Bug 1597090 (CVE-2018-10885) - CVE-2018-10885 atomic-openshift: Malicious network-policy can cause Openshift Routing DoS when using ovs-networkpolicy plugin
Summary: CVE-2018-10885 atomic-openshift: Malicious network-policy can cause Openshift...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2018-10885
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1596680 1596683 1597112
Blocks: 1594096
TreeView+ depends on / blocked
 
Reported: 2018-07-02 03:39 UTC by Jason Shepherd
Modified: 2021-10-25 09:48 UTC (History)
14 users (show)

Fixed In Version: atomic-openshift 3.10.9
Clone Of:
Environment:
Last Closed: 2021-10-25 09:48:24 UTC
Embargoed:


Attachments (Terms of Use)

Description Jason Shepherd 2018-07-02 03:39:12 UTC
A malicious network-policy configuration can cause Openshift Routing to crash when using ovs-network policy plugin. An attacker can use this flaw to cause a Denial of Service (DoS) attack on an Openshift 3.9 Cluster.

Comment 2 Jason Shepherd 2018-07-02 03:41:19 UTC
The ovs-networkpolicy plugin was tech preview until the 3.7 release, ref: https://docs.openshift.com/container-platform/3.6/install_config/configuring_sdn.html

Comment 6 Jason Shepherd 2018-07-04 05:27:57 UTC
Acknowledgments:

Name: Taichi Kageyama (NEC)

Comment 7 Jason Shepherd 2018-07-04 05:35:18 UTC
Mitigation:

Use an alternative plugin such as ovs-subnet, or ovs-multitentant if delivering a multitentant service.

Comment 8 msiddiqu 2019-08-20 18:38:21 UTC
OCP 3.10.0 Reference:

https://bugzilla.redhat.com/show_bug.cgi?id=1743747


Note You need to log in before you can comment on or make changes to this bug.