Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-14019 (GCVE-0-2020-14019)
Vulnerability from cvelistv5 – Published: 2020-06-19 10:49 – Updated: 2024-08-04 12:32- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T12:32:14.618Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/open-iscsi/rtslib-fb/pull/162"
},
{
"name": "FEDORA-2020-46ec9e748b",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNMCV2DJJTX345YYBXAMJBXNNVUZQ5UH/"
},
{
"name": "openSUSE-SU-2020:1156",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-08-07T11:06:04.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/open-iscsi/rtslib-fb/pull/162"
},
{
"name": "FEDORA-2020-46ec9e748b",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNMCV2DJJTX345YYBXAMJBXNNVUZQ5UH/"
},
{
"name": "openSUSE-SU-2020:1156",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-14019",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/open-iscsi/rtslib-fb/pull/162",
"refsource": "MISC",
"url": "https://github.com/open-iscsi/rtslib-fb/pull/162"
},
{
"name": "FEDORA-2020-46ec9e748b",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNMCV2DJJTX345YYBXAMJBXNNVUZQ5UH/"
},
{
"name": "openSUSE-SU-2020:1156",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2020-14019",
"datePublished": "2020-06-19T10:49:59.000Z",
"dateReserved": "2020-06-11T00:00:00.000Z",
"dateUpdated": "2024-08-04T12:32:14.618Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2020-14019",
"date": "2026-04-25",
"epss": "0.00103",
"percentile": "0.27977"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rtslib-fb_project:rtslib-fb:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"2.1.72\", \"matchCriteriaId\": \"8CB9C6D5-0AF3-4E04-A274-E0DF3A582B1C\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.\"}, {\"lang\": \"es\", \"value\": \"Open-iSCSI rtslib-fb versiones hasta 2.1.72, presenta permisos d\\u00e9biles para el archivo /etc/target/saveconfig.json porque es usado un shutil.copyfile (en lugar de shutil.copy) y, por lo tanto, los permisos no son conservados\"}]",
"id": "CVE-2020-14019",
"lastModified": "2024-11-21T05:02:21.937",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-06-19T11:15:10.260",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://github.com/open-iscsi/rtslib-fb/pull/162\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNMCV2DJJTX345YYBXAMJBXNNVUZQ5UH/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://github.com/open-iscsi/rtslib-fb/pull/162\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNMCV2DJJTX345YYBXAMJBXNNVUZQ5UH/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-276\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-14019\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-06-19T11:15:10.260\",\"lastModified\":\"2024-11-21T05:02:21.937\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.\"},{\"lang\":\"es\",\"value\":\"Open-iSCSI rtslib-fb versiones hasta 2.1.72, presenta permisos d\u00e9biles para el archivo /etc/target/saveconfig.json porque es usado un shutil.copyfile (en lugar de shutil.copy) y, por lo tanto, los permisos no son conservados\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-276\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rtslib-fb_project:rtslib-fb:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.1.72\",\"matchCriteriaId\":\"8CB9C6D5-0AF3-4E04-A274-E0DF3A582B1C\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://github.com/open-iscsi/rtslib-fb/pull/162\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNMCV2DJJTX345YYBXAMJBXNNVUZQ5UH/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/open-iscsi/rtslib-fb/pull/162\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNMCV2DJJTX345YYBXAMJBXNNVUZQ5UH/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
BDU:2020-03828
Vulnerability from fstec - Published: 29.07.2020{
"CVSS 2.0": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7.0.0 (Red Hat Process Automation Manager), 7.1.0 (Red Hat Process Automation Manager), 7.2.0 (Red Hat Process Automation Manager), 7.3.0 (Red Hat Process Automation Manager), 7.4.0 (Red Hat Process Automation Manager), 7.5.0 (Red Hat Process Automation Manager), 7.6.0 (Red Hat Process Automation Manager), 7.7.0 (Red Hat Process Automation Manager), \u0434\u043e 2.1.72 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (rtslib-fb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\n\u0414\u043b\u044f Red Hat Process Automation Manager: \nhttps://access.redhat.com/errata/RHSA-2020:3197",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "29.07.2020",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "12.08.2020",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "12.08.2020",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2020-03828",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2020-14019",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Process Automation Manager, rtslib-fb",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 rtslib-fb, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u043c\u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0430\u043c\u0438 \u043f\u0440\u0430\u0432 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0435 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0435 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u044f (CWE-276)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 /etc/target/saveconfig.json \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 rtslib-fb \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u043c\u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0430\u043c\u0438 \u043f\u0440\u0430\u0432 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044e",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0417\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u043e\u043c",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://access.redhat.com/errata/RHSA-2020:3197\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-14019\nhttps://safe-surf.ru/upload/VULN/VULN-20200803.2.pdf",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-276",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,2)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)"
}
RHEA-2020_4505
Vulnerability from csaf_redhat - Published: 2020-11-04 02:15 - Updated: 2024-11-22 15:07A flaw was found in Open-iSCSI rtslib-fb through versions 2.1.72, where it has weak permissions for /etc/target/saveconfig.json because the shutil.copyfile, instead of shutil.copy is used, and permissions are not preserved upon editing. This flaw allows an attacker with prior access to /etc/target/saveconfig.json to access a later version, resulting in a loss of integrity, depending on their permission settings. The highest threat from this vulnerability is to confidentiality.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-rtslib is now available for Red Hat Enterprise Linux\n8.",
"title": "Topic"
},
{
"category": "general",
"text": "For detailed information on changes in this release, see the Red Hat\nEnterprise Linux 8.3 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHEA-2020:4505",
"url": "https://access.redhat.com/errata/RHEA-2020:4505"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index"
},
{
"category": "external",
"summary": "1820170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820170"
},
{
"category": "external",
"summary": "1849651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849651"
},
{
"category": "external",
"summary": "1858856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858856"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhea-2020_4505.json"
}
],
"title": "Red Hat Enhancement Advisory: python-rtslib bug fix and enhancement update",
"tracking": {
"current_release_date": "2024-11-22T15:07:09+00:00",
"generator": {
"date": "2024-11-22T15:07:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHEA-2020:4505",
"initial_release_date": "2020-11-04T02:15:29+00:00",
"revision_history": [
{
"date": "2020-11-04T02:15:29+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-11-04T02:15:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:07:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-rtslib-0:2.1.73-2.el8.src",
"product": {
"name": "python-rtslib-0:2.1.73-2.el8.src",
"product_id": "python-rtslib-0:2.1.73-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-rtslib@2.1.73-2.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-rtslib-0:2.1.73-2.el8.noarch",
"product": {
"name": "python3-rtslib-0:2.1.73-2.el8.noarch",
"product_id": "python3-rtslib-0:2.1.73-2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rtslib@2.1.73-2.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "target-restore-0:2.1.73-2.el8.noarch",
