tcmu-runner version 0.91 up to 1.20 is vulnerable to information disclosure in handler_qcow.so resulting in non-privileged users being able to check for existence of any file with root privileges.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2017:3277 | |
https://github.com/open-iscsi/tcmu-runner/issues/194 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2017:3277 | |
https://github.com/open-iscsi/tcmu-runner/issues/194 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2017:3277 - | |
References | () https://github.com/open-iscsi/tcmu-runner/issues/194 - Third Party Advisory |
Information
Published : 2017-11-17 02:29
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000199
Mitre link : CVE-2017-1000199
CVE.ORG link : CVE-2017-1000199
JSON object : View
Products Affected
tcmu-runner_project
- tcmu-runner
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor