Bug 796790 - (CVE-2012-0878) CVE-2012-0878 python-paste-script: Supplementary groups not dropped when started an application with "paster serve" as root
CVE-2012-0878 python-paste-script: Supplementary groups not dropped when star...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20120206,repor...
: Security
Depends On: 796672 796809 796810 796811 838974
Blocks: 796815
  Show dependency treegraph
 
Reported: 2012-02-23 11:44 EST by Jan Lieskovsky
Modified: 2015-11-24 10:05 EST (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-10-03 06:30:30 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Jan Lieskovsky 2012-02-23 11:44:07 EST
A security flaw was found in the way Paster, a pluggable command-line frontend, when started as root (for example to have access to privileged port) to serve a web based application, performed privileges dropping upon startup (supplementary groups were not dropped properly regardless of the UID, GID specified in the .ini configuration file or in the --user and --group CL arguments). A remote attacker could use this flaw for example to read / write root GID accessible files, if the particular web application provided remote means for local file manipulation.

References:
[1] http://groups.google.com/group/paste-users/browse_thread/thread/2aa651ba331c2471

Patch proposed by the issue reporter:
[2] https://bitbucket.org/ianb/pastescript/pull-request/3/fix-group-permissions-for-pastescriptserve

Upstream patch:
[3] https://bitbucket.org/ianb/pastescript/changeset/a19e462769b4
Comment 1 Jan Lieskovsky 2012-02-23 12:07:59 EST
CVE request:
[4] http://www.openwall.com/lists/oss-security/2012/02/23/1
Comment 2 Jan Lieskovsky 2012-02-23 12:24:14 EST
This issue affects the version of the python-paste-script package, as shipped with Red Hat Enterprise Linux 6.

--

This issue affects the versions of the python-paste-script package, as shipped with Fedora EPEL 4 and Fedora EPEL 5 releases. Please schedule an update.

Note: Luke, assuming Fedora EPEL 4 will go EOL shortly. Have filed bug, but feel free to close it if you think it's not appropriate anymore.

--

This issue affects the versions of the python-paste-script package, as shipped with Fedora release of 15 and 16. Please schedule an update.
Comment 3 Jan Lieskovsky 2012-02-23 12:25:36 EST
Created python-paste-script tracking bugs for this issue

Affects: epel-4 [bug 796809]
Affects: epel-5 [bug 796810]
Affects: fedora-all [bug 796811]
Comment 5 Vincent Danen 2012-02-23 18:03:52 EST
This has been assigned CVE-2012-0878:

http://www.openwall.com/lists/oss-security/2012/02/23/4
Comment 8 Fedora Update System 2012-03-11 14:52:45 EDT
python-paste-script-1.7.5-1.el5 has been pushed to the Fedora EPEL 5 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 10 Fedora Update System 2012-04-06 17:24:20 EDT
python-paste-script-1.7.5-4.fc15 has been pushed to the Fedora 15 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 11 Fedora Update System 2012-04-06 17:25:10 EDT
python-paste-script-1.7.5-4.fc16 has been pushed to the Fedora 16 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 12 Fedora Update System 2012-04-11 21:56:58 EDT
python-paste-script-1.7.5-4.fc17 has been pushed to the Fedora 17 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 14 errata-xmlrpc 2012-08-27 08:48:22 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:1206 https://rhn.redhat.com/errata/RHSA-2012-1206.html

Note You need to log in before you can comment on or make changes to this bug.