RHEL 7 : openstack-packstack and openstack-puppet-modules (RHSA-2015:0789)

critical Nessus Plugin ID 210185

Synopsis

The remote Red Hat host is missing a security update for openstack-packstack / openstack-puppet-modules.

Description

The remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2015:0789 advisory.

PackStack is a command-line utility for deploying OpenStack on existing servers over an SSH connection. Deployment options are provided either interactively, using the command line, or non-interactively by means of a text file containing a set of preconfigured values for OpenStack parameters. PackStack is suitable for proof-of-concept installations.
PackStack is suitable for deploying proof-of-concept installations.

It was discovered that the puppet manifests, as provided with the openstack-puppet-modules package, would configure the pcsd daemon with a known default password. If this password was not changed and an attacker was able to gain access to pcsd, they could potentially run shell commands as root. (CVE-2015-1842)

This issue was discovered by Alessandro Vozza of Red Hat.

This update also fixes the following bugs:

* If OpenStack Networking is enabled, Packstack would display a warning if the Network Manager service is active on hosts. (BZ#1117277)

* A quiet dependency on a newer version of selinux-policy causes openstack-selinux 0.6.23 to fail to install modules when paired with selinux-policy packages from Red Hat Enterprise Linux 7.0 or 7.0.z.
This causes Identity and other OpenStack services to receive 'AVC' denials and malfunction under some circumstances. The following workarounds allow the OpenStack services to function correctly:

1) Leave openstack-selinux at 0.6.18-2.el7ost until you are ready to update to Red Hat Enterprise Linux 7.1. At that time, a 'yum update' will resolve the issue.

2) Install the updated selinux-policy and selinux-policy-targeted packages from Red Hat Enterprise Linux 7.1 (version selinux-policy-3.13.1-23.el7 or later), then update openstack-selinux to version 0.6.23-1.el7ost.
(BZ#1195252)

* A typo in the code caused a Sahara option that uses OpenStack Networking to be always false. Sahara now uses OpenStack Networking if the parameter 'CONFIG_NEUTRON_INSTALL is set to 'y'. (BZ#1199047)

* Prior to this update, users had to install the OpenStack Unified Client separately after an installation of Packstack. Packstack now installs it by default. (BZ#1199114)

* This enhancement updates Packstack to retain temporary directories when running an installation in debug mode. This assists with troubleshooting activities. As a result, temporary directories are not deleted when running Packstack with the --debug command line option. (BZ#1199565)

* Prior to this update, some validators did not use 'validate_not_empty' to ensure that certain parameters contained values. As a result, a number of internal validations could not be properly handled, leading to the possibility of unexpected errors. This update fixes validators to use validate_not_empty when required, resulting in correct validation behavior from validators. (BZ#11995889)

In addition to the above issues, this update also addresses bugs and enhancements which can be found in the Red Hat Enterprise Linux OpenStack Platform Technical Notes, linked to in the References section.

All openstack-packstack and openstack-puppet-modules users are advised to upgrade to these updated packages, which correct these issues.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL openstack-packstack / openstack-puppet-modules packages based on the guidance in RHSA-2015:0789.

See Also

https://access.redhat.com/security/updates/classification/#important

http://www.nessus.org/u?40d9c706

https://bugzilla.redhat.com/show_bug.cgi?id=1117277

https://bugzilla.redhat.com/show_bug.cgi?id=1123117

https://bugzilla.redhat.com/show_bug.cgi?id=1171744

https://bugzilla.redhat.com/show_bug.cgi?id=1172305

https://bugzilla.redhat.com/show_bug.cgi?id=1173930

https://bugzilla.redhat.com/show_bug.cgi?id=1187343

https://bugzilla.redhat.com/show_bug.cgi?id=1187706

https://bugzilla.redhat.com/show_bug.cgi?id=1193889

https://bugzilla.redhat.com/show_bug.cgi?id=1195252

https://bugzilla.redhat.com/show_bug.cgi?id=1195258

https://bugzilla.redhat.com/show_bug.cgi?id=1199047

https://bugzilla.redhat.com/show_bug.cgi?id=1199072

https://bugzilla.redhat.com/show_bug.cgi?id=1199076

https://bugzilla.redhat.com/show_bug.cgi?id=1199085

https://bugzilla.redhat.com/show_bug.cgi?id=1199114

https://bugzilla.redhat.com/show_bug.cgi?id=1199423

https://bugzilla.redhat.com/show_bug.cgi?id=1199427

https://bugzilla.redhat.com/show_bug.cgi?id=1199519

https://bugzilla.redhat.com/show_bug.cgi?id=1199547

https://bugzilla.redhat.com/show_bug.cgi?id=1199549

https://bugzilla.redhat.com/show_bug.cgi?id=1199562

https://bugzilla.redhat.com/show_bug.cgi?id=1199565

https://bugzilla.redhat.com/show_bug.cgi?id=1199589

https://bugzilla.redhat.com/show_bug.cgi?id=1199677

https://bugzilla.redhat.com/show_bug.cgi?id=1201875

https://bugzilla.redhat.com/show_bug.cgi?id=1202107

https://bugzilla.redhat.com/show_bug.cgi?id=1204482

http://www.nessus.org/u?1c3866d4

https://access.redhat.com/errata/RHSA-2015:0789

Plugin Details

Severity: Critical

ID: 210185

File Name: redhat-RHSA-2015-0789.nasl

Version: 1.1

Type: local

Agent: unix

Published: 11/4/2024

Updated: 11/4/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2015-1842

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:openstack-puppet-modules, p-cpe:/a:redhat:enterprise_linux:openstack-packstack-doc, p-cpe:/a:redhat:enterprise_linux:openstack-packstack, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:openstack-packstack-puppet

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 4/7/2015

Vulnerability Publication Date: 3/10/2015

Reference Information

CVE: CVE-2015-1842

CWE: 798

RHSA: 2015:0789