"product": {
"name": "target-restore-0:2.1.73-2.el8.noarch",
"product_id": "target-restore-0:2.1.73-2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/target-restore@2.1.73-2.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.73-2.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.GA:python-rtslib-0:2.1.73-2.el8.src"
},
"product_reference": "python-rtslib-0:2.1.73-2.el8.src",
"relates_to_product_reference": "BaseOS-8.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rtslib-0:2.1.73-2.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.GA:python3-rtslib-0:2.1.73-2.el8.noarch"
},
"product_reference": "python3-rtslib-0:2.1.73-2.el8.noarch",
"relates_to_product_reference": "BaseOS-8.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "target-restore-0:2.1.73-2.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.GA:target-restore-0:2.1.73-2.el8.noarch"
},
"product_reference": "target-restore-0:2.1.73-2.el8.noarch",
"relates_to_product_reference": "BaseOS-8.3.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14019",
"cwe": {
"id": "CWE-282",
"name": "Improper Ownership Management"
},
"discovery_date": "2020-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1854723"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Open-iSCSI rtslib-fb through versions 2.1.72, where it has weak permissions for /etc/target/saveconfig.json because the shutil.copyfile, instead of shutil.copy is used, and permissions are not preserved upon editing. This flaw allows an attacker with prior access to /etc/target/saveconfig.json to access a later version, resulting in a loss of integrity, depending on their permission settings. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-rtslib: weak permissions for /etc/target/saveconfig.json",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Ceph Storage 2 and 3 are not affected because within the affected method, shutil.copyfile is not used. However, the affected method, save_to_file is outdated and contains a race condition. Hence, this issue has been rated as having a security impact of low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.3.0.GA:python-rtslib-0:2.1.73-2.el8.src",
"BaseOS-8.3.0.GA:python3-rtslib-0:2.1.73-2.el8.noarch",
"BaseOS-8.3.0.GA:target-restore-0:2.1.73-2.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14019"
},
{
"category": "external",
"summary": "RHBZ#1854723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854723"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14019",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14019"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14019",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14019"
}
],
"release_date": "2020-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-04T02:15:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.3.0.GA:python-rtslib-0:2.1.73-2.el8.src",
"BaseOS-8.3.0.GA:python3-rtslib-0:2.1.73-2.el8.noarch",
"BaseOS-8.3.0.GA:target-restore-0:2.1.73-2.el8.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHEA-2020:4505"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.3.0.GA:python-rtslib-0:2.1.73-2.el8.src",
"BaseOS-8.3.0.GA:python3-rtslib-0:2.1.73-2.el8.noarch",
"BaseOS-8.3.0.GA:target-restore-0:2.1.73-2.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-rtslib: weak permissions for /etc/target/saveconfig.json"
}
]
}
RHEA-2020:4505
Vulnerability from csaf_redhat - Published: 2020-11-04 02:15 - Updated: 2025-11-21 17:24A flaw was found in Open-iSCSI rtslib-fb through versions 2.1.72, where it has weak permissions for /etc/target/saveconfig.json because the shutil.copyfile, instead of shutil.copy is used, and permissions are not preserved upon editing. This flaw allows an attacker with prior access to /etc/target/saveconfig.json to access a later version, resulting in a loss of integrity, depending on their permission settings. The highest threat from this vulnerability is to confidentiality.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-rtslib is now available for Red Hat Enterprise Linux\n8.",
"title": "Topic"
},
{
"category": "general",
"text": "For detailed information on changes in this release, see the Red Hat\nEnterprise Linux 8.3 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHEA-2020:4505",
"url": "https://access.redhat.com/errata/RHEA-2020:4505"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index"
},
{
"category": "external",
"summary": "1820170",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1820170"
},
{
"category": "external",
"summary": "1849651",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849651"
},
{
"category": "external",
"summary": "1858856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1858856"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhea-2020_4505.json"
}
],
"title": "Red Hat Enhancement Advisory: python-rtslib bug fix and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T17:24:21+00:00",
"generator": {
"date": "2025-11-21T17:24:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHEA-2020:4505",
"initial_release_date": "2020-11-04T02:15:29+00:00",
"revision_history": [
{
"date": "2020-11-04T02:15:29+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-11-04T02:15:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:24:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-rtslib-0:2.1.73-2.el8.src",
"product": {
"name": "python-rtslib-0:2.1.73-2.el8.src",
"product_id": "python-rtslib-0:2.1.73-2.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-rtslib@2.1.73-2.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-rtslib-0:2.1.73-2.el8.noarch",
"product": {
"name": "python3-rtslib-0:2.1.73-2.el8.noarch",
"product_id": "python3-rtslib-0:2.1.73-2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rtslib@2.1.73-2.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "target-restore-0:2.1.73-2.el8.noarch",
"product": {
"name": "target-restore-0:2.1.73-2.el8.noarch",
"product_id": "target-restore-0:2.1.73-2.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/target-restore@2.1.73-2.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.73-2.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.GA:python-rtslib-0:2.1.73-2.el8.src"
},
"product_reference": "python-rtslib-0:2.1.73-2.el8.src",
"relates_to_product_reference": "BaseOS-8.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rtslib-0:2.1.73-2.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.GA:python3-rtslib-0:2.1.73-2.el8.noarch"
},
"product_reference": "python3-rtslib-0:2.1.73-2.el8.noarch",
"relates_to_product_reference": "BaseOS-8.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "target-restore-0:2.1.73-2.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.3.0.GA:target-restore-0:2.1.73-2.el8.noarch"
},
"product_reference": "target-restore-0:2.1.73-2.el8.noarch",
"relates_to_product_reference": "BaseOS-8.3.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14019",
"cwe": {
"id": "CWE-282",
"name": "Improper Ownership Management"
},
"discovery_date": "2020-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1854723"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Open-iSCSI rtslib-fb through versions 2.1.72, where it has weak permissions for /etc/target/saveconfig.json because the shutil.copyfile, instead of shutil.copy is used, and permissions are not preserved upon editing. This flaw allows an attacker with prior access to /etc/target/saveconfig.json to access a later version, resulting in a loss of integrity, depending on their permission settings. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-rtslib: weak permissions for /etc/target/saveconfig.json",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Ceph Storage 2 and 3 are not affected because within the affected method, shutil.copyfile is not used. However, the affected method, save_to_file is outdated and contains a race condition. Hence, this issue has been rated as having a security impact of low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.3.0.GA:python-rtslib-0:2.1.73-2.el8.src",
"BaseOS-8.3.0.GA:python3-rtslib-0:2.1.73-2.el8.noarch",
"BaseOS-8.3.0.GA:target-restore-0:2.1.73-2.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14019"
},
{
"category": "external",
"summary": "RHBZ#1854723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854723"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14019",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14019"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14019",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14019"
}
],
"release_date": "2020-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-11-04T02:15:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.3.0.GA:python-rtslib-0:2.1.73-2.el8.src",
