Bug 1694608 (CVE-2019-3895)
Summary: | CVE-2019-3895 openstack-tripleo-common: Allows running new amphorae based on arbitrary images | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Andrej Nemec <anemec> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | apetrich, cgoncalves, dbecker, gthiemon, jjoyce, jpadman, jschluet, kbasil, lhh, lpeer, mburns, sclewis, security-response-team, slinaber |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openstack-tripleo-common-8.6.8-9, openstack-tripleo-common-9.5.0-5 | Doc Type: | If docs needed, set a value |
Doc Text: |
An access-control flaw was found in the Octavia service when the cloud platform was deployed using Red Hat OpenStack Platform Director. An attacker could cause new amphorae to run based on any arbitrary image. This meant that a remote attacker could upload a new amphorae image and, if requested to spawn new amphorae, Octavia would then pick up the compromised image.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-07-12 13:06:54 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1696502, 1696503, 1696504, 1714380 | ||
Bug Blocks: | 1694609 |
Description
Andrej Nemec
2019-04-01 08:58:20 UTC
Acknowledgments: Name: Carlos Goncalves (Red Hat) Octavia was introduced in Red Hat OpenStack 12 and has been supported in newer versions. Upstream identified the issue and the code was merged into products delivered by Red Hat, however the configuration was not set by default. This CVE covers Red Hat OpenStack Director's default deployment of Octavia being insecure. Related upstream flaw: https://bugs.launchpad.net/octavia/+bug/1620629 Mitigation: To prevent this vulnerability: 1. Update Octavia's configuration setting (octavia.conf) to `amp_image_owner_id = $UUID_OF_SERVICE_PROJECT` on all Octavia nodes. 2. Enable the new configuration by restarting both `octavia_worker` and `octavia_health_manager`. Created openstack-tripleo-common tracking bugs for this issue: Affects: openstack-rdo [bug 1714380] Upstream tripleo-common bug: https://bugs.launchpad.net/tripleo/+bug/1830607 Upstream fix: https://github.com/openstack/tripleo-common/commit/e7c5eab712e0f70ecbc6d225d4766e0fe0f3f884 This issue has been addressed in the following products: Red Hat OpenStack Platform 14.0 (Rocky) Via RHSA-2019:1683 https://access.redhat.com/errata/RHSA-2019:1683 This issue has been addressed in the following products: Red Hat OpenStack Platform 13.0 (Queens) Via RHSA-2019:1742 https://access.redhat.com/errata/RHSA-2019:1742 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-3895 Upstream tripleo-common bug: https://bugs.launchpad.net/tripleo/+bug/1830607 Upstream fix: https://github.com/openstack/tripleo-common/commit/e7c5eab712e0f70ecbc6d225d4766e0fe0f3f884 External References: https://bugs.launchpad.net/tripleo/+bug/1830607 https://github.com/openstack/tripleo-common/commit/e7c5eab712e0f70ecbc6d225d4766e0fe0f3f884 |