Bug 2274806 (CVE-2024-28718)
| Summary: | CVE-2024-28718 openstack-magnum: time-of-check to time-of-use (TOCTOU) attack risk via cert_manager.py | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Robb Gatica <rgatica> |
| Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | openstack-magnum 16.0.2, openstack-magnum 17.0.2, openstack-magnum 14.1.2, openstack-magnum 15.0.2, openstack-magnum 18.0.0rc1 | Doc Type: | If docs needed, set a value |
| Doc Text: |
A flaw was discovered in OpenStack Magnum. In certain conditions, an attacker may be able to initiate a time-of-check to time-of-use (TOCTOU) attack. In this type of attack, an attacker exploits the time window between when the file is initially written and when its permissions are modified. During this time window, the attacker may gain access to the file.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Robb Gatica
2024-04-12 20:55:57 UTC
|