First published: Thu Sep 07 2017(Updated: )
A resource-permission flaw was found in the `tripleo-heat-templates` package where `ceph.client.openstack.keyring` is created as world-readable. A local attacker with access to the key could read or modify data on Ceph cluster pools for OpenStack as though the attacker were the OpenStack service, thus potentially reading or modifying data in an OpenStack Block Storage volume. This has been patched in versions [7.0.6](https://github.com/openstack/tripleo-heat-templates/commit/a18fd59077d97de83496c85c017b9d256a3eddd4) and [8.0.0](https://github.com/openstack/tripleo-heat-templates/commit/ce7b65f443d38a6627631f53cb22336338e97d30).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/tripleo-heat-templates | <7.0.6 | 7.0.6 |
redhat/puppet-tripleo | <7.4.7 | 7.4.7 |
redhat/puppet-tripleo | <6.5.7 | 6.5.7 |
Ceph |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12155 is classified as a medium severity vulnerability due to its potential impact on data integrity and security in Ceph clusters.
To fix CVE-2017-12155, update the `tripleo-heat-templates` package to version 7.0.6 or later.
CVE-2017-12155 is a resource-permission flaw that allows unauthorized access to sensitive data.
CVE-2017-12155 affects any user or organization using the `tripleo-heat-templates` package with Ceph in an OpenStack environment.
The consequences of CVE-2017-12155 include a local attacker being able to read or modify data on Ceph cluster pools as if they were an authorized OpenStack service.