Bug 2158266 (CVE-2022-46174)

Summary: CVE-2022-46174 aws-efs-utils: Race condition during concurrent TLS mounts in efs-utils and aws-efs-csi-driver
Product: [Other] Security Response Reporter: Anten Skrabec <askrabec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: asheth, dfreiber, jburrell, MalissaSeeringhgw16, rogbas, security-response-team, vkumar
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: efs-utils 1.34.4, aws-efs-csi-driver 1.4.8 Doc Type: If docs needed, set a value
Doc Text:
A potential race condition issue exists within the Amazon EFS mount helper in efs-utils and aws-efs-csi-driver when using TLS to mount file systems. The mount helper allocates a local port for stunnel to receive NFS connections prior to applying the TLS tunnel. In affected versions, concurrent mount operations can allocate the same local port, leading to either failed mount operations or an inappropriate mapping from an EFS customer’s local mount points to that customer’s EFS file systems.
Story Points: ---
Clone Of: Environment:
Last Closed: 2023-02-01 07:55:52 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2156758    

Description Anten Skrabec 2023-01-04 20:58:05 UTC
efs-utils is a set of Utilities for Amazon Elastic File System (EFS). A potential race condition issue exists within the Amazon EFS mount helper in efs-utils versions v1.34.3 and below. When using TLS to mount file systems, the mount helper allocates a local port for stunnel to receive NFS connections prior to applying the TLS tunnel. In affected versions, concurrent mount operations can allocate the same local port, leading to either failed mount operations or an inappropriate mapping from an EFS customer’s local mount points to that customer’s EFS file systems. This issue is patched in version v1.34.4. There is no recommended work around. We recommend affected users update the installed version of efs-utils to v1.34.4 or later.

https://github.com/aws/efs-utils/commit/f3a8f88167d55caa2f78aeb72d4dc1987a9ed62d
https://github.com/aws/efs-utils/issues/125
https://github.com/aws/efs-utils/security/advisories/GHSA-4fv8-w65m-3932

Comment 4 errata-xmlrpc 2023-01-30 17:31:46 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.12

Via RHSA-2023:0450 https://access.redhat.com/errata/RHSA-2023:0450

Comment 5 Product Security DevOps Team 2023-02-01 07:55:50 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-46174

Comment 9 dwight bowman 2023-07-15 08:11:58 UTC Comment hidden (spam)
Comment 10 Red Hat Bugzilla 2023-11-13 04:25:03 UTC
The needinfo request[s] on this closed bug have been removed as they have been unresolved for 120 days