Vulnerability Description
pulp.spec in the installation process for Pulp 2.8.3 generates the RSA key pairs used to validate messages between the pulp server and pulp consumers in a directory that is world-readable before later modifying the permissions, which might allow local users to read the generated RSA keys via reading the key files while the installation process is running.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pulpproject | Pulp | <= 2.8.2-1 |
Related Weaknesses (CWE)
References
- http://pkgs.fedoraproject.org/cgit/rpms/pulp.git/tree/pulp.spec#n317Issue TrackingPatchThird Party Advisory
- http://pkgs.fedoraproject.org/cgit/rpms/pulp.git/tree/pulp.spec#n620Issue TrackingPatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2016/05/20/1Mailing ListThird Party Advisory
- https://access.redhat.com/errata/RHBA-2016:1501
- https://bugzilla.redhat.com/attachment.cgi?id=1146522Issue Tracking
- https://bugzilla.redhat.com/show_bug.cgi?id=1326251Issue TrackingPatch
- https://github.com/pulp/pulp/blob/master/pulp.spec#L473-L486Issue TrackingPatchThird Party Advisory
- https://github.com/pulp/pulp/blob/master/pulp.spec#L894-L903Issue TrackingPatchThird Party Advisory
- https://pulp.plan.io/issues/1837PatchVendor Advisory
- http://pkgs.fedoraproject.org/cgit/rpms/pulp.git/tree/pulp.spec#n317Issue TrackingPatchThird Party Advisory
- http://pkgs.fedoraproject.org/cgit/rpms/pulp.git/tree/pulp.spec#n620Issue TrackingPatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2016/05/20/1Mailing ListThird Party Advisory
- https://access.redhat.com/errata/RHBA-2016:1501
- https://bugzilla.redhat.com/attachment.cgi?id=1146522Issue Tracking
- https://bugzilla.redhat.com/show_bug.cgi?id=1326251Issue TrackingPatch
FAQ
What is CVE-2016-3111?
CVE-2016-3111 is a vulnerability with a CVSS score of 5.5 (MEDIUM). pulp.spec in the installation process for Pulp 2.8.3 generates the RSA key pairs used to validate messages between the pulp server and pulp consumers in a directory that is world-readable before later...
How severe is CVE-2016-3111?
CVE-2016-3111 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-3111?
Check the references section above for vendor advisories and patch information. Affected products include: Pulpproject Pulp.