Bug 1916045 (CVE-2021-3139) - CVE-2021-3139 tcmu-runner: SCSI target (LIO) write to any block on ILO backstore
Summary: CVE-2021-3139 tcmu-runner: SCSI target (LIO) write to any block on ILO backstore
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2021-3139
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1915549 1915550 1915787
Blocks: 1897690
TreeView+ depends on / blocked
 
Reported: 2021-01-14 02:11 UTC by Sage McTaggart
Modified: 2021-05-06 18:32 UTC (History)
19 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2021-04-28 22:46:40 UTC
Embargoed:


Attachments (Terms of Use)

Description Sage McTaggart 2021-01-14 02:11:39 UTC
A flaw was found in the Linux kernels implementation of Linux SCSI target host where an authenticated attacker to write to any block on the exported scsi device backing store. tcmu-runner calls the affected xcopy command in SCSI, which lacks a check for transport-layer restrictions, allowing remote modification of files via directory traversal.

Comment 4 Sage McTaggart 2021-01-14 02:18:36 UTC
Created tcmu-runner tracking bugs for this issue:

Affects: fedora-all [bug 1915787]

Comment 6 RaTasha Tillery-Smith 2021-01-15 20:15:54 UTC
Statement:

This issue did not affect the version of tcmu-runner as shipped with Red Hat Gluster Storage 3, as it did not include support for Extended Copy (XCOPY). 

Red Hat Ceph Storage 3 and 4 are affected, as they ship an affected version of tcmu-runner with XCOPY.

Red Hat OpenShift Container Storage (RHOCS) 4 shipped tcmu-runner package for the usage of RHOCS 4.2 only, that has reached End Of Life. The shipped version of tcmu-runner package is no longer used and supported with the release of RHOCS 4.3.

Comment 7 RaTasha Tillery-Smith 2021-01-15 20:15:55 UTC
External References:

https://nvd.nist.gov/vuln/detail/CVE-2021-3139

Comment 8 RaTasha Tillery-Smith 2021-01-15 20:15:57 UTC
Mitigation:

As this feature can be guarded behind an authentication and firewall rules, limit access with firewall rules and enforcing strong password hygiene.  This may not be a suitable option if many uncontrolled hosts mount the networked iSCSI device.

Comment 9 Sage McTaggart 2021-02-09 19:38:07 UTC
Modified to accept NVD CVSS upon rescore.

Comment 10 errata-xmlrpc 2021-04-28 20:12:28 UTC
This issue has been addressed in the following products:

  Red Hat Ceph Storage 4.2

Via RHSA-2021:1452 https://access.redhat.com/errata/RHSA-2021:1452

Comment 11 Product Security DevOps Team 2021-04-28 22:46:40 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-3139

Comment 12 errata-xmlrpc 2021-05-06 18:32:05 UTC
This issue has been addressed in the following products:

  Red Hat Ceph Storage 3 - ELS

Via RHSA-2021:1518 https://access.redhat.com/errata/RHSA-2021:1518


Note You need to log in before you can comment on or make changes to this bug.