"BaseOS-8.3.0.GA:python3-rtslib-0:2.1.73-2.el8.noarch",
"BaseOS-8.3.0.GA:target-restore-0:2.1.73-2.el8.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHEA-2020:4505"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.3.0.GA:python-rtslib-0:2.1.73-2.el8.src",
"BaseOS-8.3.0.GA:python3-rtslib-0:2.1.73-2.el8.noarch",
"BaseOS-8.3.0.GA:target-restore-0:2.1.73-2.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-rtslib: weak permissions for /etc/target/saveconfig.json"
}
]
}
RHSA-2020:5435
Vulnerability from csaf_redhat - Published: 2020-12-15 15:04 - Updated: 2025-11-21 18:19A flaw was found in Open-iSCSI rtslib-fb through versions 2.1.72, where it has weak permissions for /etc/target/saveconfig.json because the shutil.copyfile, instead of shutil.copy is used, and permissions are not preserved upon editing. This flaw allows an attacker with prior access to /etc/target/saveconfig.json to access a later version, resulting in a loss of integrity, depending on their permission settings. The highest threat from this vulnerability is to confidentiality.
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-rtslib is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The python-rtslib package provides a Python library to configure the kernel target subsystem, using the configfs file system. \n\nThe following packages have been upgraded to a later upstream version: python-rtslib (2.1.74). (BZ#1855171)\n\nSecurity Fix(es):\n\n* python-rtslib: weak permissions for /etc/target/saveconfig.json (CVE-2020-14019)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5435",
"url": "https://access.redhat.com/errata/RHSA-2020:5435"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1854723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854723"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5435.json"
}
],
"title": "Red Hat Security Advisory: python-rtslib security update",
"tracking": {
"current_release_date": "2025-11-21T18:19:05+00:00",
"generator": {
"date": "2025-11-21T18:19:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2020:5435",
"initial_release_date": "2020-12-15T15:04:48+00:00",
"revision_history": [
{
"date": "2020-12-15T15:04:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-15T15:04:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:19:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"product": {
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"product_id": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-rtslib@2.1.74-1.el7_9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"product": {
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"product_id": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-rtslib-doc@2.1.74-1.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python-rtslib-0:2.1.74-1.el7_9.src",
"product": {
"name": "python-rtslib-0:2.1.74-1.el7_9.src",
"product_id": "python-rtslib-0:2.1.74-1.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-rtslib@2.1.74-1.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14019",
"cwe": {
"id": "CWE-282",
"name": "Improper Ownership Management"
},
"discovery_date": "2020-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1854723"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Open-iSCSI rtslib-fb through versions 2.1.72, where it has weak permissions for /etc/target/saveconfig.json because the shutil.copyfile, instead of shutil.copy is used, and permissions are not preserved upon editing. This flaw allows an attacker with prior access to /etc/target/saveconfig.json to access a later version, resulting in a loss of integrity, depending on their permission settings. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-rtslib: weak permissions for /etc/target/saveconfig.json",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Ceph Storage 2 and 3 are not affected because within the affected method, shutil.copyfile is not used. However, the affected method, save_to_file is outdated and contains a race condition. Hence, this issue has been rated as having a security impact of low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Client-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Client-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Client-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Client-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Client-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7ComputeNode-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Server-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Server-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Server-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Server-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Server-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Server-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Workstation-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Workstation-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Workstation-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Workstation-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Workstation-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Workstation-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14019"
},
{
"category": "external",
"summary": "RHBZ#1854723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854723"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14019",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14019"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14019",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14019"
}
],
"release_date": "2020-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-15T15:04:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Client-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Client-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Client-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Client-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Client-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7ComputeNode-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Server-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Server-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Server-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Server-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Server-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Server-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Workstation-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Workstation-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Workstation-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Workstation-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Workstation-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Workstation-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5435"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Client-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Client-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Client-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Client-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Client-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7ComputeNode-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Server-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Server-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Server-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Server-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Server-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Server-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Workstation-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Workstation-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Workstation-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Workstation-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Workstation-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Workstation-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-rtslib: weak permissions for /etc/target/saveconfig.json"
}
]
}
RHSA-2020_5435
Vulnerability from csaf_redhat - Published: 2020-12-15 15:04 - Updated: 2024-11-22 15:07A flaw was found in Open-iSCSI rtslib-fb through versions 2.1.72, where it has weak permissions for /etc/target/saveconfig.json because the shutil.copyfile, instead of shutil.copy is used, and permissions are not preserved upon editing. This flaw allows an attacker with prior access to /etc/target/saveconfig.json to access a later version, resulting in a loss of integrity, depending on their permission settings. The highest threat from this vulnerability is to confidentiality.
| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-rtslib is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The python-rtslib package provides a Python library to configure the kernel target subsystem, using the configfs file system. \n\nThe following packages have been upgraded to a later upstream version: python-rtslib (2.1.74). (BZ#1855171)\n\nSecurity Fix(es):\n\n* python-rtslib: weak permissions for /etc/target/saveconfig.json (CVE-2020-14019)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2020:5435",
"url": "https://access.redhat.com/errata/RHSA-2020:5435"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1854723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854723"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_5435.json"
}
],
"title": "Red Hat Security Advisory: python-rtslib security update",
"tracking": {
"current_release_date": "2024-11-22T15:07:20+00:00",
"generator": {
"date": "2024-11-22T15:07:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2020:5435",
"initial_release_date": "2020-12-15T15:04:48+00:00",
"revision_history": [
{
"date": "2020-12-15T15:04:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2020-12-15T15:04:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T15:07:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"product": {
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"product_id": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-rtslib@2.1.74-1.el7_9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"product": {
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"product_id": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-rtslib-doc@2.1.74-1.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python-rtslib-0:2.1.74-1.el7_9.src",
"product": {
"name": "python-rtslib-0:2.1.74-1.el7_9.src",
"product_id": "python-rtslib-0:2.1.74-1.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-rtslib@2.1.74-1.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.src",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Client-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.src",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Client-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.src",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.src",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Server-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.src",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.src",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Workstation-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-0:2.1.74-1.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src"
},
"product_reference": "python-rtslib-0:2.1.74-1.el7_9.src",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
},
"product_reference": "python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"relates_to_product_reference": "7Workstation-optional-7.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14019",
"cwe": {
"id": "CWE-282",
"name": "Improper Ownership Management"
},
"discovery_date": "2020-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1854723"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Open-iSCSI rtslib-fb through versions 2.1.72, where it has weak permissions for /etc/target/saveconfig.json because the shutil.copyfile, instead of shutil.copy is used, and permissions are not preserved upon editing. This flaw allows an attacker with prior access to /etc/target/saveconfig.json to access a later version, resulting in a loss of integrity, depending on their permission settings. The highest threat from this vulnerability is to confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-rtslib: weak permissions for /etc/target/saveconfig.json",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Ceph Storage 2 and 3 are not affected because within the affected method, shutil.copyfile is not used. However, the affected method, save_to_file is outdated and contains a race condition. Hence, this issue has been rated as having a security impact of low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Client-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Client-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Client-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Client-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Client-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Client-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7ComputeNode-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Server-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Server-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Server-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Server-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Server-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Server-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Workstation-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Workstation-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Workstation-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Workstation-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Workstation-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Workstation-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-14019"
},
{
"category": "external",
"summary": "RHBZ#1854723",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1854723"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-14019",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14019"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-14019",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14019"
}
],
"release_date": "2020-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2020-12-15T15:04:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Client-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Client-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Client-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Client-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Client-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Client-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7ComputeNode-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Server-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Server-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Server-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Server-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Server-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Server-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Workstation-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Workstation-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Workstation-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Workstation-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Workstation-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Workstation-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2020:5435"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"7Client-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Client-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Client-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Client-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Client-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Client-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7ComputeNode-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7ComputeNode-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Server-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Server-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Server-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Server-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Server-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Server-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Workstation-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Workstation-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Workstation-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch",
"7Workstation-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.noarch",
"7Workstation-optional-7.9.Z:python-rtslib-0:2.1.74-1.el7_9.src",
"7Workstation-optional-7.9.Z:python-rtslib-doc-0:2.1.74-1.el7_9.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-rtslib: weak permissions for /etc/target/saveconfig.json"
}
]
}
GSD-2020-14019
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2020-14019",
"description": "Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.",
"id": "GSD-2020-14019",
"references": [
"https://www.suse.com/security/cve/CVE-2020-14019.html",
"https://access.redhat.com/errata/RHSA-2020:5435",
"https://access.redhat.com/errata/RHEA-2020:4505",
"https://advisories.mageia.org/CVE-2020-14019.html",
"https://linux.oracle.com/cve/CVE-2020-14019.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-14019"
],
"details": "Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.",
"id": "GSD-2020-14019",
"modified": "2023-12-13T01:22:00.054196Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-14019",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/open-iscsi/rtslib-fb/pull/162",
"refsource": "MISC",
"url": "https://github.com/open-iscsi/rtslib-fb/pull/162"
},
{
"name": "FEDORA-2020-46ec9e748b",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNMCV2DJJTX345YYBXAMJBXNNVUZQ5UH/"
},
{
"name": "openSUSE-SU-2020:1156",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c=2.1.72",
"affected_versions": "All versions up to 2.1.72",
"cvss_v2": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-276",
"CWE-937"
],
"date": "2020-08-07",
"description": "Open-iSCSI rtslib-fb has weak permissions for `/etc/target/saveconfig.json` because `shutil.copyfile` (instead of `shutil.copy`) is used, and thus permissions are not preserved.",
"fixed_versions": [
"2.1.73"
],
"identifier": "CVE-2020-14019",
"identifiers": [
"CVE-2020-14019"
],
"not_impacted": "All versions after 2.1.72",
"package_slug": "pypi/rtslib-fb",
"pubdate": "2020-06-19",
"solution": "Upgrade to version 2.1.73 or above.",
"title": "Incorrect Default Permissions",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2020-14019"
],
"uuid": "0a21e316-0d43-457f-b415-89f964432a4d"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rtslib-fb_project:rtslib-fb:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.1.72",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2020-14019"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/open-iscsi/rtslib-fb/pull/162",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/open-iscsi/rtslib-fb/pull/162"
},
{
"name": "FEDORA-2020-46ec9e748b",
"refsource": "FEDORA",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNMCV2DJJTX345YYBXAMJBXNNVUZQ5UH/"
},
{
"name": "openSUSE-SU-2020:1156",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2020-08-07T12:15Z",
"publishedDate": "2020-06-19T11:15Z"
}
}
}
FKIE_CVE-2020-14019
Vulnerability from fkie_nvd - Published: 2020-06-19 11:15 - Updated: 2024-11-21 05:02| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html | ||
| cve@mitre.org | https://github.com/open-iscsi/rtslib-fb/pull/162 | Third Party Advisory | |
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNMCV2DJJTX345YYBXAMJBXNNVUZQ5UH/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/open-iscsi/rtslib-fb/pull/162 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNMCV2DJJTX345YYBXAMJBXNNVUZQ5UH/ |
| Vendor | Product | Version | |
|---|---|---|---|
| rtslib-fb_project | rtslib-fb | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rtslib-fb_project:rtslib-fb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB9C6D5-0AF3-4E04-A274-E0DF3A582B1C",
"versionEndIncluding": "2.1.72",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved."
