- Issued:
- 2016-07-04
- Updated:
- 2016-07-04
RHSA-2016:1378 - Security Advisory
Synopsis
Moderate: openstack-ironic security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for openstack-ironic is now available for Red Hat OpenStack Platform 8.0 (Liberty).
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
OpenStack Bare Metal (ironic) is a tool used to provision bare metal (as opposed to virtual) machines. It leverages common technologies such as PXE boot and IPMI to cover a wide range of hardware. It also supports pluggable drivers to allow added, vendor-specific functionality.
Security Fix(es):
- An authentication vulnerability was found in openstack-ironic. A client with network access to the ironic-api service could bypass OpenStack Identity authentication, and retrieve all information about any node registered with OpenStack Bare Metal. If an unprivileged attacker knew (or was able to guess) the MAC address of a network card belonging to a node, the flaw could be exploited by sending a crafted POST request to the node's /v1/drivers/$DRIVER_NAME/vendor_passthru resource. The response included the node's full details, including management passwords, even if the /etc/ironic/policy.json file was configured to hide passwords in API responses. (CVE-2016-4985)
Red Hat would like to thank the OpenStack Ironic project for reporting this issue. Upstream acknowledges Devananda van der Veen (IBM) as the original reporter.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat OpenStack 8 x86_64
Fixes
- BZ - 1346193 - CVE-2016-4985 openstack-ironic: Ironic Node information including credentials exposed to unauthenticated users
CVEs
Red Hat OpenStack 8
SRPM | |
---|---|
openstack-ironic-4.2.5-1.el7ost.src.rpm | SHA-256: c4263b033032de74156204c690ecdd9a17fed8801fc932384906e1387ad9928c |
x86_64 | |
openstack-ironic-api-4.2.5-1.el7ost.noarch.rpm | SHA-256: 8925a8820bbaafb67422424a596e0e9d196ed75f58524cf4db5c2c236a50f4ad |
openstack-ironic-common-4.2.5-1.el7ost.noarch.rpm | SHA-256: bb9530c3a1db701b7adda8707d1564fd73a3b5934632525a16d9eb9ad07d0429 |
openstack-ironic-conductor-4.2.5-1.el7ost.noarch.rpm | SHA-256: 1b526df65f180063227d6cb75fc3ce330ce69741f93361b9c2f49d128ed33d98 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.