A local privilege escalation flaw was found in the way Cobbler, a network install server, performed management of its egg cache. A local attacker able to trick the administrator to run cobbler with specially-crafted PYTHON_EGG_CACHE content could use this flaw to escalate their privileges and potentially execute arbitrary code with the privileges of privileged system user (root). References: [1] https://bugs.launchpad.net/ubuntu/+source/cobbler/+bug/858875 CVE Request: [2] http://www.openwall.com/lists/oss-security/2012/04/12/6 Upstream ticket: [3] https://fedorahosted.org/cobbler/ticket/688 Relevant upstream patch: [4] https://d-feet.fedorahosted.org/cobbler/attachment/ticket/688/58_fix_egg_cache.patch
This issue affects the versions of the cobbler package, as shipped with Fedora EPEL 5 and Fedora EPEL 6. Please schedule an update. As of right now, this issue did NOT affect the current versions of the cobbler package, as shipped with Fedora release of 15 and 16 (the cobbler-2.0.11-3.* versions). But since there are cobbler-2.2.2-1.fc* versions scheduled to get next stable versions and these are affected too, please schedule Fedora release 15 and 16 cobbler package versions updates too.
This issue did NOT affect the version of the cobbler package, as shipped with Red Hat Network Satellite Server version 5.4.1 for Red Hat Enterprise Linux 5 and 6.
Created cobbler tracking bugs for this issue Affects: fedora-all [bug 811942] Affects: epel-all [bug 811943]
Added CVE as per http://www.openwall.com/lists/oss-security/2012/04/12/10
Statement: This issue did not affect the version of cobbler as shipped with Red Hat Network Satellite Server 5.4 as it did not include the upstream commit be4fc806637cf8cec275fea80b892182879580eb that introduced this flaw.