Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1410293 - (CVE-2016-9590) CVE-2016-9590 puppet-swift: installs config file with world readable permissions
CVE-2016-9590 puppet-swift: installs config file with world readable permissions
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20170112,repor...
: Security
Depends On: 1410298 1410299 1412837 1412844 1412845
Blocks: 1405284
  Show dependency treegraph
 
Reported: 2017-01-04 21:21 EST by Summer Long
Modified: 2018-04-25 17:15 EDT (History)
23 users (show)

See Also:
Fixed In Version: puppet-swift 8.2.1, puppet-swift 9.4.4
Doc Type: If docs needed, set a value
Doc Text:
An information-disclosure flaw was discovered in Red Hat OpenStack Platform director's installation of Object Storage (swift). During installation, the Puppet script responsible for deploying the service incorrectly removes and recreates the proxy-server.conf file with world-readable permissions.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-03-01 18:55:46 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
CVE-2016-9590 patch for puppet-swift (2.93 KB, patch)
2017-01-12 11:18 EST, Alex Schultz
no flags Details | Diff


External Trackers
Tracker ID Priority Status Summary Last Updated
OpenStack gerrit 419556 None None None 2017-01-12 12:21 EST
Red Hat Product Errata RHSA-2017:0200 normal SHIPPED_LIVE Moderate: puppet-swift security update 2017-01-26 16:41:12 EST
Red Hat Product Errata RHSA-2017:0359 normal SHIPPED_LIVE Moderate: openstack-puppet-modules security update 2017-03-01 13:31:57 EST
Red Hat Product Errata RHSA-2017:0361 normal SHIPPED_LIVE Moderate: openstack-puppet-modules security update 2017-03-01 13:31:42 EST

  None (edit)
Description Summer Long 2017-01-04 21:21:39 EST
The openstack-swift package itself installs the file with the correct permissions, however a puppet script that runs as part of the install incorrectly removes and recreates the file with world-readable permissions.
Comment 2 Summer Long 2017-01-11 18:44:01 EST
Acknowledgments:

Name: Hans Feldt (Ericsson)
Comment 4 Alex Schultz 2017-01-12 11:18 EST
Created attachment 1240008 [details]
CVE-2016-9590 patch for puppet-swift
Comment 6 Alex Schultz 2017-01-12 12:25:10 EST
It should be noted that openstack-11 is not affected as upstream landed a change[0] in how these configuration files are updated.  That being said, OSP8,OSP9 are affected via openstack-puppet-modules[1][2]. OSP7 should not be affected as it still had the permissions[3]

[0] https://review.openstack.org/#/c/378950/
[1] https://github.com/redhat-openstack/openstack-puppet-modules/blob/stable/mitaka/swift/manifests/proxy.pp#L182-L186
[2] https://github.com/redhat-openstack/openstack-puppet-modules/blob/stable/liberty/swift/manifests/proxy.pp#L184-L188
[3] https://github.com/redhat-openstack/openstack-puppet-modules/blob/stable/kilo/swift/manifests/proxy.pp#L176-L181
Comment 7 Summer Long 2017-01-12 17:56:00 EST
Created puppet-swift tracking bugs for this issue:

Affects: openstack-rdo [bug 1412837]
Comment 10 errata-xmlrpc 2017-01-26 11:42:21 EST
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 10.0 (Newton)

Via RHSA-2017:0200 https://rhn.redhat.com/errata/RHSA-2017-0200.html
Comment 11 errata-xmlrpc 2017-03-01 08:34:20 EST
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 8.0 (Liberty)

Via RHSA-2017:0361 https://rhn.redhat.com/errata/RHSA-2017-0361.html
Comment 12 errata-xmlrpc 2017-03-01 08:34:56 EST
This issue has been addressed in the following products:

  Red Hat OpenStack Platform 9.0 (Mitaka)

Via RHSA-2017:0359 https://rhn.redhat.com/errata/RHSA-2017-0359.html

Note You need to log in before you can comment on or make changes to this bug.