RHEL 7 : Red Hat OpenStack Platform director (RHSA-2018:1627)

medium Nessus Plugin ID 194093

Synopsis

The remote Red Hat host is missing one or more security updates for Red Hat OpenStack Platform director.

Description

The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2018:1627 advisory.

Red Hat OpenStack Platform director provides the facilities for deploying and monitoring a private or public infrastructure-as-a-service (IaaS) cloud based on Red Hat OpenStack Platform.

Security Fix(es):

* A resource-permission flaw was found in the python-tripleo and openstack-tripleo-heat-templates packages where ceph.client.openstack.keyring is created as world-readable. A local attacker with access to the key could read or modify data on Ceph cluster pools for OpenStack as though the attacker were the OpenStack service, thus potentially reading or modifying data in an OpenStack Block Storage volume.

To exploit this flaw, the attacker must have local access to an overcloud node. However by default, access to overcloud nodes is restricted and accessible only from the management undercloud server on an internal network. (CVE-2017-12155)

This issue was discovered by Katuya Kawakami (NEC).

* It was discovered that the memcached connections using UDP transport protocol can be abused for efficient traffic amplification distributed denial of service (DDoS) attacks. A remote attacker could send a malicious UDP request using a spoofed source IP address of a target system to memcached, causing it to send a significantly larger response to the target. (CVE-2018-1000115)

This update also includes the following bug fixes and enhancements:

* Prior to this update, when removing the ceph-osd RPM from overcloud nodes that do not require the package, the corresponding Ceph OSD product key was not removed. Consequently, the subscription-manager would incorrectly report that the Ceph OSD product was still installed.
With this update, the script that handles removal of the ceph-osd RPM now also removes the Ceph OSD product key. Note: The script that removes the RPM and product key executes only during the overcloud update procedure; the product key is removed only when the overcloud node is updated.
As a result, after removing the ceph-osd RPM, the subscription-manager no longer reports the Ceph OSD product is installed. (BZ#1571436)

* Previously, there were errors in the director Heat template that configures the VMAX Cinder backend driver. Consequently, the VMAX driver would not function correctly. With this update, the errors have been corrected, and the VMAX driver functions correctly. (BZ#1546799)

* This enhancement adds director support for deploying the Dell EMC VMAX cinder backend. (BZ#1546793)

* In this enhancement, if a minor update is blocked by an existing yum process that prevents the package update, the process should exit with an appropriate error message. This was added because the minor update may appear to freeze, due to yum waiting for the existing yum.pid to exit; when it eventually fails it is not immediately clear why. As a result, if there is an existing yum process preventing the package update, then the minor update fails with a clear message to indicate this: ERROR existing yum.pid detected - can't continue! Please ensure there is no other package update process for the duration of the minor update worfklow. Exiting. (BZ#1471721)

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL Red Hat OpenStack Platform director package based on the guidance in RHSA-2018:1627.

See Also

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=1445766

https://bugzilla.redhat.com/show_bug.cgi?id=1471721

https://bugzilla.redhat.com/show_bug.cgi?id=1478274

https://bugzilla.redhat.com/show_bug.cgi?id=1489360

https://bugzilla.redhat.com/show_bug.cgi?id=1518009

https://bugzilla.redhat.com/show_bug.cgi?id=1524422

https://bugzilla.redhat.com/show_bug.cgi?id=1546799

https://bugzilla.redhat.com/show_bug.cgi?id=1547089

https://bugzilla.redhat.com/show_bug.cgi?id=1547956

https://bugzilla.redhat.com/show_bug.cgi?id=1548345

https://bugzilla.redhat.com/show_bug.cgi?id=1550167

https://bugzilla.redhat.com/show_bug.cgi?id=1551182

https://bugzilla.redhat.com/show_bug.cgi?id=1552245

https://bugzilla.redhat.com/show_bug.cgi?id=1567349

https://bugzilla.redhat.com/show_bug.cgi?id=1567365

https://bugzilla.redhat.com/show_bug.cgi?id=1571436

https://bugzilla.redhat.com/show_bug.cgi?id=1577957

http://www.nessus.org/u?9f534244

https://access.redhat.com/errata/RHSA-2018:1627

Plugin Details

Severity: Medium

ID: 194093

File Name: redhat-RHSA-2018-1627.nasl

Version: 1.1

Type: local

Agent: unix

Published: 4/27/2024

Updated: 6/3/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: Low

Base Score: 3.3

Temporal Score: 2.6

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2017-12155

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 5.7

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:puppet-tripleo, p-cpe:/a:redhat:enterprise_linux:openstack-tripleo-heat-templates, cpe:/o:redhat:enterprise_linux:7

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/18/2018

Vulnerability Publication Date: 12/12/2017

Reference Information

CVE: CVE-2017-12155, CVE-2018-1000115

CWE: 732

RHSA: 2018:1627