First published: Fri May 27 2016(Updated: )
/var/lib/rhsm/cache/entitlement_status.json and /var/lib/rhsm/facts/facts.json are world readable but contain sensitive information (Red Hat Contract number and hardware serial number, sufficient to authenticate again Red Hat and hardware vendor support) can could be used by an attacker to perform a social engineering attack. Upstream patch: <a href="https://github.com/candlepin/subscription-manager/commit/9dec31">https://github.com/candlepin/subscription-manager/commit/9dec31</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Subscription Manager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1340525 is considered high due to the exposure of sensitive information.
To fix REDHAT-BUG-1340525, ensure that the files /var/lib/rhsm/cache/entitlement_status.json and /var/lib/rhsm/facts/facts.json are set to have restricted permissions.
Users of Red Hat Subscription Manager are affected by REDHAT-BUG-1340525.
REDHAT-BUG-1340525 exposes sensitive information such as Red Hat Contract numbers and hardware serial numbers.
An attacker could use the exposed information from REDHAT-BUG-1340525 to authenticate with Red Hat and the hardware vendor for malicious purposes.