First published: Thu Apr 26 2018(Updated: )
puppet-swift before versions 8.2.1, 9.4.4 is vulnerable to an information-disclosure in Red Hat OpenStack Platform director's installation of Object Storage (swift). During installation, the Puppet script responsible for deploying the service incorrectly removes and recreates the proxy-server.conf file with world-readable permissions.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Openstack Puppet-swift | >=8.0.0<8.2.1 | |
Openstack Puppet-swift | >=9.0.0<9.4.4 | |
Redhat Openstack | =8 | |
Redhat Openstack | =9 | |
Redhat Openstack | =10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9590 has a moderate severity rating due to its potential for information disclosure.
To fix CVE-2016-9590, upgrade Puppet Swift to version 8.2.1 or later, or version 9.4.4 or later.
CVE-2016-9590 affects Puppet Swift versions prior to 8.2.1 and 9.4.4, as well as Red Hat OpenStack versions 8, 9, and 10.
CVE-2016-9590 is classified as an information disclosure vulnerability.
CVE-2016-9590 is found in the Red Hat OpenStack Platform director's installation of Object Storage (swift).