Bug 2353998 (CVE-2025-2586)

Summary: CVE-2025-2586 ols: Unauthenticated Metrics Flooding in OpenShift Lightspeed Service Leading to Resource Exhaustion
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: anpicker, bparees, hasun, jfula, jowilson, nyancey, ometelka, ptisnovs, security-response-team, steven.barre, syedriko, xdharmai
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in the OpenShift Lightspeed Service, which is vulnerable to unauthenticated API request flooding. Repeated queries to non-existent endpoints inflate metrics storage and processing, consuming excessive resources. This issue can lead to monitoring system degradation, increased disk usage, and potential service unavailability. Since the issue does not require authentication, an external attacker can exhaust CPU, RAM, and disk space, impacting both application and cluster stability.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Deadline: 2025-03-31   

Description OSIDB Bzimport 2025-03-21 06:02:30 UTC
The OpenShift Lightspeed Service does not enforce authentication when logging metrics for API requests, including those made to non-existent endpoints. This allows unauthenticated users to send a large volume of requests to arbitrary, non-existent endpoints, causing excessive metric entries. As a result, this behavior can lead to high CPU and memory usage, degraded application performance, and potential denial of service  conditions for monitoring and logging components.