Bug 906207 (CVE-2012-6116)
Summary: | CVE-2012-6116 Candlepin: bootstrap RPM deploys CA certificate file with mode 666 | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Kurt Seifried <kseifried> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED WONTFIX | QA Contact: | |||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | athomas, bkearney, cpelland, mmccune, msuchy, sclewis, security-response-team, srevivo, sthirugn | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2015-08-21 21:05:48 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 877387, 896255, 906208, 924247, 995675, 995676 | ||||||
Bug Blocks: | 906209, 906638, 917158 | ||||||
Attachments: |
|
Description
Kurt Seifried
2013-01-31 06:27:17 UTC
*** Bug 876580 has been marked as a duplicate of this bug. *** Acknowledgements: This issue was discovered by Dominic Cleal and James Laska of Red Hat. This issue has been addressed in following products: CloudForms for RHEL 6 Via RHSA-2013:0547 https://rhn.redhat.com/errata/RHSA-2013-0547.html commit 65f1e42b7bda0f3410931c50598540d944d8bf0d Author: Marek Hulan <ares> Date: Tue Jan 22 12:48:10 2013 +0100 877387 - Candlepin CA certificate mode in RPM File mode is set to 0644 when RPM is generated. Created attachment 701212 [details]
Fix for the permissions issue (in installer)
Verified in SAM compose: SAM 1.1 version: * candlepin-0.6.5-1.el6_2.noarch * candlepin-tomcat6-0.6.5-1.el6_2.noarch * elasticsearch-0.18.4-11.el6.noarch * katello-candlepin-cert-key-pair-1.0-1.noarch * katello-certs-tools-1.1.5-1.el6_2.noarch * katello-cli-common-0.3.5-2.el6_2.noarch * katello-cli-headpin-0.2.2-1.el6_2.noarch * katello-common-0.3.3-1.el6_2.noarch * katello-configure-0.3.7-1.el6_2.noarch * katello-glue-candlepin-0.3.3-1.el6_2.noarch * katello-headpin-0.2.13-1.el6_2.noarch * katello-headpin-all-0.2.13-1.el6_2.noarch * katello-selinux-0.2.4-1.el6_2.noarch * thumbslug-0.0.24-1.el6_2.noarch SAM 1.2.1 Version: * candlepin-0.7.24-1.el6_3.noarch * candlepin-cert-consumer-gizmo.idm.lab.bos.redhat.com-1.0-1.noarch * candlepin-selinux-0.7.24-1.el6_3.noarch * candlepin-tomcat6-0.7.24-1.el6_3.noarch * elasticsearch-0.19.9-5.el6_3.noarch * katello-candlepin-cert-key-pair-1.0-1.noarch * katello-certs-tools-1.2.1-1h.el6_3.noarch * katello-cli-1.2.1-12h.el6_3.noarch * katello-cli-common-1.2.1-12h.el6_3.noarch * katello-common-1.2.1.1-1h.el6_4.noarch * katello-configure-1.2.3.1-4h.el6_4.noarch * katello-glue-candlepin-1.2.1.1-1h.el6_4.noarch * katello-headpin-1.2.1.1-1h.el6_4.noarch * katello-headpin-all-1.2.1.1-1h.el6_4.noarch * katello-selinux-1.2.1-2h.el6_3.noarch * thumbslug-0.0.28.1-1.el6_4.noarch * thumbslug-selinux-0.0.28.1-1.el6_4.noarch This issue has been addressed in following products: Red Hat Subscription Asset Manager 1.2 Via RHSA-2013:0686 https://rhn.redhat.com/errata/RHSA-2013-0686.html The Red Hat Security Response Team has rated this issue as having moderate security impact in CloudForms 1.1. This issue is not currently planned to be addressed in future updates. |