First published: Tue Aug 20 2024(Updated: )
A flaw was found in the openstack-tripleo-common component of the Red Hat OpenStack Platform (RHOSP) director. This vulnerability allows an attacker to deploy potentially compromised container images via disabling TLS certificate verification for registry mirrors, which could enable a man-in-the-middle (MITM) attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat openstack platform | =16.1 | |
redhat openstack platform | =16.2 | |
redhat openstack platform | =17.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8007 has been classified as a moderate severity vulnerability.
To fix CVE-2024-8007, update to the latest version of Red Hat OpenStack Platform 16.1, 16.2, or 17.1 that addresses this vulnerability.
CVE-2024-8007 affects the openstack-tripleo-common component of the Red Hat OpenStack Platform.
An attacker could potentially deploy compromised container images by disabling TLS certificate verification for registry mirrors.
CVE-2024-8007 is not documented to affect versions of Red Hat OpenStack Platform older than 16.1.