | |
| Clone Of: | 2151202 | |||
| : | 2157091 2157092 (view as bug list) | Environment: | ||
| Last Closed: | 2023-05-16 08:18:36 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | 9.0.0 | |
| Embargoed: | ||||
| Bug Depends On: | ||||
| Bug Blocks: | 2157091, 2157092 | |||
|
Comment 10
yalzhang@redhat.com
2023-01-05 05:50:55 UTC
verified per comment 10 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2023:2757 |