Описание
Multiple untrusted search path vulnerabilities in Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, when adding a host, allow local users to gain privileges via a Trojan horse (1) deployUtil.py or (2) vds_bootstrap.py Python module in /tmp/.
Отчет
This issue does affect Red Hat Enterprise Virtualization 2 and 3. Red Hat Enterprise Virtualization 2 is now in Production 2 phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Virtualization Life Cycle: https://access.redhat.com/support/policy/updates/rhev/.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Virtualization 2 | ovirt-engine-backend | Will not fix | ||
| RHEV 3.X Hypervisor and Agents for RHEL-6 | vdsm | Fixed | RHSA-2012:1508 | 04.12.2012 |
| RHEV Manager version 3.0 | org.ovirt.engine-root | Fixed | RHSA-2012:1506 | 04.12.2012 |
Показывать по
Дополнительная информация
Статус:
6.2 Medium
CVSS2
Связанные уязвимости
Multiple untrusted search path vulnerabilities in Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, when adding a host, allow local users to gain privileges via a Trojan horse (1) deployUtil.py or (2) vds_bootstrap.py Python module in /tmp/.
Multiple untrusted search path vulnerabilities in Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, when adding a host, allow local users to gain privileges via a Trojan horse (1) deployUtil.py or (2) vds_bootstrap.py Python module in /tmp/.
6.2 Medium
CVSS2