Bug 1148170 (CVE-2014-3674) - CVE-2014-3674 OpenShift Enterprise: gears fail to properly isolate network traffic
Summary: CVE-2014-3674 OpenShift Enterprise: gears fail to properly isolate network tr...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2014-3674
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1147598 1148173
Blocks: 1148171
TreeView+ depends on / blocked
 
Reported: 2014-09-30 20:28 UTC by Kurt Seifried
Modified: 2019-09-29 13:22 UTC (History)
12 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2016-06-10 20:24:55 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:1796 0 normal SHIPPED_LIVE Moderate: Red Hat OpenShift Enterprise 2.2 Release Advisory 2014-11-04 00:52:02 UTC
Red Hat Product Errata RHSA-2014:1906 0 normal SHIPPED_LIVE Moderate: Red Hat OpenShift Enterprise 2.1.9 security, bug fix, and enhancement update 2014-11-25 23:19:05 UTC

Description Kurt Seifried 2014-09-30 20:28:07 UTC
It was reported that OpenShift Enterprise fails to properly restrict access to 
network resources between different gears. This could allow an attacker to 
access an unprotected network resource running in another users gear.

Comment 3 Anping Li 2014-11-03 06:46:44 UTC
Verified and pass on OSE-2.2
oo-gear-firewall was kick off to fix the security issue.
For new installation, new security rules have been enabled.
For exist instance, oo-gear-firewall should be run to fix the security issue

Comment 4 errata-xmlrpc 2014-11-03 19:55:12 UTC
This issue has been addressed in the following products:

  RHEL 6 Version of OpenShift Enterprise 2.2

Via RHSA-2014:1796 https://rhn.redhat.com/errata/RHSA-2014-1796.html

Comment 6 Martin Prpič 2014-11-19 10:27:27 UTC
IssueDescription:

It was found that OpenShift Enterprise 2.1 did not properly restrict access to services running on different gears. This could allow an attacker to access unprotected network resources running in another user's gear.

Comment 7 errata-xmlrpc 2014-11-25 18:19:40 UTC
This issue has been addressed in the following products:

  RHEL 6 Version of OpenShift Enterprise 2.1

Via RHSA-2014:1906 https://rhn.redhat.com/errata/RHSA-2014-1906.html


Note You need to log in before you can comment on or make changes to this bug.