- Issued:
- 2017-09-06
- Updated:
- 2017-09-06
RHSA-2017:2649 - Security Advisory
Synopsis
Moderate: instack-undercloud security, bug fix, and enhancement update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for instack-undercloud is now available for Red Hat OpenStack Platform 10.0 (Newton).
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
instack-undercloud provides a collection of scripts and elements that can be used to install an OpenStack undercloud (using python-instack).
The following packages have been upgraded to a later upstream version:
instack-undercloud (5.3.0). (BZ#1479841)
Security Fix(es):
- A flaw was found in instack-undercloud where pre-install and security
policy scripts used insecure temporary files. A local user could exploit
this flaw to conduct a symbolic-link attack, allowing them to overwrite the
contents of arbitrary files. (CVE-2017-7549)
This issue was discovered by Matthew Booth (Red Hat).
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat OpenStack 10 x86_64
Fixes
- BZ - 1465616 - stackrc does not undefine OS_ env vars
- BZ - 1477403 - CVE-2017-7549 instack-undercloud: uses hardcoded /tmp paths
- BZ - 1479841 - Rebase instack-undercloud to e9a5137
CVEs
Red Hat OpenStack 10
SRPM | |
---|---|
instack-undercloud-5.3.0-3.el7ost.src.rpm | SHA-256: 4464871288736f2a02ee52d70fc32244fa424a497942c938317cb10034724d41 |
x86_64 | |
instack-undercloud-5.3.0-3.el7ost.noarch.rpm | SHA-256: b440686ac486731e215f5b90b6f81d332c26bc2a6fe4f587de05cc361ab81024 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.