Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 894481 - (CVE-2012-5390) CVE-2012-5390 condor: privilege escalation via jobs submitted to the standard universe (CONDOR-2012-0003)
CVE-2012-5390 condor: privilege escalation via jobs submitted to the standard...
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
high Severity high
: ---
: ---
Assigned To: Red Hat Product Security
impact=important,public=20121022,repo...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2013-01-11 15:56 EST by Vincent Danen
Modified: 2013-01-11 16:03 EST (History)
9 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-01-11 15:59:39 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2013-01-11 15:56:10 EST
As per the upstream advisory:

Condor installations that support Standard Universe jobs and run the daemons on the submit machine as root are vulnerable to local privilege escalation. If a user submits a job into the standard universe, the user job may then execute code on the submit machine as the root user. If your Condor installation does not contain the condor_shadow.std executable, then you are not affected by this vulnerability

The problem exists in the 7.8.X series only.  The 7.6.X series is not affected.  Also, Condor must be started as root otherwise it is not affected.

Current Fedora versions have the fixed version so are not affected.  Red Hat Enterprise MRG provides 7.6.x and is not affected.


Statement:

Not vulnerable. This issue did not affect the versions of condor as shipped with Red Hat Enterprise MRG 1 or 2 as they do not provide a vulnerable version of condor.


External References:

http://research.cs.wisc.edu/htcondor/security/vulnerabilities/CONDOR-2012-0003.html

Note You need to log in before you can comment on or make changes to this bug.