},
{
"lang": "es",
"value": "Open-iSCSI rtslib-fb versiones hasta 2.1.72, presenta permisos d\u00e9biles para el archivo /etc/target/saveconfig.json porque es usado un shutil.copyfile (en lugar de shutil.copy) y, por lo tanto, los permisos no son conservados"
}
],
"id": "CVE-2020-14019",
"lastModified": "2024-11-21T05:02:21.937",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-06-19T11:15:10.260",
"references": [
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/open-iscsi/rtslib-fb/pull/162"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNMCV2DJJTX345YYBXAMJBXNNVUZQ5UH/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/open-iscsi/rtslib-fb/pull/162"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TNMCV2DJJTX345YYBXAMJBXNNVUZQ5UH/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-276"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
OPENSUSE-SU-2024:11270-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python-rtslib-fb-common-2.1.74-2.7 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python-rtslib-fb-common-2.1.74-2.7 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11270",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11270-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14019 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14019/"
}
],
"title": "python-rtslib-fb-common-2.1.74-2.7 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11270-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python-rtslib-fb-common-2.1.74-2.7.aarch64",
"product": {
"name": "python-rtslib-fb-common-2.1.74-2.7.aarch64",
"product_id": "python-rtslib-fb-common-2.1.74-2.7.aarch64"
}
},
{
"category": "product_version",
"name": "python36-rtslib-fb-2.1.74-2.7.aarch64",
"product": {
"name": "python36-rtslib-fb-2.1.74-2.7.aarch64",
"product_id": "python36-rtslib-fb-2.1.74-2.7.aarch64"
}
},
{
"category": "product_version",
"name": "python38-rtslib-fb-2.1.74-2.7.aarch64",
"product": {
"name": "python38-rtslib-fb-2.1.74-2.7.aarch64",
"product_id": "python38-rtslib-fb-2.1.74-2.7.aarch64"
}
},
{
"category": "product_version",
"name": "python39-rtslib-fb-2.1.74-2.7.aarch64",
"product": {
"name": "python39-rtslib-fb-2.1.74-2.7.aarch64",
"product_id": "python39-rtslib-fb-2.1.74-2.7.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-rtslib-fb-common-2.1.74-2.7.ppc64le",
"product": {
"name": "python-rtslib-fb-common-2.1.74-2.7.ppc64le",
"product_id": "python-rtslib-fb-common-2.1.74-2.7.ppc64le"
}
},
{
"category": "product_version",
"name": "python36-rtslib-fb-2.1.74-2.7.ppc64le",
"product": {
"name": "python36-rtslib-fb-2.1.74-2.7.ppc64le",
"product_id": "python36-rtslib-fb-2.1.74-2.7.ppc64le"
}
},
{
"category": "product_version",
"name": "python38-rtslib-fb-2.1.74-2.7.ppc64le",
"product": {
"name": "python38-rtslib-fb-2.1.74-2.7.ppc64le",
"product_id": "python38-rtslib-fb-2.1.74-2.7.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-rtslib-fb-2.1.74-2.7.ppc64le",
"product": {
"name": "python39-rtslib-fb-2.1.74-2.7.ppc64le",
"product_id": "python39-rtslib-fb-2.1.74-2.7.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python-rtslib-fb-common-2.1.74-2.7.s390x",
"product": {
"name": "python-rtslib-fb-common-2.1.74-2.7.s390x",
"product_id": "python-rtslib-fb-common-2.1.74-2.7.s390x"
}
},
{
"category": "product_version",
"name": "python36-rtslib-fb-2.1.74-2.7.s390x",
"product": {
"name": "python36-rtslib-fb-2.1.74-2.7.s390x",
"product_id": "python36-rtslib-fb-2.1.74-2.7.s390x"
}
},
{
"category": "product_version",
"name": "python38-rtslib-fb-2.1.74-2.7.s390x",
"product": {
"name": "python38-rtslib-fb-2.1.74-2.7.s390x",
"product_id": "python38-rtslib-fb-2.1.74-2.7.s390x"
}
},
{
"category": "product_version",
"name": "python39-rtslib-fb-2.1.74-2.7.s390x",
"product": {
"name": "python39-rtslib-fb-2.1.74-2.7.s390x",
"product_id": "python39-rtslib-fb-2.1.74-2.7.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python-rtslib-fb-common-2.1.74-2.7.x86_64",
"product": {
"name": "python-rtslib-fb-common-2.1.74-2.7.x86_64",
"product_id": "python-rtslib-fb-common-2.1.74-2.7.x86_64"
}
},
{
"category": "product_version",
"name": "python36-rtslib-fb-2.1.74-2.7.x86_64",
"product": {
"name": "python36-rtslib-fb-2.1.74-2.7.x86_64",
"product_id": "python36-rtslib-fb-2.1.74-2.7.x86_64"
}
},
{
"category": "product_version",
"name": "python38-rtslib-fb-2.1.74-2.7.x86_64",
"product": {
"name": "python38-rtslib-fb-2.1.74-2.7.x86_64",
"product_id": "python38-rtslib-fb-2.1.74-2.7.x86_64"
}
},
{
"category": "product_version",
"name": "python39-rtslib-fb-2.1.74-2.7.x86_64",
"product": {
"name": "python39-rtslib-fb-2.1.74-2.7.x86_64",
"product_id": "python39-rtslib-fb-2.1.74-2.7.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-fb-common-2.1.74-2.7.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-rtslib-fb-common-2.1.74-2.7.aarch64"
},
"product_reference": "python-rtslib-fb-common-2.1.74-2.7.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-fb-common-2.1.74-2.7.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-rtslib-fb-common-2.1.74-2.7.ppc64le"
},
"product_reference": "python-rtslib-fb-common-2.1.74-2.7.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-fb-common-2.1.74-2.7.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-rtslib-fb-common-2.1.74-2.7.s390x"
},
"product_reference": "python-rtslib-fb-common-2.1.74-2.7.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-rtslib-fb-common-2.1.74-2.7.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python-rtslib-fb-common-2.1.74-2.7.x86_64"
},
"product_reference": "python-rtslib-fb-common-2.1.74-2.7.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-rtslib-fb-2.1.74-2.7.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-rtslib-fb-2.1.74-2.7.aarch64"
},
"product_reference": "python36-rtslib-fb-2.1.74-2.7.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-rtslib-fb-2.1.74-2.7.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-rtslib-fb-2.1.74-2.7.ppc64le"
},
"product_reference": "python36-rtslib-fb-2.1.74-2.7.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-rtslib-fb-2.1.74-2.7.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-rtslib-fb-2.1.74-2.7.s390x"
},
"product_reference": "python36-rtslib-fb-2.1.74-2.7.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python36-rtslib-fb-2.1.74-2.7.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python36-rtslib-fb-2.1.74-2.7.x86_64"
},
"product_reference": "python36-rtslib-fb-2.1.74-2.7.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-rtslib-fb-2.1.74-2.7.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-rtslib-fb-2.1.74-2.7.aarch64"
},
"product_reference": "python38-rtslib-fb-2.1.74-2.7.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-rtslib-fb-2.1.74-2.7.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-rtslib-fb-2.1.74-2.7.ppc64le"
},
"product_reference": "python38-rtslib-fb-2.1.74-2.7.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-rtslib-fb-2.1.74-2.7.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-rtslib-fb-2.1.74-2.7.s390x"
},
"product_reference": "python38-rtslib-fb-2.1.74-2.7.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python38-rtslib-fb-2.1.74-2.7.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python38-rtslib-fb-2.1.74-2.7.x86_64"
},
"product_reference": "python38-rtslib-fb-2.1.74-2.7.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rtslib-fb-2.1.74-2.7.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-rtslib-fb-2.1.74-2.7.aarch64"
},
"product_reference": "python39-rtslib-fb-2.1.74-2.7.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rtslib-fb-2.1.74-2.7.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-rtslib-fb-2.1.74-2.7.ppc64le"
},
"product_reference": "python39-rtslib-fb-2.1.74-2.7.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rtslib-fb-2.1.74-2.7.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-rtslib-fb-2.1.74-2.7.s390x"
},
"product_reference": "python39-rtslib-fb-2.1.74-2.7.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-rtslib-fb-2.1.74-2.7.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-rtslib-fb-2.1.74-2.7.x86_64"
},
"product_reference": "python39-rtslib-fb-2.1.74-2.7.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14019",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14019"
}
],
"notes": [
{
"category": "general",
"text": "Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python-rtslib-fb-common-2.1.74-2.7.aarch64",
"openSUSE Tumbleweed:python-rtslib-fb-common-2.1.74-2.7.ppc64le",
"openSUSE Tumbleweed:python-rtslib-fb-common-2.1.74-2.7.s390x",
"openSUSE Tumbleweed:python-rtslib-fb-common-2.1.74-2.7.x86_64",
"openSUSE Tumbleweed:python36-rtslib-fb-2.1.74-2.7.aarch64",
"openSUSE Tumbleweed:python36-rtslib-fb-2.1.74-2.7.ppc64le",
"openSUSE Tumbleweed:python36-rtslib-fb-2.1.74-2.7.s390x",
"openSUSE Tumbleweed:python36-rtslib-fb-2.1.74-2.7.x86_64",
"openSUSE Tumbleweed:python38-rtslib-fb-2.1.74-2.7.aarch64",
"openSUSE Tumbleweed:python38-rtslib-fb-2.1.74-2.7.ppc64le",
"openSUSE Tumbleweed:python38-rtslib-fb-2.1.74-2.7.s390x",
"openSUSE Tumbleweed:python38-rtslib-fb-2.1.74-2.7.x86_64",
"openSUSE Tumbleweed:python39-rtslib-fb-2.1.74-2.7.aarch64",
"openSUSE Tumbleweed:python39-rtslib-fb-2.1.74-2.7.ppc64le",
"openSUSE Tumbleweed:python39-rtslib-fb-2.1.74-2.7.s390x",
"openSUSE Tumbleweed:python39-rtslib-fb-2.1.74-2.7.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14019",
"url": "https://www.suse.com/security/cve/CVE-2020-14019"
},
{
"category": "external",
"summary": "SUSE Bug 1173257 for CVE-2020-14019",
"url": "https://bugzilla.suse.com/1173257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python-rtslib-fb-common-2.1.74-2.7.aarch64",
"openSUSE Tumbleweed:python-rtslib-fb-common-2.1.74-2.7.ppc64le",
"openSUSE Tumbleweed:python-rtslib-fb-common-2.1.74-2.7.s390x",
"openSUSE Tumbleweed:python-rtslib-fb-common-2.1.74-2.7.x86_64",
"openSUSE Tumbleweed:python36-rtslib-fb-2.1.74-2.7.aarch64",
"openSUSE Tumbleweed:python36-rtslib-fb-2.1.74-2.7.ppc64le",
"openSUSE Tumbleweed:python36-rtslib-fb-2.1.74-2.7.s390x",
"openSUSE Tumbleweed:python36-rtslib-fb-2.1.74-2.7.x86_64",
"openSUSE Tumbleweed:python38-rtslib-fb-2.1.74-2.7.aarch64",
"openSUSE Tumbleweed:python38-rtslib-fb-2.1.74-2.7.ppc64le",
"openSUSE Tumbleweed:python38-rtslib-fb-2.1.74-2.7.s390x",
