Overview
- Description
- It was discovered that rpm-ostree and rpm-ostree-client before 2017.3 fail to properly check GPG signatures on packages when doing layering. Packages with unsigned or badly signed content could fail to be rejected as expected. This issue is partially mitigated on RHEL Atomic Host, where certificate pinning is used by default.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 5.3
- Impact score
- 3.6
- Exploitability score
- 1.6
- Vector string
- CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:rpm-ostree:rpm-ostree:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1688272D-EBF4-40BA-8085-D67968137121", "versionEndExcluding": "2017.3" }, { "criteria": "cpe:2.3:a:rpm-ostree:rpm-ostree-client:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8677BDA-0FD4-42C0-9C98-620856183F9E", "versionEndExcluding": "2017.3" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" } ], "operator": "OR" } ] } ]