pulp.spec in the installation process for Pulp 2.8.3 generates the RSA key pairs used to validate messages between the pulp server and pulp consumers in a directory that is world-readable before later modifying the permissions, which might allow local users to read the generated RSA keys via reading the key files while the installation process is running.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://pkgs.fedoraproject.org/cgit/rpms/pulp.git/tree/pulp.spec#n620 | issue tracking third party advisory patch |
http://pkgs.fedoraproject.org/cgit/rpms/pulp.git/tree/pulp.spec#n317 | issue tracking third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=1326251 | issue tracking patch |
https://bugzilla.redhat.com/attachment.cgi?id=1146522 | issue tracking |
https://access.redhat.com/errata/RHBA-2016:1501 | vendor advisory |
https://pulp.plan.io/issues/1837 | patch vendor advisory |
https://github.com/pulp/pulp/blob/master/pulp.spec#L894-L903 | issue tracking third party advisory patch |
http://www.openwall.com/lists/oss-security/2016/05/20/1 | third party advisory mailing list |
https://github.com/pulp/pulp/blob/master/pulp.spec#L473-L486 | issue tracking third party advisory patch |