"openSUSE Tumbleweed:python38-rtslib-fb-2.1.74-2.7.x86_64",
"openSUSE Tumbleweed:python39-rtslib-fb-2.1.74-2.7.aarch64",
"openSUSE Tumbleweed:python39-rtslib-fb-2.1.74-2.7.ppc64le",
"openSUSE Tumbleweed:python39-rtslib-fb-2.1.74-2.7.s390x",
"openSUSE Tumbleweed:python39-rtslib-fb-2.1.74-2.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python-rtslib-fb-common-2.1.74-2.7.aarch64",
"openSUSE Tumbleweed:python-rtslib-fb-common-2.1.74-2.7.ppc64le",
"openSUSE Tumbleweed:python-rtslib-fb-common-2.1.74-2.7.s390x",
"openSUSE Tumbleweed:python-rtslib-fb-common-2.1.74-2.7.x86_64",
"openSUSE Tumbleweed:python36-rtslib-fb-2.1.74-2.7.aarch64",
"openSUSE Tumbleweed:python36-rtslib-fb-2.1.74-2.7.ppc64le",
"openSUSE Tumbleweed:python36-rtslib-fb-2.1.74-2.7.s390x",
"openSUSE Tumbleweed:python36-rtslib-fb-2.1.74-2.7.x86_64",
"openSUSE Tumbleweed:python38-rtslib-fb-2.1.74-2.7.aarch64",
"openSUSE Tumbleweed:python38-rtslib-fb-2.1.74-2.7.ppc64le",
"openSUSE Tumbleweed:python38-rtslib-fb-2.1.74-2.7.s390x",
"openSUSE Tumbleweed:python38-rtslib-fb-2.1.74-2.7.x86_64",
"openSUSE Tumbleweed:python39-rtslib-fb-2.1.74-2.7.aarch64",
"openSUSE Tumbleweed:python39-rtslib-fb-2.1.74-2.7.ppc64le",
"openSUSE Tumbleweed:python39-rtslib-fb-2.1.74-2.7.s390x",
"openSUSE Tumbleweed:python39-rtslib-fb-2.1.74-2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-14019"
}
]
}
OPENSUSE-SU-2020:1156-1
Vulnerability from csaf_opensuse - Published: 2020-08-07 04:16 - Updated: 2020-08-07 04:16| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-rtslib-fb",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-rtslib-fb fixes the following issues:\n\n- Update to version v2.1.73 (bsc#1173257 CVE-2020-14019):\n * version 2.1.73\n * save_to_file: fix fd open mode\n * saveconfig: copy temp configfile with permissions\n * saveconfig: open the temp configfile with modes set\n * Fix \u0027is not\u0027 with a literal SyntaxWarning\n * Fix an incorrect config path in two comments\n * version 2.1.72\n * Do not change dbroot after drivers have been registered\n * Remove \u0027_if_needed\u0027 from RTSRoot._set_dbroot()\u0027s name\n Replacing old tarball with python-rtslib-fb-v2.1.73.tar.xz\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2020-1156",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_1156-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2020:1156-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JAYTWHR6VYW7M5KLVZ2QEMLBDK5TCX4/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2020:1156-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2JAYTWHR6VYW7M5KLVZ2QEMLBDK5TCX4/"
},
{
"category": "self",
"summary": "SUSE Bug 1173257",
"url": "https://bugzilla.suse.com/1173257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14019 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14019/"
}
],
"title": "Security update for python-rtslib-fb",
"tracking": {
"current_release_date": "2020-08-07T04:16:52Z",
"generator": {
"date": "2020-08-07T04:16:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2020:1156-1",
"initial_release_date": "2020-08-07T04:16:52Z",
"revision_history": [
{
"date": "2020-08-07T04:16:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python2-rtslib-fb-2.1.73-lp152.2.3.1.noarch",
"product": {
"name": "python2-rtslib-fb-2.1.73-lp152.2.3.1.noarch",
"product_id": "python2-rtslib-fb-2.1.73-lp152.2.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-rtslib-fb-2.1.73-lp152.2.3.1.noarch",
"product": {
"name": "python3-rtslib-fb-2.1.73-lp152.2.3.1.noarch",
"product_id": "python3-rtslib-fb-2.1.73-lp152.2.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rtslib-fb-2.1.73-lp152.2.3.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:python2-rtslib-fb-2.1.73-lp152.2.3.1.noarch"
},
"product_reference": "python2-rtslib-fb-2.1.73-lp152.2.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rtslib-fb-2.1.73-lp152.2.3.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:python3-rtslib-fb-2.1.73-lp152.2.3.1.noarch"
},
"product_reference": "python3-rtslib-fb-2.1.73-lp152.2.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14019",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14019"
}
],
"notes": [
{
"category": "general",
"text": "Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:python2-rtslib-fb-2.1.73-lp152.2.3.1.noarch",
"openSUSE Leap 15.2:python3-rtslib-fb-2.1.73-lp152.2.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14019",
"url": "https://www.suse.com/security/cve/CVE-2020-14019"
},
{
"category": "external",
"summary": "SUSE Bug 1173257 for CVE-2020-14019",
"url": "https://bugzilla.suse.com/1173257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:python2-rtslib-fb-2.1.73-lp152.2.3.1.noarch",
"openSUSE Leap 15.2:python3-rtslib-fb-2.1.73-lp152.2.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:python2-rtslib-fb-2.1.73-lp152.2.3.1.noarch",
"openSUSE Leap 15.2:python3-rtslib-fb-2.1.73-lp152.2.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-07T04:16:52Z",
"details": "moderate"
}
],
"title": "CVE-2020-14019"
}
]
}
PYSEC-2020-250
Vulnerability from pysec - Published: 2020-06-19 11:15 - Updated: 2021-08-27 03:22Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.
