Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <4FA3FE7C.2010101@redhat.com>
Date: Fri, 04 May 2012 18:06:20 +0200
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: oss-security@...ts.openwall.com, Peter Jones <pjones@...hat.com>
Subject: CVE Request -- anaconda: Weak permissions by writing password configuration
 file in bootloader configuration module

Hello Kurt, Steve, vendors,

   a security flaw was found in the way bootloader configuration module of
Anaconda, a graphical system installer, stored password hashes when performing
write of password configuration file (0755 permissions were used instead of
0700 ones). A local users could use this flaw to obtain password hashes and
conduct brute force password guessing attacks (possibly leading to password
circumvention, machine reboot or use of custom kernel or initrd command line
parameters).

Upstream patch:
[1] http://git.fedorahosted.org/git/?p=anaconda.git;a=commit;h=03ef13b625cc06873a924e0610340f8489fd92df

References:
[2] https://bugzilla.redhat.com/show_bug.cgi?id=819031

Could you allocate a CVE identifier for this?

Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.