Bug 892909 (CVE-2013-0163)
Summary: | CVE-2013-0163 OpenShift haproxy cartridge: predictable /tmp in set-proxy connection hook | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Kurt Seifried <kseifried> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | bleanhar, bperkins, calfonso, ccoleman, dmcphers, jialiu, jkeck, jlieskov, jokerman, jrusnack, kseifried, lmeyer, mmccomas, security-response-team |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2014-09-06 05:37:24 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 892053, 928257 | ||
Bug Blocks: | 767033, 872346, 893314 |
Description
Kurt Seifried
2013-01-08 08:36:35 UTC
Acknowledgements: This issue was discovered by Michael Scherer of the Red Hat Regional IT team. So in total we have: ./openshift-origin-cartridge-haproxy-1.17.3/bin/control: cp -f "$haproxy_cfg" /tmp/haproxy.cfg.$$ ./openshift-origin-cartridge-haproxy-1.17.3/bin/control: sed -i "/$1/ s#\$# disabled#g" /tmp/haproxy.cfg.$$ ./openshift-origin-cartridge-haproxy-1.17.3/bin/control: cat /tmp/haproxy.cfg.$$ > "$haproxy_cfg" ./openshift-origin-cartridge-haproxy-1.17.3/bin/control: rm -f /tmp/haproxy.cfg.$$ ./openshift-origin-cartridge-haproxy-1.17.3/bin/control: cp -f "$haproxy_cfg" /tmp/haproxy.cfg.$$ ./openshift-origin-cartridge-haproxy-1.17.3/bin/control: sed -i "/$1/ s#disabled\$##g" /tmp/haproxy.cfg.$$ ./openshift-origin-cartridge-haproxy-1.17.3/bin/control: cat /tmp/haproxy.cfg.$$ > "$haproxy_cfg" ./openshift-origin-cartridge-haproxy-1.17.3/bin/control: rm -f /tmp/haproxy.cfg.$$ ./openshift-origin-cartridge-haproxy-1.17.3/usr/bin/fix_local.sh: cp -f $haproxy_cfg /tmp/haproxy.cfg.$$ ./openshift-origin-cartridge-haproxy-1.17.3/usr/bin/fix_local.sh: sed -i "/\s*server\s*local-gear\s.*/d" /tmp/haproxy.cfg.$$ ./openshift-origin-cartridge-haproxy-1.17.3/usr/bin/fix_local.sh: echo " server local-gear $local_ep weight 0" >> /tmp/haproxy.cfg.$$ ./openshift-origin-cartridge-haproxy-1.17.3/usr/bin/fix_local.sh: cat /tmp/haproxy.cfg.$$ > "$haproxy_cfg" ./openshift-origin-cartridge-haproxy-1.17.3/usr/bin/fix_local.sh: rm -f /tmp/haproxy.cfg.$$ ./openshift-origin-cartridge-haproxy-1.17.3/usr/bin/update-cluster:cp -f "$haproxy_cfg" /tmp/haproxy.cfg.$$ ./openshift-origin-cartridge-haproxy-1.17.3/usr/bin/update-cluster: sed -i "/\s*server\s*gear-$sg\s.*/d" /tmp/haproxy.cfg.$$ ./openshift-origin-cartridge-haproxy-1.17.3/usr/bin/update-cluster:sed -i "/\s*server\s*local-gear\s.*/d" /tmp/haproxy.cfg.$$ ./openshift-origin-cartridge-haproxy-1.17.3/usr/bin/update-cluster:echo " server local-gear $local_ep check fall 2 rise 3 inter 2000 cookie local-$OPENSHIFT_GEAR_UUID" >> /tmp/haproxy.cfg.$$ ./openshift-origin-cartridge-haproxy-1.17.3/usr/bin/update-cluster:cat /tmp/haproxy.cfg.$$ > "$haproxy_cfg" ./openshift-origin-cartridge-haproxy-1.17.3/usr/bin/update-cluster:rm -f /tmp/haproxy.cfg.$$ Wow, this bug is over a year old. :(. Looks like the set-proxy and fix-local.sh script need to be updated. This bug affects OSE 2.0 too so we should probably have a tracking bug there as well. Statement: This issue affects the versions of the haproxy cartridge as shipped with Red Hat OpenShift Enterprise 1 and 2. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. Additionally OpenShift uses a per user poly-instantiated /tmp directory which makes exploitation of this issue very difficult. |