- Issued:
- 2017-01-05
- Updated:
- 2017-01-05
RHSA-2017:0025 - Security Advisory
Synopsis
Important: puppet-tripleo security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for puppet-tripleo is now available for Red Hat OpenStack Platform 10.0 (Newton).
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
puppet-tripleo is a key component of the Red Hat OpenStack Platform director, which is a toolset for installing and managing a complete OpenStack environment.
Security Fix(es):
- An access-control flaw was discovered in puppet-tripleo's IPtables rules management, which allowed the creation of TCP/UDP rules with empty port values. Some API services in Red Hat OpenStack Platform director are not exposed to public networks, which meant their $public_ssl_port value was set to empty (for example, openstack-glance, which is deployed by default on both undercloud and overcloud). If SSL was enabled, a malicious user could use these open ports to gain access to unauthorized resources. (CVE-2016-9599)
This issue was discovered by Ben Nemec (Red Hat).
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat OpenStack 10 x86_64
Fixes
- BZ - 1409687 - CVE-2016-9599 puppet-tripleo:if ssl is enabled, traffic is open on both undercloud and overcloud
CVEs
Red Hat OpenStack 10
SRPM | |
---|---|
puppet-tripleo-5.4.0-4.el7ost.src.rpm | SHA-256: b9056557bcb3bd67f5ade209f8b546803cca31709976cd23657a90b38c6bc812 |
x86_64 | |
puppet-tripleo-5.4.0-4.el7ost.noarch.rpm | SHA-256: c7e280298068cdf21662e8cae93e38cb68e7cf3a8e22510c233f7dfbcdd41fd1 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.