Bug 1626953 (CVE-2018-14620)
Summary: | CVE-2018-14620 openstack-rabbitmq-container: Insecure download of rabbitmq_clusterer during docker build | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sam Fowler <sfowler> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | apevec, chrisw, dbecker, dprince, jjoyce, jschluet, kbasil, lhh, lpeer, m.andre, markmc, mburns, rbryant, sclewis, security-response-team, slinaber, tdecacqu |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openstack-rabbitmq-container-13.0-57, openstack-rabbitmq-container-12.0-20180910.1 | Doc Type: | If docs needed, set a value |
Doc Text: |
The OpenStack RabbitMQ container image insecurely retrieves the rabbitmq_clusterer component over HTTP, without validation, during the build stage. This could potentially allow an attacker to serve malicious code to the image builder and install in the resultant container image.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2018-12-20 04:15:30 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1627119, 1627120, 1627121 | ||
Bug Blocks: | 1626024 |
Description
Sam Fowler
2018-09-10 07:45:16 UTC
This issue has been addressed in the following products: Red Hat OpenStack Platform 13.0 (Queens) Via RHSA-2018:2721 https://access.redhat.com/errata/RHSA-2018:2721 This issue has been addressed in the following products: Red Hat OpenStack Platform 12.0 (Pike) Via RHSA-2018:2729 https://access.redhat.com/errata/RHSA-2018:2729 |