Bug 1190112 (CVE-2015-0259)
Summary: | CVE-2015-0259 openstack-nova: console Cross-Site WebSocket hijacking | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vasyl Kaigorodov <vkaigoro> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | abaron, aortega, apevec, ayoung, berrange, chrisw, dallan, dasmith, eglynn, gkotton, gmollett, jrusnack, kchamart, lhh, lpeer, markmc, mbooth, ndipanov, osoukup, pbrady, rbryant, sbauza, sclewis, security-response-team, sferdjao, sgordon, vromanso, yeylon |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
It was discovered that the OpenStack Compute (nova) console websocket did not correctly verify the origin header. An attacker could use this flaw to conduct a cross-site websocket hijack attack. Note that only Compute setups with VNC or SPICE enabled were affected by this flaw.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2015-06-14 22:45:31 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1200201, 1200202, 1200203, 1200204, 1200935, 1201046, 1202382 | ||
Bug Blocks: | 1190113, 1194087 | ||
Attachments: |
Description
Vasyl Kaigorodov
2015-02-06 11:27:03 UTC
Created attachment 989782 [details]
upstream patch cve-2015-0259-stable-juno.patch
Created attachment 989793 [details]
upstream patch cve-2015-0259-stable-icehouse.patch
Created attachment 989797 [details]
upstream patch cve-2015-0259-master-kilo.patch
Please note, the above patches are incomplete and new ones are expected. A new proposed embargoed date has been set as 2015-03-10, 1500UTC, please note that this may change. I have also added the updated patches. Created attachment 997714 [details]
cve-2015-0259-master-kilo-v2.patch
Created attachment 997715 [details]
cve-2015-0259-stable-juno-v2.patch
Created attachment 997716 [details]
cve-2015-0259-stable-icehouse-v2.patch
Created attachment 999698 [details] CVE-2015-0259 Juno Patch Created attachment 999700 [details] CVE-2015-0259 Icehouse Patch Created attachment 999702 [details] CVE-2015-0259 Kilo Patch The embargo is well and truly broken on this, with both a public bug and a public patch posted. If there is any additional inconvenience associated with the embargo process I suggest we drop it. Created openstack-nova tracking bugs for this issue: Affects: fedora-all [bug 1200935] Current patches, as attached to this bug, break non-browser based clients. See: https://bugs.launchpad.net/nova/+bug/1409142/comments/133 (which should be public now). Created openstack-nova tracking bugs for this issue: Affects: openstack-rdo [bug 1201046] This issue has been addressed in the following products: OpenStack 6 for RHEL 7 Via RHSA-2015:0790 https://rhn.redhat.com/errata/RHSA-2015-0790.html This issue has been addressed in the following products: OpenStack 5 for RHEL 6 Via RHSA-2015:0844 https://rhn.redhat.com/errata/RHSA-2015-0844.html This issue has been addressed in the following products: OpenStack 5 for RHEL 7 Via RHSA-2015:0843 https://rhn.redhat.com/errata/RHSA-2015-0843.html |