CVE-2017-17522
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2017-17522 from the MITRE CVE dictionary dictionary and NIST NVD.
Statement
As per upstream, "exploitation is impossible because the code relies on subprocess.Popen and the default shell=False setting". On testing it seems, upstream has correctly concluded the non-security nature of this bug.
CVSS v3 metrics
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
| CVSS3 Base Score | 5.3 |
|---|---|
| CVSS3 Base Metrics | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
| Attack Vector | Local |
| Attack Complexity | Low |
| Privileges Required | None |
| User Interaction | Required |
| Scope | Unchanged |
| Confidentiality | Low |
| Integrity Impact | Low |
| Availability Impact | Low |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat Software Collections for Red Hat Enterprise Linux | rh-python35-python | Not affected |
| Red Hat Software Collections for Red Hat Enterprise Linux | python27-python | Not affected |
| Red Hat Software Collections for Red Hat Enterprise Linux | rh-python34-python | Not affected |
| Red Hat Software Collections for Red Hat Enterprise Linux | rh-python36-python | Not affected |
| Red Hat Enterprise Linux 7 | python | Not affected |
| Red Hat Enterprise Linux 6 | python | Not affected |
| Red Hat Enterprise Linux 5 | python | Not affected |
CVE description copyright © 2017, The MITRE Corporation
