Bug 1308871 - cloud-init: Following symlinks for ssh authorized_keys
cloud-init: Following symlinks for ssh authorized_keys
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 1308875 1308874
Blocks: 1308877
  Show dependency treegraph
Reported: 2016-02-16 05:30 EST by Adam Mariš
Modified: 2016-06-02 00:31 EDT (History)
10 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2016-06-02 00:31:57 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2016-02-16 05:30:17 EST
It was found that SSH key handling code follows symlinks, allowing malicious user to create symlink from ~/.ssh pointing to arbitrary place.

CVE request:

Comment 1 Adam Mariš 2016-02-16 05:37:56 EST
Created cloud-init tracking bugs for this issue:

Affects: fedora-all [bug 1308874]
Affects: epel-all [bug 1308875]
Comment 2 Dhiru Kholia 2016-06-02 00:31:57 EDT
There is no realistic attack vector here (the bug report assumes that an unprivileged user can write to a different user's directories). Hence closing the bug.

Note You need to log in before you can comment on or make changes to this bug.