Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 28 Apr 2014 12:19:04 +1000
From: Murray McAllister <mmcallis@...hat.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2014-0189:  /etc/sysconfig/virt-who is world-readable (contains
 unencrypted passwords)

Good morning,

Not sure if anyone else is using https://fedorahosted.org/virt-who/

It was reported that "/etc/sysconfig/virt-who" is world-readable and 
contains plaintext passwords to connect to various hypervisors. A local 
attacker could use this flaw to obtain those passwords and gain access 
to the hypervisors. (CVE-2014-0189)

Red Hat would like to thank Sal Castiglione for reporting this issue.

Discussions about fixing the issue are ongoing:

https://bugzilla.redhat.com/show_bug.cgi?id=1088732
https://bugzilla.redhat.com/show_bug.cgi?id=1081286

--
Murray McAllister / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