Bug 796790 (CVE-2012-0878) - CVE-2012-0878 python-paste-script: Supplementary groups not dropped when started an application with "paster serve" as root
Summary: CVE-2012-0878 python-paste-script: Supplementary groups not dropped when star...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-0878
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 796672 796809 796810 796811 838974
Blocks: 796815
TreeView+ depends on / blocked
 
Reported: 2012-02-23 16:44 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:50 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-10-03 10:30:30 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:1206 normal SHIPPED_LIVE Moderate: python-paste-script security update 2012-08-27 16:47:25 UTC

Description Jan Lieskovsky 2012-02-23 16:44:07 UTC
A security flaw was found in the way Paster, a pluggable command-line frontend, when started as root (for example to have access to privileged port) to serve a web based application, performed privileges dropping upon startup (supplementary groups were not dropped properly regardless of the UID, GID specified in the .ini configuration file or in the --user and --group CL arguments). A remote attacker could use this flaw for example to read / write root GID accessible files, if the particular web application provided remote means for local file manipulation.

References:
[1] http://groups.google.com/group/paste-users/browse_thread/thread/2aa651ba331c2471

Patch proposed by the issue reporter:
[2] https://bitbucket.org/ianb/pastescript/pull-request/3/fix-group-permissions-for-pastescriptserve

Upstream patch:
[3] https://bitbucket.org/ianb/pastescript/changeset/a19e462769b4

Comment 1 Jan Lieskovsky 2012-02-23 17:07:59 UTC
CVE request:
[4] http://www.openwall.com/lists/oss-security/2012/02/23/1

Comment 2 Jan Lieskovsky 2012-02-23 17:24:14 UTC
This issue affects the version of the python-paste-script package, as shipped with Red Hat Enterprise Linux 6.

--

This issue affects the versions of the python-paste-script package, as shipped with Fedora EPEL 4 and Fedora EPEL 5 releases. Please schedule an update.

Note: Luke, assuming Fedora EPEL 4 will go EOL shortly. Have filed bug, but feel free to close it if you think it's not appropriate anymore.

--

This issue affects the versions of the python-paste-script package, as shipped with Fedora release of 15 and 16. Please schedule an update.

Comment 3 Jan Lieskovsky 2012-02-23 17:25:36 UTC
Created python-paste-script tracking bugs for this issue

Affects: epel-4 [bug 796809]
Affects: epel-5 [bug 796810]
Affects: fedora-all [bug 796811]

Comment 5 Vincent Danen 2012-02-23 23:03:52 UTC
This has been assigned CVE-2012-0878:

http://www.openwall.com/lists/oss-security/2012/02/23/4

Comment 8 Fedora Update System 2012-03-11 18:52:45 UTC
python-paste-script-1.7.5-1.el5 has been pushed to the Fedora EPEL 5 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 10 Fedora Update System 2012-04-06 21:24:20 UTC
python-paste-script-1.7.5-4.fc15 has been pushed to the Fedora 15 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 11 Fedora Update System 2012-04-06 21:25:10 UTC
python-paste-script-1.7.5-4.fc16 has been pushed to the Fedora 16 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 12 Fedora Update System 2012-04-12 01:56:58 UTC
python-paste-script-1.7.5-4.fc17 has been pushed to the Fedora 17 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 14 errata-xmlrpc 2012-08-27 12:48:22 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:1206 https://rhn.redhat.com/errata/RHSA-2012-1206.html


Note You need to log in before you can comment on or make changes to this bug.