First published: Tue Apr 12 2016(Updated: )
It was found that spec file generating RSA keys, used for authenticating messages between server and consumers, as post installation step does this in world-readable directories for a brief moment. Vulnerable code: <a href="https://github.com/pulp/pulp/blob/master/pulp.spec#L473-L486">https://github.com/pulp/pulp/blob/master/pulp.spec#L473-L486</a> <a href="https://github.com/pulp/pulp/blob/master/pulp.spec#L894-L903">https://github.com/pulp/pulp/blob/master/pulp.spec#L894-L903</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pulp Project | <=2.8.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3111 has been rated as a low-severity vulnerability due to the brief exposure of RSA keys in world-readable directories.
To fix CVE-2016-3111, ensure the generation of RSA keys occurs in a secure, non-world-readable directory during the post-installation process.
CVE-2016-3111 affects all versions of the Pulp Project up to and including 2.8.2-1.
CVE-2016-3111 is classified as an exposure of sensitive information vulnerability.
CVE-2016-3111 is not directly exploitable remotely, but it poses a risk if an attacker gains access to the server during the key generation phase.