Описание
rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | |
| esm-infra-legacy/trusty | not-affected | |
| precise | not-affected | |
| trusty | not-affected | |
| trusty/esm | not-affected | |
| upstream | needs-triage | |
| utopic | not-affected | |
| vivid | not-affected |
Показывать по
10
Ссылки на источники
2.1 Low
CVSS2
5.5 Medium
CVSS3
Связанные уязвимости
redhat
больше 10 лет назад
rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.
CVSS3: 5.5
nvd
больше 8 лет назад
rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.
CVSS3: 5.5
debian
больше 8 лет назад
rsyslog uses weak permissions for generating log files, which allows l ...
2.1 Low
CVSS2
5.5 Medium
CVSS3