First published: Thu Mar 31 2016(Updated: )
It was found that newly generated CA keys by running pulp-gen-ca-certificate (which is run by spec file when pulp is installed) script are insufficiently protected against reading by other users for the time the script runs. Vulnerable code: <a href="https://github.com/pulp/pulp/blob/2.8.0/server/bin/pulp-gen-ca-certificate">https://github.com/pulp/pulp/blob/2.8.0/server/bin/pulp-gen-ca-certificate</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =24 | |
Pulp Project | <=2.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3095 has a medium severity rating due to insufficient protection of newly generated CA keys.
To fix CVE-2016-3095, update to Pulp version 2.8.2 or later where the vulnerability has been addressed.
CVE-2016-3095 affects Pulp versions up to and including 2.8.1.
Fedora version 24 is identified as vulnerable to CVE-2016-3095.
The impact of CVE-2016-3095 allows unauthorized users to read sensitive CA keys, potentially compromising system security.