Bug 2124721 (CVE-2022-3146)

Summary: CVE-2022-3146 tripleo-ansible: /etc/openstack/clouds.yaml discoverable
Product: [Other] Security Response Reporter: Nick Tait <ntait>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: eglynn, jjoyce, lhh, mburns, mgarciac, rhos-maint, spower
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in tripleo-ansible. Due to an insecure default configuration, the permissions of a sensitive file are not sufficiently restricted. This flaw allows a local attacker to use brute force to explore the relevant directory and discover the file. This issue leads to information disclosure of important configuration details from the OpenStack deployment.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-11-30 00:15:43 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2123767, 2124732, 2125722    
Bug Blocks: 2123437    

Comment 4 Nick Tait 2022-09-09 20:52:37 UTC
Created tripleo-ansible tracking bugs for this issue:

Affects: openstack-rdo [bug 2125722]

Comment 5 errata-xmlrpc 2022-10-17 10:20:39 UTC
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 16.2
  Red Hat OpenStack Platform 16.1

Via RHSA-2022:6969 https://access.redhat.com/errata/RHSA-2022:6969

Comment 6 Product Security DevOps Team 2022-11-30 00:15:41 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-3146