Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1039148 - (CVE-2013-6419) CVE-2013-6419 OpenStack Neutron and Nova: Metadata queries from Neutron to Nova are not restricted by tenant
CVE-2013-6419 OpenStack Neutron and Nova: Metadata queries from Neutron to No...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20131211,repor...
: Security
Depends On: 1039154 1039161
Blocks: 1023240 1039152
  Show dependency treegraph
 
Reported: 2013-12-06 14:07 EST by Kurt Seifried
Modified: 2016-04-26 19:17 EDT (History)
15 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-07-15 03:13:08 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
cve-2013-6419-neutron-master-icehouse.patch (13.87 KB, patch)
2013-12-06 14:27 EST, Kurt Seifried
no flags Details | Diff
cve-2013-6419-neutron-stable-grizzly.patch (9.21 KB, patch)
2013-12-06 14:27 EST, Kurt Seifried
no flags Details | Diff
cve-2013-6419-neutron-stable-havana.patch (11.54 KB, patch)
2013-12-06 14:27 EST, Kurt Seifried
no flags Details | Diff
cve-2013-6419-nova-master-icehouse.patch (10.21 KB, patch)
2013-12-06 14:28 EST, Kurt Seifried
no flags Details | Diff
cve-2013-6419-nova-stable-grizzly.patch (5.58 KB, patch)
2013-12-06 14:28 EST, Kurt Seifried
no flags Details | Diff
cve-2013-6419-nova-stable-havana.patch (7.61 KB, patch)
2013-12-06 14:28 EST, Kurt Seifried
no flags Details | Diff


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:0091 normal SHIPPED_LIVE Moderate: openstack-neutron security, bug fix, and enhancement update 2014-01-22 18:31:15 EST
Red Hat Product Errata RHSA-2014:0231 normal SHIPPED_LIVE Moderate: openstack-nova security and bug fix update 2014-03-04 19:00:29 EST

  None (edit)
Description Kurt Seifried 2013-12-06 14:07:39 EST
Jeremy Stanley of the OpenStack	Project	reports:

Aaron Rosen from VMware reported a vulnerability in the metadata
access from OpenStack Neutron to Nova. Because of a missing
authorization check on port binding, by guessing an instance_id a
tenant may retrieve another tenant's metadata resulting in
information disclosure. Only OpenStack setups running
neutron-metadata-agent are affected.
Comment 2 Kurt Seifried 2013-12-06 14:27:09 EST
Created attachment 833732 [details]
cve-2013-6419-neutron-master-icehouse.patch
Comment 3 Kurt Seifried 2013-12-06 14:27:30 EST
Created attachment 833733 [details]
cve-2013-6419-neutron-stable-grizzly.patch
Comment 4 Kurt Seifried 2013-12-06 14:27:53 EST
Created attachment 833734 [details]
cve-2013-6419-neutron-stable-havana.patch
Comment 5 Kurt Seifried 2013-12-06 14:28:11 EST
Created attachment 833735 [details]
cve-2013-6419-nova-master-icehouse.patch
Comment 6 Kurt Seifried 2013-12-06 14:28:41 EST
Created attachment 833736 [details]
cve-2013-6419-nova-stable-grizzly.patch
Comment 7 Kurt Seifried 2013-12-06 14:28:58 EST
Created attachment 833737 [details]
cve-2013-6419-nova-stable-havana.patch
Comment 8 Kurt Seifried 2013-12-06 14:31:59 EST
Acknowledgements: 

Red Hat would like to thank the OpenStack Project for reporting this issue. Upstream acknowledges Aaron Rosen of VMware as the original reporter.
Comment 13 errata-xmlrpc 2014-01-22 13:31:59 EST
This issue has been addressed in following products:

  OpenStack 4 for RHEL 6

Via RHSA-2014:0091 https://rhn.redhat.com/errata/RHSA-2014-0091.html
Comment 15 errata-xmlrpc 2014-03-04 14:04:04 EST
This issue has been addressed in following products:

  OpenStack 4 for RHEL 6

Via RHSA-2014:0231 https://rhn.redhat.com/errata/RHSA-2014-0231.html

Note You need to log in before you can comment on or make changes to this bug.