Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1328345 - (CVE-2013-7450) CVE-2013-7450 pulp: distributed with CA from public code repository
CVE-2013-7450 pulp: distributed with CA from public code repository
Status: CLOSED CURRENTRELEASE
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20130901,repo...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2016-04-19 03:51 EDT by Andrej Nemec
Modified: 2016-04-19 03:51 EDT (History)
8 users (show)

See Also:
Fixed In Version: pulp 2.3.0
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-04-19 03:51:40 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Andrej Nemec 2016-04-19 03:51:05 EDT
Versions of Pulp < 2.3.0 distributed the same certificate authority key and
certificate to all Pulp users[0]. This CA is used by the /login API call
(pulp-admin login uses this call) to generate and sign a client certificate.
This client certificate is then used for subsequent API calls.

Due to this vulnerability, remote attackers are able to obtain the CA key
from the Pulp git repository and use it to generate valid client certificates
for any Pulp installations that use the default CA. The Pulp documentation
did not emphasize the importance of replacing this CA for production
deployments, so there may be users who use this common CA key in production
environments.

References:

http://seclists.org/oss-sec/2016/q2/99

Upstream fix:

https://github.com/pulp/pulp/pull/627

Note You need to log in before you can comment on or make changes to this bug.