UBUNTU-CVE-2017-2622

Source
https://ubuntu.com/security/CVE-2017-2622
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-2622.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-2622
Upstream
Published
2018-07-27T13:29:00Z
Modified
2026-01-20T16:49:41.104387Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N CVSS Calculator
  • 5.5 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

An accessibility flaw was found in the OpenStack Workflow (mistral) service where a service log directory was improperly made world readable. A malicious system user could exploit this flaw to access sensitive information.

References

Affected packages

Ubuntu:20.04:LTS
mistral

Package

Name
mistral
Purl
pkg:deb/ubuntu/mistral@10.0.0-0ubuntu0.20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*
9.0.0-0ubuntu1
10.*
10.0.0~b1~git2019121815.bc46b29f-0ubuntu1
10.0.0~b2~git2020020609.5b5576dd-0ubuntu1
10.0.0~b3~git2020032611.8a5d35ac-0ubuntu1
10.0.0~b3~git2020041013.a7da00d7-0ubuntu1
10.0.0-0ubuntu0.20.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "10.0.0-0ubuntu0.20.04.1",
            "binary_name": "mistral-api"
        },
        {
            "binary_version": "10.0.0-0ubuntu0.20.04.1",
            "binary_name": "mistral-common"
        },
        {
            "binary_version": "10.0.0-0ubuntu0.20.04.1",
            "binary_name": "mistral-engine"
        },
        {
            "binary_version": "10.0.0-0ubuntu0.20.04.1",
            "binary_name": "mistral-event-engine"
        },
        {
            "binary_version": "10.0.0-0ubuntu0.20.04.1",
            "binary_name": "mistral-executor"
        },
        {
            "binary_version": "10.0.0-0ubuntu0.20.04.1",
            "binary_name": "python3-mistral"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-2622.json"
Ubuntu:22.04:LTS
mistral

Package

Name
mistral
Purl
pkg:deb/ubuntu/mistral@14.0.0-0ubuntu1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

13.*
13.0.0-0ubuntu1
13.0.0+git2021120910.b2d6de56-0ubuntu1
13.0.0+git2022030313.55bb2564-0ubuntu1
14.*
14.0.0-0ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "14.0.0-0ubuntu1",
            "binary_name": "mistral-api"
        },
        {
            "binary_version": "14.0.0-0ubuntu1",
            "binary_name": "mistral-common"
        },
        {
            "binary_version": "14.0.0-0ubuntu1",
            "binary_name": "mistral-engine"
        },
        {
            "binary_version": "14.0.0-0ubuntu1",
            "binary_name": "mistral-event-engine"
        },
        {
            "binary_version": "14.0.0-0ubuntu1",
            "binary_name": "mistral-executor"
        },
        {
            "binary_version": "14.0.0-0ubuntu1",
            "binary_name": "python3-mistral"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-2622.json"
Ubuntu:24.04:LTS
mistral

Package

Name
mistral
Purl
pkg:deb/ubuntu/mistral@18.0.1-0ubuntu1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

17.*
17.0.0-0ubuntu1
18.*
18.0.0~rc1-0ubuntu1
18.0.1-0ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "18.0.1-0ubuntu1",
            "binary_name": "mistral-api"
        },
        {
            "binary_version": "18.0.1-0ubuntu1",
            "binary_name": "mistral-common"
        },
        {
            "binary_version": "18.0.1-0ubuntu1",
            "binary_name": "mistral-engine"
        },
        {
            "binary_version": "18.0.1-0ubuntu1",
            "binary_name": "mistral-event-engine"
        },
        {
            "binary_version": "18.0.1-0ubuntu1",
            "binary_name": "mistral-executor"
        },
        {
            "binary_version": "18.0.1-0ubuntu1",
            "binary_name": "python3-mistral"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-2622.json"
Ubuntu:25.10
mistral

Package

Name
mistral
Purl
pkg:deb/ubuntu/mistral@21.0.0-0ubuntu1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

20.*
20.0.0-0ubuntu1
21.*
21.0.0~rc1-0ubuntu1
21.0.0-0ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "21.0.0-0ubuntu1",
            "binary_name": "mistral-api"
        },
        {
            "binary_version": "21.0.0-0ubuntu1",
            "binary_name": "mistral-common"
        },
        {
            "binary_version": "21.0.0-0ubuntu1",
            "binary_name": "mistral-engine"
        },
        {
            "binary_version": "21.0.0-0ubuntu1",
            "binary_name": "mistral-event-engine"
        },
        {
            "binary_version": "21.0.0-0ubuntu1",
            "binary_name": "mistral-executor"
        },
        {
            "binary_version": "21.0.0-0ubuntu1",
            "binary_name": "python3-mistral"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-2622.json"
Ubuntu:Pro:16.04:LTS
mistral

Package

Name
mistral
Purl
pkg:deb/ubuntu/mistral@2.0.0-1ubuntu2+esm1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*
1.0.0-1
1.0.0-4
2.*
2.0.0~b3-3
2.0.0~rc1-1
2.0.0~rc2-1
2.0.0-1
2.0.0-1ubuntu2
2.0.0-1ubuntu2+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.0.0-1ubuntu2+esm1",
            "binary_name": "mistral-api"
        },
        {
            "binary_version": "2.0.0-1ubuntu2+esm1",
            "binary_name": "mistral-common"
        },
        {
            "binary_version": "2.0.0-1ubuntu2+esm1",
            "binary_name": "mistral-engine"
        },
        {
            "binary_version": "2.0.0-1ubuntu2+esm1",
            "binary_name": "mistral-executor"
        },
        {
            "binary_version": "2.0.0-1ubuntu2+esm1",
            "binary_name": "python-mistral"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-2622.json"
Ubuntu:Pro:18.04:LTS
mistral

Package

Name
mistral
Purl
pkg:deb/ubuntu/mistral@6.0.0-0ubuntu1.1+esm1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.0.0-0ubuntu1
6.*
6.0.0~b1-0ubuntu1
6.0.0~b1-0ubuntu2
6.0.0~b2-0ubuntu1
6.0.0~rc1-0ubuntu1
6.0.0-0ubuntu1
6.0.0-0ubuntu1.1
6.0.0-0ubuntu1.1+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "6.0.0-0ubuntu1.1+esm1",
            "binary_name": "mistral-api"
        },
        {
            "binary_version": "6.0.0-0ubuntu1.1+esm1",
            "binary_name": "mistral-common"
        },
        {
            "binary_version": "6.0.0-0ubuntu1.1+esm1",
            "binary_name": "mistral-engine"
        },
        {
            "binary_version": "6.0.0-0ubuntu1.1+esm1",
            "binary_name": "mistral-event-engine"
        },
        {
            "binary_version": "6.0.0-0ubuntu1.1+esm1",
            "binary_name": "mistral-executor"
        },
        {
            "binary_version": "6.0.0-0ubuntu1.1+esm1",
            "binary_name": "python-mistral"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-2622.json"