Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-3010

Опубликовано: 05 мар. 2015
Источник: redhat
CVSS2: 4.9

Описание

ceph-deploy before 1.5.23 uses weak permissions (644) for ceph/ceph.client.admin.keyring, which allows local users to obtain sensitive information by reading the file.

It was discovered that ceph-deploy, a utility for deploying Red Hat Ceph Storage, would create the keyring file with world readable permissions, which could possibly allow a local user to obtain authentication credentials from the keyring file.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 1.1ceph-deployWill not fix
Red Hat Ceph Storage 1.3ceph-deployNot affected
Red Hat Ceph Storage 1.2 for CentOSFixedRHSA-2015:163117.08.2015
Red Hat Ceph Storage 1.2 for RHEL 6ceph-deployFixedRHSA-2015:109211.06.2015
Red Hat Ceph Storage 1.2 for RHEL 7ceph-deployFixedRHSA-2015:109211.06.2015
Red Hat Ceph Storage 1.2 for UbuntuFixedRHSA-2015:157907.08.2015

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-732
https://bugzilla.redhat.com/show_bug.cgi?id=1210705ceph-deploy: keyring permissions are world readable in ~ceph

4.9 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

ceph-deploy before 1.5.23 uses weak permissions (644) for ceph/ceph.client.admin.keyring, which allows local users to obtain sensitive information by reading the file.

nvd
больше 10 лет назад

ceph-deploy before 1.5.23 uses weak permissions (644) for ceph/ceph.client.admin.keyring, which allows local users to obtain sensitive information by reading the file.

debian
больше 10 лет назад

ceph-deploy before 1.5.23 uses weak permissions (644) for ceph/ceph.cl ...

CVSS3: 4
github
больше 3 лет назад

ceph-deploy allows local users to obtain sensitive information by reading the file

4.9 Medium

CVSS2