Bug 849210 (CVE-2012-3503)
Summary: | CVE-2012-3503 Katello: Application.config.secret_token is not generated properly | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Kurt Seifried <kseifried> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | aweiteka, bkearney, jlaska, jomara, katello-internal, kseifried, lzap, mmccune, omaciel, security-response-team |
Target Milestone: | --- | Keywords: | Reopened, Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2013-07-26 07:43:15 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 848905, 849682 | ||
Bug Blocks: | 849712 |
Description
Kurt Seifried
2012-08-17 17:31:05 UTC
This issue has been addressed in following products: Red Hat Subscription Asset Manager 1.1 Via RHSA-2012:1187 https://rhn.redhat.com/errata/RHSA-2012-1187.html This issue has been addressed in following products: CloudForms for RHEL 6 Via RHSA-2012:1186 https://rhn.redhat.com/errata/RHSA-2012-1186.html Patched upstream: https://github.com/Katello/katello/pull/1434 [root@tigger ~]# rpm -qp --scripts katello-common-1.0.2-1.el6.noarch.rpm error: open of katello-common-1.0.2-1.el6.noarch.rpm failed: No such file or directory [root@tigger ~]# rpm -q --scripts katello-common preinstall scriptlet (using /bin/sh): # Add the "katello" user and group getent group katello >/dev/null || groupadd -r katello -g 182 getent passwd katello >/dev/null || \ useradd -r -g katello -d /usr/share/katello -u 182 -s /sbin/nologin -c "Katello" katello exit 0 postinstall scriptlet (using /bin/sh): #Add /etc/rc*.d links for the script /sbin/chkconfig --add katello /sbin/chkconfig --add katello-jobs #Generate secret token if the file does not exist #(this must be called both for installation and upgrade) TOKEN=/etc/katello/secret_token test -f $TOKEN || (echo $(</dev/urandom tr -dc A-Za-z0-9 | head -c128) > $TOKEN \ && chmod 600 $TOKEN && chown katello:katello $TOKEN) preuninstall scriptlet (using /bin/sh): if [ $1 -eq 0 ] ; then /sbin/service katello-jobs stop >/dev/null 2>&1 /sbin/chkconfig --del katello-jobs /sbin/service katello stop >/dev/null 2>&1 /sbin/chkconfig --del katello fi posttrans scriptlet (using /bin/sh): rm -f /var/lib/katello/Gemfile.lock 2>/dev/null /sbin/service katello condrestart >/dev/null 2>&1 || : Token included in /etc/katello/secret_token is not the hard-coded value mentioned here. The Red Hat Security Response Team has rated this issue as having low security impact in CloudForms 1.1. This issue is not currently planned to be addressed in future updates. |