- Issued:
- 2018-05-17
- Updated:
- 2018-05-17
RHSA-2018:1593 - Moderate: Red Hat OpenStack Platform director security update
Synopsis
Moderate: Red Hat OpenStack Platform director security update
Type/Severity
Security Advisory Moderate
Topic
An update is now available for Red Hat OpenStack Platform 10.0 (Newton).
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat OpenStack Platform director provides the facilities for deploying and monitoring a private or public infrastructure-as-a-service (IaaS) cloud based on Red Hat OpenStack Platform.
Security Fix(es):
- A resource-permission flaw was found in the python-tripleo and openstack-tripleo-heat-templates packages where ceph.client.openstack.keyring is created as world-readable. A local attacker with access to the key could read or modify data on Ceph cluster pools for OpenStack as though the attacker were the OpenStack service, thus potentially reading or modifying data in an OpenStack Block Storage volume.
To exploit this flaw, the attacker must have local access to an overcloud node. However by default, access to overcloud nodes is restricted and accessible only from the management undercloud server on an internal network. (CVE-2017-12155)
This issue was discovered by Katuya Kawakami (NEC).
- It was discovered that the memcached connections using UDP transport protocol can be abused for efficient traffic amplification distributed denial of service (DDoS) attacks. A remote attacker could send a malicious UDP request using a spoofed source IP address of a target system to memcached, causing it to send a significantly larger response to the target. (CVE-2018-1000115)
This advisory also addresses the following issues:
-
This release adds support for deploying Dell EMC VMAX Block Storage backend using the Red Hat OpenStack Platform director. (BZ#1503896)
-
Using composable roles for deploying Dell SC and PS Block Storage backend caused errors. The backends could only be deploying using 'cinder::config::cinder_config' hiera data. With this update, the composable role support for deploying the Dell SC and PS Block Storage backends is updated. As a result, they can be now deployed using composable roles. (BZ#1552980)
-
Previously, the iptables rules were managed by the Red Hat OpenStack Platform director and the OpenStack Networking service, which resulted in the rules created by the OpenStack Networking service to persist on to the disk. As a result, the rules that should not be loaded after an iptables restart or a system reboot would be loaded causing traffic issues. With this update, the Red Hat OpenStack Platform director has been updated to exclude the OpenStack Networking rules from '/etc/sysconfig/iptables' when the director saves the firewall rules. As a result, iptables restart or a system reboot should work without causing traffic problems. Note: It might be necessary to perform a rolling restart of the controller nodes to ensure that any orphaned managed neutron rules are no longer reloaded. (BZ#1541528)
-
OS::TripleO::SwiftStorage::Ports* resources have been renamed to OS::TripleO::ObjectStorage::Port* to ensure standalone Object Storage nodes using the 'ObjectStorage' roles can be deployed correctly. Operators need to modify their custom templates that previously used OS::TripleO::SwiftStorage::Ports* settings. (BZ#1544802)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenStack | 10 | x86_64 |
Updated Packages
- puppet-tripleo-5.6.8-6.el7ost.noarch.rpm
- openstack-tripleo-heat-templates-5.3.10-1.el7ost.noarch.rpm
- puppet-tripleo-5.6.8-6.el7ost.src.rpm
- openstack-tripleo-heat-templates-5.3.10-1.el7ost.src.rpm
Fixes
- This content is not included.BZ - 1414549
- This content is not included.BZ - 1489360
- This content is not included.BZ - 1503896
- This content is not included.BZ - 1514532
- This content is not included.BZ - 1514842
- This content is not included.BZ - 1517302
- This content is not included.BZ - 1533602
- This content is not included.BZ - 1534540
- This content is not included.BZ - 1538753
- This content is not included.BZ - 1541528
- This content is not included.BZ - 1543883
- This content is not included.BZ - 1544211
- This content is not included.BZ - 1544802
- This content is not included.BZ - 1545666
- This content is not included.BZ - 1547091
- This content is not included.BZ - 1547957
- This content is not included.BZ - 1551182
- This content is not included.BZ - 1552980
- This content is not included.BZ - 1559093
- This content is not included.BZ - 1568596
- This content is not included.BZ - 1568601
- This content is not included.BZ - 1571840
- This content is not included.BZ - 1576577
CVEs
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.