[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77986

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

Unspecified vulnerability in Redhat dracut

ID: oval:org.secpod.oval:def:38099Date: (C)2016-11-17   (M)2017-07-11
Class: VULNERABILITYFamily: unix




The dracut packages include an event-driven initramfs generator infrastructure based on the udev device manager. The virtual file system, initramfs, is loaded together with the kernel at boot time and initializes the system, so it can read and boot from the root partition. It was discovered that dracut created initramfs images as world readable. A local user could possibly use this flaw to obtain sensitive information from these files, such as iSCSI authentication passwords, encrypted root file system crypttab passwords, or other information. This issue was discovered by Peter Jones of the Red Hat Installer Team. These updated dracut packages include numerous bug fixes and two enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Linux 6.5 Technical Notes, linked to in the References, for information on the most significant of these changes. All dracut users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements.

Platform:
Red Hat Enterprise Linux 7
Product:
dracut
Reference:
CVE-2016-4484
CVE    1
CVE-2016-4484
CPE    2
cpe:/a:fedoraproject:dracut
cpe:/o:redhat:enterprise_linux:7

© 2013 SecPod Technologies