Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1322718 - (CVE-2016-3711) CVE-2016-3711 haproxy: Setting cookie containing internal IP address of a pod
CVE-2016-3711 haproxy: Setting cookie containing internal IP address of a pod
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20160317,reported=2...
: Security
Depends On: 1318796 1322719 1322720 1322721
Blocks: 1322723 1326106 1326107
  Show dependency treegraph
 
Reported: 2016-03-31 04:25 EDT by Adam Mariš
Modified: 2018-04-18 20:51 EDT (History)
15 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
An information disclosure flaw was discovered in haproxy as used by OpenShift Enterprise; a cookie with the name "OPENSHIFT_[namespace]_SERVERID" was set, which contained the internal IP address of a pod.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-05-12 12:49:36 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2016:1064 normal SHIPPED_LIVE Important: Red Hat OpenShift Enterprise 3.2 security, bug fix, and enhancement update 2016-05-12 16:19:17 EDT

  None (edit)
Description Adam Mariš 2016-03-31 04:25:51 EDT
It was found that cookies are being set with the name of "OPENSHIFT_<namespace>_SERVERID", containing the internal IP address of the pod.

Product bug:

https://bugzilla.redhat.com/show_bug.cgi?id=1318796
Comment 4 errata-xmlrpc 2016-05-12 12:35:05 EDT
This issue has been addressed in the following products:

  Red Hat OpenShift Enterprise 3.2

Via RHSA-2016:1064 https://access.redhat.com/errata/RHSA-2016:1064

Note You need to log in before you can comment on or make changes to this bug.