Bug 2158266 (CVE-2022-46174)
| Summary: | CVE-2022-46174 aws-efs-utils: Race condition during concurrent TLS mounts in efs-utils and aws-efs-csi-driver | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Anten Skrabec <askrabec> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | asheth, dfreiber, jburrell, MalissaSeeringhgw16, rogbas, security-response-team, vkumar |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | efs-utils 1.34.4, aws-efs-csi-driver 1.4.8 | Doc Type: | If docs needed, set a value |
| Doc Text: |
A potential race condition issue exists within the Amazon EFS mount helper in efs-utils and aws-efs-csi-driver when using TLS to mount file systems. The mount helper allocates a local port for stunnel to receive NFS connections prior to applying the TLS tunnel. In affected versions, concurrent mount operations can allocate the same local port, leading to either failed mount operations or an inappropriate mapping from an EFS customer’s local mount points to that customer’s EFS file systems.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2023-02-01 07:55:52 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 2156758 | ||
|
Description
Anten Skrabec
2023-01-04 20:58:05 UTC
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.12 Via RHSA-2023:0450 https://access.redhat.com/errata/RHSA-2023:0450 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-46174 There isn't a suggested fix for this. We recommend affected users update the installed version of efs-utils to v1.34.4+ or aws-efs-csi-driver to v1.4.8+ to address this issue. Sources: https://rocketbotroyale.com The needinfo request[s] on this closed bug have been removed as they have been unresolved for 120 days |