Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 04 May 2012 10:10:05 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Jan Lieskovsky <jlieskov@...hat.com>,
        "Steven M. Christey" <coley@...us.mitre.org>,
        Peter Jones <pjones@...hat.com>
Subject: Re: CVE Request -- anaconda: Weak permissions by writing
 password configuration file in bootloader configuration module

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 05/04/2012 10:06 AM, Jan Lieskovsky wrote:
> Hello Kurt, Steve, vendors,
> 
> a security flaw was found in the way bootloader configuration
> module of Anaconda, a graphical system installer, stored password
> hashes when performing write of password configuration file (0755
> permissions were used instead of 0700 ones). A local users could
> use this flaw to obtain password hashes and conduct brute force
> password guessing attacks (possibly leading to password 
> circumvention, machine reboot or use of custom kernel or initrd
> command line parameters).
> 
> Upstream patch: [1] 
> http://git.fedorahosted.org/git/?p=anaconda.git;a=commit;h=03ef13b625cc06873a924e0610340f8489fd92df
>
> 
> 
> References: [2] https://bugzilla.redhat.com/show_bug.cgi?id=819031
> 
> Could you allocate a CVE identifier for this?
> 
> Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat
> Security Response Team

Please use CVE-2012-2314 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=3W0O
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