Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-3010

Опубликовано: 16 июн. 2015
Источник: ubuntu
Приоритет: medium
CVSS2: 2.1

Описание

ceph-deploy before 1.5.23 uses weak permissions (644) for ceph/ceph.client.admin.keyring, which allows local users to obtain sensitive information by reading the file.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

1.5.32-0ubuntu1
cosmic

not-affected

1.5.32-0ubuntu1
devel

not-affected

1.5.32-0ubuntu1
disco

not-affected

1.5.32-0ubuntu1
esm-apps/bionic

not-affected

1.5.32-0ubuntu1
esm-apps/xenial

not-affected

1.5.32-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
lucid

DNE

precise

DNE

Показывать по

2.1 Low

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

ceph-deploy before 1.5.23 uses weak permissions (644) for ceph/ceph.client.admin.keyring, which allows local users to obtain sensitive information by reading the file.

nvd
больше 10 лет назад

ceph-deploy before 1.5.23 uses weak permissions (644) for ceph/ceph.client.admin.keyring, which allows local users to obtain sensitive information by reading the file.

debian
больше 10 лет назад

ceph-deploy before 1.5.23 uses weak permissions (644) for ceph/ceph.cl ...

CVSS3: 4
github
больше 3 лет назад

ceph-deploy allows local users to obtain sensitive information by reading the file

2.1 Low

CVSS2