First published: Tue Jun 16 2015(Updated: )
ceph-deploy before 1.5.23 uses weak permissions (644) for `ceph/ceph.client.admin.keyring`, which allows local users to obtain sensitive information by reading the file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ceph Ceph-deploy | =1.5.22 | |
pip/ceph-deploy | <1.5.23 | 1.5.23 |
=1.5.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3010 is classified as a medium severity vulnerability due to weak file permissions that can expose sensitive information.
To fix CVE-2015-3010, upgrade ceph-deploy to version 1.5.23 or later.
CVE-2015-3010 allows local users to read the ceph.client.admin.keyring file, potentially exposing sensitive authentication keys.
CVE-2015-3010 affects ceph-deploy versions prior to 1.5.23, including version 1.5.22.
Local users on systems running affected versions of ceph-deploy may be at risk of unauthorized access to the ceph.client.admin.keyring file.