ceph-deploy before 1.5.23 uses weak permissions (644) for ceph/ceph.client.admin.keyring, which allows local users to obtain sensitive information by reading the file.
References
Configurations
History
21 Nov 2024, 02:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155576.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155631.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1092.html - | |
References | () http://www.openwall.com/lists/oss-security/2015/04/09/11 - | |
References | () http://www.openwall.com/lists/oss-security/2015/04/09/9 - | |
References | () http://www.securityfocus.com/bid/74043 - | |
References | () https://bugzilla.suse.com/show_bug.cgi?id=920926 - | |
References | () https://github.com/ceph/ceph-deploy/commit/eee56770393bf19ed2dd5389226c6190c08dee3f - | |
References | () https://github.com/ceph/ceph-deploy/pull/272 - |
Information
Published : 2015-06-16 16:59
Updated : 2025-04-12 10:46
NVD link : CVE-2015-3010
Mitre link : CVE-2015-3010
CVE.ORG link : CVE-2015-3010
JSON object : View
Products Affected
ceph
- ceph-deploy
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor