Описание
Red Hat OpenStack Essex and Folsom creates the /var/log/puppet directory with world-readable permissions, which allows local users to obtain sensitive information such as Puppet log files.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat CloudForms Tools 1 | puppet | Will not fix | ||
| Red Hat Enterprise MRG 1 | puppet | Affected | ||
| Red Hat OpenStack Platform 2.0 | puppet | Affected | ||
| Red Hat OpenStack Platform 2.1 | puppet | Affected | ||
| Red Hat Subscription Asset Manager | puppet | Affected | ||
| OpenStack Folsom for RHEL 6 | puppet | Fixed | RHSA-2013:0710 | 04.04.2013 |
Показывать по
Дополнительная информация
Статус:
2.1 Low
CVSS2
Связанные уязвимости
Red Hat OpenStack Essex and Folsom creates the /var/log/puppet directory with world-readable permissions, which allows local users to obtain sensitive information such as Puppet log files.
Red Hat OpenStack Essex and Folsom creates the /var/log/puppet directory with world-readable permissions, which allows local users to obtain sensitive information such as Puppet log files.
Red Hat OpenStack Essex and Folsom creates the /var/log/puppet directo ...
Red Hat OpenStack Essex and Folsom creates the /var/log/puppet directory with world-readable permissions, which allows local users to obtain sensitive information such as Puppet log files.
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
2.1 Low
CVSS2