An information-exposure vulnerability was discovered where openstack-mistrals undercloud log files containing clear-text information were made world readable. A malicious system user could exploit this flaw to access sensitive user information.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Openstack-mistral | Redhat | - (including) | - (including) |
Red Hat OpenStack Platform 16.0 (Train) | RedHat | openstack-mistral-0:9.0.2-0.20191125120837.6651519.el8ost | * |
Red Hat Quay 3 | RedHat | quay/clair-rhel8:v3.4.0-25 | * |
Red Hat Quay 3 | RedHat | quay/quay-bridge-operator-bundle:v3.4.0-3 | * |
Red Hat Quay 3 | RedHat | quay/quay-bridge-operator-rhel8:v3.4.0-17 | * |
Red Hat Quay 3 | RedHat | quay/quay-builder-qemu-rhcos-rhel8:v3.4.0-17 | * |
Red Hat Quay 3 | RedHat | quay/quay-builder-rhel8:v3.4.0-18 | * |
Red Hat Quay 3 | RedHat | quay/quay-container-security-operator-bundle:v3.4.0-2 | * |
Red Hat Quay 3 | RedHat | quay/quay-container-security-operator-rhel8:v3.4.0-2 | * |
Red Hat Quay 3 | RedHat | quay/quay-openshift-bridge-rhel8-operator:v3.4.0-17 | * |
Red Hat Quay 3 | RedHat | quay/quay-operator-bundle:v3.4.0-89 | * |
Red Hat Quay 3 | RedHat | quay/quay-operator-rhel8:v3.4.0-132 | * |
Red Hat Quay 3 | RedHat | quay/quay-rhel8:v3.4.0-51 | * |
Mistral | Ubuntu | bionic | * |
Mistral | Ubuntu | disco | * |
Mistral | Ubuntu | eoan | * |
Mistral | Ubuntu | groovy | * |
Mistral | Ubuntu | hirsute | * |
Mistral | Ubuntu | impish | * |
Mistral | Ubuntu | kinetic | * |
Mistral | Ubuntu | lunar | * |
Mistral | Ubuntu | mantic | * |
Mistral | Ubuntu | trusty | * |
Mistral | Ubuntu | xenial | * |