Bug 1694608 (CVE-2019-3895)

Summary: CVE-2019-3895 openstack-tripleo-common: Allows running new amphorae based on arbitrary images
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: apetrich, cgoncalves, dbecker, gthiemon, jjoyce, jpadman, jschluet, kbasil, lhh, lpeer, mburns, sclewis, security-response-team, slinaber
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: openstack-tripleo-common-8.6.8-9, openstack-tripleo-common-9.5.0-5 Doc Type: If docs needed, set a value
Doc Text:
An access-control flaw was found in the Octavia service when the cloud platform was deployed using Red Hat OpenStack Platform Director. An attacker could cause new amphorae to run based on any arbitrary image. This meant that a remote attacker could upload a new amphorae image and, if requested to spawn new amphorae, Octavia would then pick up the compromised image.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-07-12 13:06:54 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1696502, 1696503, 1696504, 1714380    
Bug Blocks: 1694609    

Description Andrej Nemec 2019-04-01 08:58:20 UTC
An attacker may cause new amphorae to run based on any arbitrary
image. The attacker only needs to create an image in his/her own user
project, set same tag "amphora-image" and share it with the "service"
project. Upon request to spawn new amphorae, Octavia will now pick up
the compromised image.

Comment 6 Joshua Padman 2019-04-07 09:27:28 UTC
Acknowledgments:

Name: Carlos Goncalves (Red Hat)

Comment 9 Joshua Padman 2019-04-09 00:31:05 UTC
Octavia was introduced in Red Hat OpenStack 12 and has been supported in newer versions. Upstream identified the issue and the code was merged into products delivered by Red Hat, however the configuration was not set by default. This CVE covers Red Hat OpenStack Director's default deployment of Octavia being insecure.

Related upstream flaw: https://bugs.launchpad.net/octavia/+bug/1620629

Comment 11 Summer Long 2019-04-09 00:59:04 UTC
Mitigation:

To prevent this vulnerability:
1. Update Octavia's configuration setting (octavia.conf) to `amp_image_owner_id = $UUID_OF_SERVICE_PROJECT` on all Octavia nodes. 
2. Enable the new configuration by restarting both `octavia_worker` and `octavia_health_manager`.

Comment 15 Joshua Padman 2019-05-27 23:32:27 UTC
Created openstack-tripleo-common tracking bugs for this issue:

Affects: openstack-rdo [bug 1714380]

Comment 19 errata-xmlrpc 2019-07-02 19:44:17 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 14.0 (Rocky)

Via RHSA-2019:1683 https://access.redhat.com/errata/RHSA-2019:1683

Comment 20 errata-xmlrpc 2019-07-10 13:01:45 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 13.0 (Queens)

Via RHSA-2019:1742 https://access.redhat.com/errata/RHSA-2019:1742

Comment 21 Product Security DevOps Team 2019-07-12 13:06:54 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-3895