Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS05dzRmLTN2MzctNmY3Nc4AAcy3

ceph-deploy allows local users to obtain sensitive information by reading the file

ceph-deploy before 1.5.23 uses weak permissions (644) for ceph/ceph.client.admin.keyring, which allows local users to obtain sensitive information by reading the file.

Permalink: https://github.com/advisories/GHSA-9w4f-3v37-6f75
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS05dzRmLTN2MzctNmY3Nc4AAcy3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: about 2 years ago
Updated: 19 days ago


Identifiers: GHSA-9w4f-3v37-6f75, CVE-2015-3010
References: Repository: https://github.com/ceph/ceph-deploy
Blast Radius: 0.0

Affected Packages

pypi:ceph-deploy
Dependent packages: 0
Dependent repositories: 8
Downloads: 519 last month
Affected Version Ranges: < 1.5.23
Fixed in: 1.5.23
All affected versions: 1.2.1, 1.2.2, 1.2.3, 1.2.5, 1.2.6, 1.2.7, 1.3.1, 1.3.2, 1.3.3, 1.3.5, 1.4.0, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.5.5, 1.5.6, 1.5.7, 1.5.8, 1.5.9, 1.5.10, 1.5.11, 1.5.12, 1.5.13, 1.5.14, 1.5.16, 1.5.17, 1.5.18, 1.5.19, 1.5.20, 1.5.21, 1.5.22
All unaffected versions: 1.5.23, 1.5.24, 1.5.25, 1.5.26, 1.5.27, 1.5.28, 1.5.29, 1.5.30, 1.5.31, 1.5.32, 1.5.33, 1.5.34, 1.5.35, 1.5.36, 1.5.37, 1.5.38, 1.5.39, 2.0.0, 2.0.1