pulp.spec in the installation process for Pulp 2.8.3 generates the RSA key pairs used to validate messages between the pulp server and pulp consumers in a directory that is world-readable before later modifying the permissions, which might allow local users to read the generated RSA keys via reading the key files while the installation process is running.
References
Configurations
History
21 Nov 2024, 02:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://pkgs.fedoraproject.org/cgit/rpms/pulp.git/tree/pulp.spec#n317 - Issue Tracking, Patch, Third Party Advisory | |
References | () http://pkgs.fedoraproject.org/cgit/rpms/pulp.git/tree/pulp.spec#n620 - Issue Tracking, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2016/05/20/1 - Mailing List, Third Party Advisory | |
References | () https://access.redhat.com/errata/RHBA-2016:1501 - | |
References | () https://bugzilla.redhat.com/attachment.cgi?id=1146522 - Issue Tracking | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1326251 - Issue Tracking, Patch | |
References | () https://github.com/pulp/pulp/blob/master/pulp.spec#L473-L486 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/pulp/pulp/blob/master/pulp.spec#L894-L903 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://pulp.plan.io/issues/1837 - Patch, Vendor Advisory |
Information
Published : 2017-06-08 18:29
Updated : 2024-11-21 02:49
NVD link : CVE-2016-3111
Mitre link : CVE-2016-3111
CVE.ORG link : CVE-2016-3111
JSON object : View
Products Affected
pulpproject
- pulp
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor