First published: Wed Aug 02 2017(Updated: )
A flaw was found in instack-undercloud 7.2.0 as packaged in Red Hat OpenStack Platform Pike, 6.1.0 as packaged in Red Hat OpenStack Platform Oacta, 5.3.0 as packaged in Red Hat OpenStack Newton, where pre-install and security policy scripts used insecure temporary files. A local user could exploit this flaw to conduct a symbolic-link attack, allowing them to overwrite the contents of arbitrary files.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/instack-undercloud | <=7.2.0 | |
All of | ||
OpenStack Instack-undercloud | =7.2.0 | |
Red Hat OpenStack for IBM Power | =12 | |
All of | ||
OpenStack Instack-undercloud | =6.1.0 | |
Red Hat OpenStack for IBM Power | =11 | |
All of | ||
OpenStack Instack-undercloud | =5.3.0 | |
Red Hat OpenStack for IBM Power | =10 | |
OpenStack Instack-undercloud | =7.2.0 | |
Red Hat OpenStack for IBM Power | =12 | |
OpenStack Instack-undercloud | =6.1.0 | |
Red Hat OpenStack for IBM Power | =11 | |
OpenStack Instack-undercloud | =5.3.0 | |
Red Hat OpenStack for IBM Power | =10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7549 is considered a moderate severity vulnerability due to the potential for local users to exploit insecure temporary file usage.
To fix CVE-2017-7549, update instack-undercloud to a version that has addressed this vulnerability.
CVE-2017-7549 affects instack-undercloud versions 5.3.0, 6.1.0, and 7.2.0.
No, CVE-2017-7549 can only be exploited by local users due to the nature of the vulnerability.
Yes, CVE-2017-7549 specifically impacts OpenStack deployments utilizing instack-undercloud packaged in various Red Hat OpenStack Platform versions.