- Issued:
- 2017-06-14
- Updated:
- 2017-06-14
RHSA-2017:1464 - Security Advisory
Synopsis
Moderate: openstack-heat security and bug fix update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for openstack-heat is now available for Red Hat OpenStack Platform 9.0 (Mitaka).
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
OpenStack Orchestration (heat) is a template-driven engine used to specify and deploy configurations for Compute, Storage, and OpenStack Networking. The service can be used to automate post-deployment actions, which in turn allows automated provisioning of infrastructure, services, and applications. Additionally, Orchestration can be integrated with Telemetry alarms to implement auto-scaling for certain infrastructure resources.
Security Fix(es):
- An access-control flaw was found in the OpenStack Orchestration (heat) service where a service log directory was improperly made world readable. A malicious system user could exploit this flaw to access sensitive information. (CVE-2017-2621)
- An information-leak vulnerability was found in the OpenStack Orchestration (heat) service. Launching a new stack with a local URL resulted in a detailed error message, allowing an authenticated user to conduct network discovery and reveal the details of internal network services. (CVE-2016-9185)
Red Hat would like to thank Hans Feldt (Ericsson) for reporting CVE-2017-2621.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat OpenStack 9 x86_64
Fixes
- BZ - 1391895 - CVE-2016-9185 openstack-heat: Template source URL allows network port scan
- BZ - 1418159 - OpenStack Heat may fail to connect keystone admin API in multi-region environment
- BZ - 1420990 - CVE-2017-2621 openstack-heat: /var/log/heat/ is world readable
- BZ - 1424586 - Heat doesn't inject personality files on rebuild
- BZ - 1424885 - Password written in clear text in heat-api.log with DEBUG mode [openstack-9]
- BZ - 1428879 - [UPDATES] ERROR: The "pre-update" hook is not defined on SoftwareDeployment "UpdateDeployment"
Red Hat OpenStack 9
SRPM | |
---|---|
openstack-heat-6.1.0-3.el7ost.src.rpm | SHA-256: 411209eae1adebb855adb008e5f64c2737de0ed436eb4adf2083474658163a9f |
x86_64 | |
openstack-heat-api-6.1.0-3.el7ost.noarch.rpm | SHA-256: fa6fd5931f1e3582014250b69278441f940967a261ec5b8b27f9f67b6fb03fd7 |
openstack-heat-api-cfn-6.1.0-3.el7ost.noarch.rpm | SHA-256: 155627e4afb88f05752e9ca156da5bada2dc0db4178b5fec812ad95953903899 |
openstack-heat-api-cloudwatch-6.1.0-3.el7ost.noarch.rpm | SHA-256: 8e8bede179af57c8f163aaaa8e41ff8dfd405133e2c2ee2fc6621789317ce85c |
openstack-heat-common-6.1.0-3.el7ost.noarch.rpm | SHA-256: 96efe1c9aa37c2293b1f0dda4f6039c2cc5bcaba451f18d5c12e72285e1d112a |
openstack-heat-engine-6.1.0-3.el7ost.noarch.rpm | SHA-256: 51a1bfa89ac3c946fe1172385f9dedd34623ef46927b112d0e8fdcf216f72e65 |
python-heat-tests-6.1.0-3.el7ost.noarch.rpm | SHA-256: 19fb76aa24510bba8614b03e8631d64082fc5ba3e723ee83d78e1ccef69d874c |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.