The YaST2 network created files with world readable permissions which could have allowed local users to read sensitive material out of network configuration files, like passwords for wireless networks.
References
| Link | Resource |
|---|---|
| https://bugzilla.suse.com/show_bug.cgi?id=713661 | Issue Tracking Third Party Advisory |
| https://github.com/yast/yast-core/commit/7fe2e3df308b8b6a901cb2cfd60f398df53219de | Third Party Advisory |
| https://bugzilla.suse.com/show_bug.cgi?id=713661 | Issue Tracking Third Party Advisory |
| https://github.com/yast/yast-core/commit/7fe2e3df308b8b6a901cb2cfd60f398df53219de | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-09-08 18:29
Updated : 2025-04-20 01:37
NVD link : CVE-2011-3177
Mitre link : CVE-2011-3177
CVE.ORG link : CVE-2011-3177
JSON object : View
Products Affected
yast
- yast2
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
