Project

General

Profile

Actions

Bug #4648

closed

CVE-2014-0135 - Kafo does not handle default_values.yaml securely

Added by Marek Hulán about 10 years ago. Updated almost 6 years ago.

Status:
Closed
Priority:
Normal
Assignee:
Target version:
Difficulty:
Triaged:
Fixed in Releases:
Found in Releases:

Description

/tmp/default_values.yaml file has world readable permissions and does not check for existence when it's being created. Therefore it's prone to race-condition attacks. This file contains default values for all parameters (usually autogenerated passwords)

Proposed fix steps:
  1. we'll use mktmpdir which will be passed to kafo_configure puppet module as a parameter
  2. kafo_configure puppet module will safely create file (check for non-existence, create file with 0600, then dumps data)
  3. packages (rpm, deb, gem) will remove any existing /tmp/default_values.yaml

Files

0001-Fix-4648-store-default-values-securely.patch 0001-Fix-4648-store-default-values-securely.patch 3.62 KB fix for review Marek Hulán, 03/13/2014 03:46 PM
0001-Fix-4648-store-default-values-securely.patch 0001-Fix-4648-store-default-values-securely.patch 3.96 KB fixed file creation race condition Marek Hulán, 03/14/2014 07:34 AM
Actions

Also available in: Atom PDF