Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-1000199

Опубликовано: 17 июл. 2017
Источник: redhat
CVSS3: 3.3

Описание

tcmu-runner version 0.91 up to 1.20 is vulnerable to information disclosure in handler_qcow.so resulting in non-privileged users being able to check for existence of any file with root privileges.

A file information leak flaw was found in implementation of the CheckConfig method in handler_qcow.so of the tcmu-runner daemon. A local, non-root user with access to the D-Bus system bus could use this flaw to leak arbitrary file names which might not be retrievable by non-root user.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 2tcmu-runnerAffected
Red Hat Gluster Storage 3.3 for RHEL 7tcmu-runnerFixedRHSA-2017:327729.11.2017

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1487252tcmu-runner: qcow handler opens up an information leak via the CheckConfig D-Bus method

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
около 8 лет назад

tcmu-runner version 0.91 up to 1.20 is vulnerable to information disclosure in handler_qcow.so resulting in non-privileged users being able to check for existence of any file with root privileges.

CVSS3: 7.5
github
больше 3 лет назад

tcmu-runner version 0.91 up to 1.20 is vulnerable to information disclosure in handler_qcow.so resulting in non-privileged users being able to check for existence of any file with root privileges.

suse-cvrf
больше 8 лет назад

Security update for tcmu-runner

3.3 Low

CVSS3