Pulp before 2.8.5 uses bash's $RANDOM in an unsafe way to generate passwords.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2018:0336 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1330264 | Issue Tracking Patch |
https://docs.pulpproject.org/user-guide/release-notes/2.8.x.html#pulp-2-8-5 | Permissions Required |
https://github.com/pulp/pulp/blob/pulp-2.8.2-1/server/bin/pulp-qpid-ssl-cfg#L25 | Issue Tracking Third Party Advisory Patch |
https://github.com/pulp/pulp/blob/pulp-2.8.2-1/server/bin/pulp-qpid-ssl-cfg#L97-L105 | Issue Tracking Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YM2LCC7QBRCK4LTN5EZT5OHTVAR3MYTY/ | |
https://pulp.plan.io/issues/1858 | Issue Tracking Patch Vendor Advisory |
Configurations
History
12 Feb 2023, 23:18
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Pulp before 2.8.5 uses bash's $RANDOM in an unsafe way to generate passwords. |
02 Feb 2023, 21:16
Type | Values Removed | Values Added |
---|---|---|
Summary | Pulp makes unsafe use of Bash's $RANDOM to generate a NSS DB password and seed resulting in insufficient randomness. An attacker could potentially guess the seed used given enough time and compute resources. | |
References |
|
|
References | (MISC) https://github.com/pulp/pulp/blob/pulp-2.8.2-1/server/bin/pulp-qpid-ssl-cfg#L25 - Issue Tracking, Third Party Advisory, Patch |
Information
Published : 2017-06-13 17:29
Updated : 2023-12-10 12:15
NVD link : CVE-2016-3704
Mitre link : CVE-2016-3704
CVE.ORG link : CVE-2016-3704
JSON object : View
Products Affected
pulpproject
- pulp
fedoraproject
- fedora
CWE
CWE-255
Credentials Management Errors