libvirt before 2.2 includes Ceph credentials on the qemu command line when using RADOS Block Device (aka RBD), which allows local users to obtain sensitive information via a process listing.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2016-2577.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2017/07/21/3 | Mailing List Third Party Advisory |
https://bugs.launchpad.net/ossn/+bug/1686743 | Issue Tracking Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1245647 | Issue Tracking Third Party Advisory |
https://wiki.openstack.org/wiki/OSSN/OSSN-0079 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2018-08-20 21:29
Updated : 2024-02-28 16:48
NVD link : CVE-2015-5160
Mitre link : CVE-2015-5160
CVE.ORG link : CVE-2015-5160
JSON object : View
Products Affected
redhat
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_server
- virtualization
- enterprise_linux
- enterprise_linux_server_tus
- enterprise_linux_server_eus
- enterprise_linux_eus
- enterprise_linux_workstation
libvirt
- libvirt
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor