Pulp before 2.8.5 uses bash's $RANDOM in an unsafe way to generate passwords.
References
Link | Resource |
---|---|
https://pulp.plan.io/issues/1858 | Issue Tracking Patch Vendor Advisory |
https://github.com/pulp/pulp/blob/pulp-2.8.2-1/server/bin/pulp-qpid-ssl-cfg#L97-L105 | Issue Tracking Patch Third Party Advisory |
https://github.com/pulp/pulp/blob/pulp-2.8.2-1/server/bin/pulp-qpid-ssl-cfg#L25 | Issue Tracking Third Party Advisory Patch |
https://docs.pulpproject.org/user-guide/release-notes/2.8.x.html#pulp-2-8-5 | Permissions Required |
https://bugzilla.redhat.com/show_bug.cgi?id=1330264 | Issue Tracking Patch |
https://access.redhat.com/errata/RHSA-2018:0336 | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YM2LCC7QBRCK4LTN5EZT5OHTVAR3MYTY/ |
Information
Published : 2017-06-13 10:29
Updated : 2023-02-12 15:18
NVD link : CVE-2016-3704
Mitre link : CVE-2016-3704
JSON object : View
CWE
CWE-255
Credentials Management Errors
Products Affected
pulpproject
- pulp
fedoraproject
- fedora