Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1322706 - (CVE-2016-3095) CVE-2016-3095 pulp: Potential leakage when generating new CA key in /tmp
CVE-2016-3095 pulp: Potential leakage when generating new CA key in /tmp
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20160331,reported=2...
: Security
Depends On:
Blocks: 1322708
  Show dependency treegraph
 
Reported: 2016-03-31 03:48 EDT by Adam Mariš
Modified: 2016-04-06 16:58 EDT (History)
9 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-03-31 14:40:46 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2016-03-31 03:48:56 EDT
It was found that newly generated CA keys by running pulp-gen-ca-certificate (which is run by spec file when pulp is installed) script are insufficiently protected against reading by other users for the time the script runs.

Vulnerable code:

https://github.com/pulp/pulp/blob/2.8.0/server/bin/pulp-gen-ca-certificate
Comment 1 Adam Mariš 2016-03-31 03:49:06 EDT
Acknowledgments:

Name: Randy Barlow (Red Hat)
Comment 2 Randy Barlow 2016-03-31 10:41:54 EDT
This upstream pull request fixes this issue and also raises the size of the default CA key:

https://github.com/pulp/pulp/pull/2503
Comment 3 Mike McCune 2016-03-31 11:17:43 EDT
Satellite 6's use of Pulp does not utilize certificate based authentication to Pulp's API, we only authenticate via OAuth so it appears that our product is not vulnerable to this CVE.
Comment 4 Mike McCune 2016-03-31 11:18:42 EDT
IRC conversation with Randy for a bit more details:

<bowlofeggs> do you know if katello/satellite uses pulp's internal cacert or not? https://bugzilla.redhat.com/show_bug.cgi?id=1322706 is about how there is a low impact vulnerability during the generation of those certs
<bowlofeggs> the way you could tell is if the cacert setting in pulp's server.conf is commented or not
<bowlofeggs> or, if you replace the file with katello installer
<mmccune> checking
<mmccune> # consumer_cert_expiration: number of days a consumer certificate is valid
<mmccune> cacert: /etc/pki/pulp/ca.crt
<bowlofeggs> this would be in the [security] section
<mmccune> that?
<bowlofeggs> yeah
<mmccune> let me see if we generate that
<bowlofeggs> so it's uncommented, but it's also set to the default
<mmccune> yup
<bowlofeggs> pulp has a little utility called pulp-gen-ca-cert (or somethinglike that) that our spec file runs during install
<bowlofeggs> you do generate that file yourself?
<bowlofeggs> do you use our utility?
<bowlofeggs> or do you do it all on your own?
<mmccune> checking
* bowlofeggs crosses fingers
<mmccune> what uses that CA cert?
<bowlofeggs> this CA cert is used by two things - when a pulp login call happens, that CA generates a client cert/key that is handed back on the response
<bowlofeggs> secondly, that CA is used by httpd to authenticate any calls that use certificate auth
<mmccune> we only use oauth to talk to pulp
<mmccune> yeah, we dont generate or touch that file
<bowlofeggs> oh interesting
<mmccune> so it is relying on whatever you do in %post
<bowlofeggs> if you only use oauth and never use certificates, then you are not vulnerable
<mmccune> nothing uses cert auth in sat6 to talk to pulp
<bowlofeggs> cool
<bowlofeggs> do you want to make that comment on the bug, or do you want me to?
<mmccune> i got it
<bowlofeggs> excellent. thanks mike!
<bowlofeggs> it's def a low severity bug anyway, but i wanted to inform product security on whether the product needed a fix or not
<bowlofeggs> we can just fix it upstream
<bowlofeggs> feel free to paste this convo in the bug if you want
<mmccune> yeah, we can just get it for free in 6.2 if it lands in 2.8.X
<bowlofeggs> yeah i think it'll be in 2.8.2
Comment 5 Kurt Seifried 2016-03-31 13:57:36 EDT
RHUI 2.x is also notaffected as it uses an older version that doesn't ship this.
Comment 6 Kurt Seifried 2016-03-31 14:36:10 EDT
RHUI 3 will have pulp 2.8.2 or later.
Comment 7 Kurt Seifried 2016-03-31 14:40:46 EDT
Statement:

This issue did not affect the versions of pulp as shipped with Red Hat Satellite 6.x and Red Hat Update Infrastructure 2.x as they did not include support for pulp-gen-ca-certificate.

Note You need to log in before you can comment on or make changes to this bug.