Bug 1083847 (CVE-2014-0164) - CVE-2014-0164 mcollective: world readable client config
Summary: CVE-2014-0164 mcollective: world readable client config
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-0164
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1082972 1086401 1086402
Blocks: 1083866
TreeView+ depends on / blocked
 
Reported: 2014-04-03 05:44 UTC by Garth Mollett
Modified: 2023-05-12 17:54 UTC (History)
10 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-05-02 03:38:30 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:0460 0 normal SHIPPED_LIVE Important: openshift-origin-broker-util security update 2014-05-01 23:02:59 UTC
Red Hat Product Errata RHSA-2014:0461 0 normal SHIPPED_LIVE Important: openshift-origin-broker-util security update 2014-05-01 23:43:38 UTC

Description Garth Mollett 2014-04-03 05:44:08 UTC
Jeremy Choi of Red Hat discovered that mcollective-client config file client.cfg contains authentication data and defaults to world readable.

Comment 3 Martin Prpič 2014-04-29 21:23:48 UTC
Acknowledgements:

This issue was discovered by Jeremy Choi of the Red Hat Quality Engineering Group.

Comment 4 errata-xmlrpc 2014-05-01 19:03:11 UTC
This issue has been addressed in following products:

  RHEL 6 Version of OpenShift Enterprise 2.0

Via RHSA-2014:0460 https://rhn.redhat.com/errata/RHSA-2014-0460.html

Comment 5 errata-xmlrpc 2014-05-01 19:44:33 UTC
This issue has been addressed in following products:

  RHEL 6 Version of OpenShift Enterprise 1.2

Via RHSA-2014:0461 https://rhn.redhat.com/errata/RHSA-2014-0461.html


Note You need to log in before you can comment on or make changes to this bug.