It was discovered that keycloak-httpd-client-install uses a predictable log file name in /tmp. A local attacker could create a symbolic link to a sensitive location, possibly causing data corruption or denial of service.
Find out more about CVE-2017-15111 from the MITRE CVE dictionary dictionary and NIST NVD.
Red Hat Product Security has rated this issue as having security impact of Low. This issue may be fixed in a future version of Red Hat Enterprise Linux.
OpenStack users please note, this issue is present in:
* Red Hat OpenStack Platform 9.0 (Mitaka)
* Red Hat OpenStack Platform 10.0 (Newton)
* Red Hat OpenStack Platform 11.0 (Ocata)
If a fixed version of keycloak-httpd-client-install is made available in Red Hat Enterprise Linux, OpenStack customers should consume this package directly from the Red Hat Enterprise Linux channel (this occurs during normal updates).
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 3.9 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L |
Attack Vector | Local |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity Impact | Low |
Availability Impact | Low |
Platform | Package | State |
---|---|---|
Red Hat OpenStack Platform 9.0 | keycloak-httpd-client-install | Will not fix |
Red Hat OpenStack Platform 11.0 (Ocata) | keycloak-httpd-client-install | Will not fix |
Red Hat OpenStack Platform 10 | keycloak-httpd-client-install | Will not fix |
Red Hat Enterprise Linux 7 | keycloak-httpd-client-install | Will not fix |