|
@@ -0,0 +1,90 @@
|
|
|
+=========================================
|
|
|
+ CELERYSA-0002: Celery Security Advisory
|
|
|
+=========================================
|
|
|
+:contact: security@celeryproject.org
|
|
|
+:CVE id: TBA
|
|
|
+:date: 2014-07-10 05:00:00 P.M UTC
|
|
|
+
|
|
|
+Details
|
|
|
+=======
|
|
|
+
|
|
|
+:package: celery
|
|
|
+:vulnerability: Environment error
|
|
|
+:problem type: local
|
|
|
+:risk: low
|
|
|
+:versions-affected: 2.5, 3.0, 3.1
|
|
|
+
|
|
|
+Description
|
|
|
+===========
|
|
|
+
|
|
|
+The built-in utility used to daemonize the Celery worker service sets
|
|
|
+an insecure umask by default (umask 0).
|
|
|
+
|
|
|
+This means that any files or directories created by the worker will
|
|
|
+end up having world-writable permissions.
|
|
|
+
|
|
|
+In practice this means that local users will be able to modify and possibly
|
|
|
+corrupt the files created by user tasks.
|
|
|
+
|
|
|
+This is not immediately exploitable but can be if those files are later
|
|
|
+evaluated as a program, for example a task that creates Python program files
|
|
|
+that are later executed.
|
|
|
+
|
|
|
+Patches are now available for all maintained versions (see below),
|
|
|
+and users are urged to upgrade, even if not directly
|
|
|
+affected.
|
|
|
+
|
|
|
+Acknowledgements
|
|
|
+================
|
|
|
+
|
|
|
+Special thanks to Red Hat for originally discovering and reporting the issue.
|
|
|
+
|
|
|
+Systems affected
|
|
|
+================
|
|
|
+
|
|
|
+Users of Celery versions 3.0, and 3.1, except the recently
|
|
|
+released 3.1.13, are affected if daemonizing the
|
|
|
+Celery programs using the `--detach` argument or using the `celery multi` program
|
|
|
+to start workers in the background, without setting a custom `--umask`
|
|
|
+argument.
|
|
|
+
|
|
|
+Solution
|
|
|
+========
|
|
|
+
|
|
|
+NOTE:
|
|
|
+ Not all users of Celery will use it to create files, but if you do
|
|
|
+ then files may already have been created with insecure permissions.
|
|
|
+
|
|
|
+ So after upgrading, or using the workaround, then please make sure
|
|
|
+ that files already created are not world writable.
|
|
|
+
|
|
|
+To work around the issue you can set a custom umask using the ``--umask``
|
|
|
+argument:
|
|
|
+
|
|
|
+ $ celery worker -l info --detach --umask=16 # (022)
|
|
|
+
|
|
|
+Or you can upgrade to a more recent version:
|
|
|
+
|
|
|
+- Users of the 3.1 series should upgrade to 3.1.13:
|
|
|
+
|
|
|
+ * ``pip install -U celery``, or
|
|
|
+ * ``easy_install -U celery``, or
|
|
|
+ * http://pypi.python.org/pypi/celery/3.1.13
|
|
|
+
|
|
|
+- Users of the 3.0 series should upgrade to 3.0.25:
|
|
|
+
|
|
|
+ * ``pip install -U celery==3.0.25``, or
|
|
|
+ * ``easy_install -U celery==3.0.25``, or
|
|
|
+ * http://pypi.python.org/pypi/celery/3.0.25
|
|
|
+
|
|
|
+Distribution package maintainers are urged to provide their users
|
|
|
+with updated packages.
|
|
|
+
|
|
|
+Please direct questions to the celery-users mailing-list:
|
|
|
+http://groups.google.com/group/celery-users/,
|
|
|
+
|
|
|
+or if you are planning to report a new security related issue we request that
|
|
|
+you keep the information confidential by contacting
|
|
|
+security@celeryproject.org instead.
|
|
|
+
|
|
|
+Thank you!
|