| Name | purl | rtslib-fb | pkg:pypi/rtslib-fb |
|---|
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "rtslib-fb",
"purl": "pkg:pypi/rtslib-fb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.1.73"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"2.1.31",
"2.1.32",
"2.1.35",
"2.1.36",
"2.1.37",
"2.1.38",
"2.1.39",
"2.1.40",
"2.1.43",
"2.1.47",
"2.1.49",
"2.1.51",
"2.1.56",
"2.1.57",
"2.1.58",
"2.1.61",
"2.1.62",
"2.1.63",
"2.1.64",
"2.1.65",
"2.1.66",
"2.1.69",
"2.1.71",
"2.1.72"
]
}
],
"aliases": [
"CVE-2020-14019"
],
"details": "Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.",
"id": "PYSEC-2020-250",
"modified": "2021-08-27T03:22:19.931800Z",
"published": "2020-06-19T11:15:00Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/open-iscsi/rtslib-fb/pull/162"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNMCV2DJJTX345YYBXAMJBXNNVUZQ5UH/"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html"
}
]
}
GHSA-CPCW-P965-WPQX
Vulnerability from github – Published: 2022-05-24 17:21 – Updated: 2024-10-21 21:25Python rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 2.1.72"
},
"package": {
"ecosystem": "PyPI",
"name": "rtslib-fb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.1.73"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2020-14019"
],
"database_specific": {
"cwe_ids": [
"CWE-276"
],
"github_reviewed": true,
"github_reviewed_at": "2023-08-02T22:38:29Z",
"nvd_published_at": "2020-06-19T11:15:00Z",
"severity": "HIGH"
},
"details": "Python rtslib-fb through 2.1.72 has weak permissions for `/etc/target/saveconfig.json` because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.",
"id": "GHSA-cpcw-p965-wpqx",
"modified": "2024-10-21T21:25:20Z",
"published": "2022-05-24T17:21:16Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14019"
},
{
"type": "WEB",
"url": "https://github.com/open-iscsi/rtslib-fb/pull/162"
},
{
"type": "WEB",
"url": "https://github.com/open-iscsi/rtslib-fb/commit/b23d061ee0fa7924d2cdce6194c313b9ee06c468"
},
{
"type": "PACKAGE",
"url": "https://github.com/open-iscsi/rtslib-fb"
},
{
"type": "WEB",
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/rtslib-fb/PYSEC-2020-250.yaml"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNMCV2DJJTX345YYBXAMJBXNNVUZQ5UH"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00012.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "rtslib-fb weak permissions for /etc/target/saveconfig.json file"
}
CNVD-2021-22477
Vulnerability from cnvd - Published: 2021-03-26目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://github.com/open-iscsi/rtslib-fb/pull/162/commits/dffcf83bead64e959505d64ad587768647caab3a
| Name | Open-iSCSI rtslib-fb Open-iSCSI rtslib-fb <=2.1.72 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-14019"
}
},
"description": "Open-iSCSI rtslib-fb\u662f\u4e00\u6b3e\u57fa\u4e8e\u5bf9\u8c61\u7684Python\u5e93\uff0c\u5b83\u4e3b\u8981\u7528\u4e8e\u914d\u7f6eLinux\u5185\u6838\u4e2d\u7684LIO\u901a\u7528SCSI\u76ee\u6807\u3002 \n\nOpen-iSCSI rtslib-fb 2.1.72\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u6682\u65e0\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://github.com/open-iscsi/rtslib-fb/pull/162/commits/dffcf83bead64e959505d64ad587768647caab3a",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-22477",
"openTime": "2021-03-26",
"patchDescription": "Open-iSCSI rtslib-fb\u662f\u4e00\u6b3e\u57fa\u4e8e\u5bf9\u8c61\u7684Python\u5e93\uff0c\u5b83\u4e3b\u8981\u7528\u4e8e\u914d\u7f6eLinux\u5185\u6838\u4e2d\u7684LIO\u901a\u7528SCSI\u76ee\u6807\u3002 \r\n\r\nOpen-iSCSI rtslib-fb 2.1.72\u53ca\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u6682\u65e0\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Open-iSCSI rtslib-fb\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Open-iSCSI rtslib-fb Open-iSCSI rtslib-fb \u003c=2.1.72"
},
"serverity": "\u4e2d",
"submitTime": "2020-06-22",
"title": "Open-iSCSI rtslib-fb\u5b58\u5728\u672a\u660e\u6f0f\u6d1e"
}
SUSE-SU-2020:2109-1
Vulnerability from csaf_suse - Published: 2020-08-03 14:47 - Updated: 2020-08-03 14:47| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-rtslib-fb",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-rtslib-fb fixes the following issues:\n\n- Update to version v2.1.73 (bsc#1173257 CVE-2020-14019):\n * version 2.1.73\n * save_to_file: fix fd open mode\n * saveconfig: copy temp configfile with permissions\n * saveconfig: open the temp configfile with modes set\n * Fix \u0027is not\u0027 with a literal SyntaxWarning\n * Fix an incorrect config path in two comments\n * version 2.1.72\n * Do not change dbroot after drivers have been registered\n * Remove \u0027_if_needed\u0027 from RTSRoot._set_dbroot()\u0027s name\n Replacing old tarball with python-rtslib-fb-v2.1.73.tar.xz\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2020-2109,SUSE-SLE-Module-Basesystem-15-SP2-2020-2109,SUSE-SLE-Module-Python2-15-SP2-2020-2109",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_2109-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2020:2109-1",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20202109-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2020:2109-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-August/007211.html"
},
{
"category": "self",
"summary": "SUSE Bug 1173257",
"url": "https://bugzilla.suse.com/1173257"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14019 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14019/"
}
],
"title": "Security update for python-rtslib-fb",
"tracking": {
"current_release_date": "2020-08-03T14:47:14Z",
"generator": {
"date": "2020-08-03T14:47:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2020:2109-1",
"initial_release_date": "2020-08-03T14:47:14Z",
"revision_history": [
{
"date": "2020-08-03T14:47:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python2-rtslib-fb-2.1.73-3.3.1.noarch",
"product": {
"name": "python2-rtslib-fb-2.1.73-3.3.1.noarch",
"product_id": "python2-rtslib-fb-2.1.73-3.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-rtslib-fb-2.1.73-3.3.1.noarch",
"product": {
"name": "python3-rtslib-fb-2.1.73-3.3.1.noarch",
"product_id": "python3-rtslib-fb-2.1.73-3.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Python 2 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Python 2 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-python2:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rtslib-fb-2.1.73-3.3.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rtslib-fb-2.1.73-3.3.1.noarch"
},
"product_reference": "python3-rtslib-fb-2.1.73-3.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rtslib-fb-2.1.73-3.3.1.noarch as component of SUSE Linux Enterprise Module for Python 2 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rtslib-fb-2.1.73-3.3.1.noarch"
},
"product_reference": "python2-rtslib-fb-2.1.73-3.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-14019",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14019"
}
],
"notes": [
{
"category": "general",
"text": "Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rtslib-fb-2.1.73-3.3.1.noarch",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rtslib-fb-2.1.73-3.3.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14019",
"url": "https://www.suse.com/security/cve/CVE-2020-14019"
},
{
"category": "external",
"summary": "SUSE Bug 1173257 for CVE-2020-14019",
"url": "https://bugzilla.suse.com/1173257"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rtslib-fb-2.1.73-3.3.1.noarch",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rtslib-fb-2.1.73-3.3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rtslib-fb-2.1.73-3.3.1.noarch",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rtslib-fb-2.1.73-3.3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2020-08-03T14:47:14Z",
"details": "moderate"
}
],
"title": "CVE-2020-14019"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.