- Issued:
- 2024-11-13
- Updated:
- 2024-11-13
RHSA-2024:9485 - Security Advisory
Synopsis
Important: Control plane Operators for RHOSO 18.0.3 (Feature Release 1) security update
Type/Severity
Security Advisory: Important
Topic
Control plane Operators for RHOSO 18.0.3 (Feature Release 1).
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Security fix(es):
- Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. (CVE-2024-34156)
- When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded. (CVE-2023-45289)
- When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permitted a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion. (CVE-2023-45290)
- Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic. This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates. (CVE-2024-24783)
- The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers. (CVE-2024-24784)
- If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the
html/template package, allowing for subsequent actions to inject unexpected content into templates. (CVE-2024-24785)
- A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop. (CVE-2024-24788)
- Calling any of the Parse functions on Go source code which contains deeply nested literals can cause a panic due to stack exhaustion. (CVE-2024-34155)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.
Solution
RHOSO OpenStack Podified Control Plane Operators
Affected Products
- Red Hat OpenStack Services on OpenShift Podifed Operators 1.0 x86_64
Fixes
- BZ - 2268017 - CVE-2023-45290 golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm
- BZ - 2268018 - CVE-2023-45289 golang: net/http/cookiejar: incorrect forwarding of sensitive headers and cookies on HTTP redirect
- BZ - 2268019 - CVE-2024-24783 golang: crypto/x509: Verify panics on certificates with an unknown public key algorithm
- BZ - 2268021 - CVE-2024-24784 golang: net/mail: comments in display names are incorrectly handled
- BZ - 2268022 - CVE-2024-24785 golang: html/template: errors returned from MarshalJSON methods may break template escaping
- BZ - 2279814 - CVE-2024-24788 golang: net: malformed DNS message can cause infinite loop
- BZ - 2310527 - CVE-2024-34155 go/parser: golang: Calling any of the Parse functions containing deeply nested literals can cause a panic/stack exhaustion
- BZ - 2310528 - CVE-2024-34156 encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion
- OSPRH-10040 - Run Glance pod components at minimum privilege escalation level
- OSPRH-10141 - Run Manila pod components at minimum privilege escalation level
- OSPRH-10288 - Run Neutron pod components at minimum privilege escalation level
- OSPRH-10411 - Nil pointer derefence when using PreProvisioningNetworkData
- OSPRH-1099 - Support ManilaShare deletion
- OSPRH-3467 - Glance edge/dcn support
- OSPRH-6720 - TLS-e not working for glanceAPI Edge instances
- OSPRH-7817 - Tech Debt - As a cloud operator I would like to roll-back to the old 17.1 based control plane if the adoption process fails
- OSPRH-8072 - Adding and then removing an glance API definition from OpenStackControlPlane does not clean up spec.glance.apiOverrides
- OSPRH-8193 - [glance] Modifying osp-secret triggers an almost complete restart of the podified control plane
- OSPRH-8195 - [swift] Modifying osp-secret triggers an almost complete restart of the podified control plane
- OSPRH-8290 - [manila] Modifying osp-secret triggers an almost complete restart of the podified control plane
- OSPRH-9285 - horizon-operator doesn't accept networkAttachment option to assign the additional network for NFS share of glance image upload
- OSPRH-11068 - openstack-operator-controller-manager crashing with nil pointer deference panic when deployment job fails
- OSPRH-9371 - Use of lib-common VerifySecret prevents proper requeue in certain operators
- OSPRH-10639 - Improve how the config will be mounted and consumed in the heat pods
- OSPRH-9991 - ValidateCertSecrets miss return information on which cert secret is missing
- OSPRH-10035 - Telemetry can't make progress, yet operator status is "in progress" and no event nor status update on OpenSTackControlPlane CR
- OSPRH-10195 - Add support for Galera's safe_to_bootstrap to improve bootstrap
- OSPRH-10612 - Can't change the persistent field of MetricStorage
- OSPRH-10725 - octavia-operator displays backtraces on startup
- OSPRH-7610 - Export and scrape RabbitMQ metrics
- OSPRH-105 - Support Cell deletion
- OSPRH-6951 - Auto-detect EDPM image checksum details during baremetal provisioning
- OSPRH-7821 - mariadb-operator may not reconcile galera start properly when it is restarted
- OSPRH-8038 - Setting the memcached replicas to 0 is allowed but breaks the control plane
- OSPRH-8058 - Galera.Spec.AdoptionRedirect is not used by the adoption process
- OSPRH-8069 - Modifying osp-secret triggers an almost complete restart of the podified control plane
- OSPRH-9411 - mariadb operator cannot reconcile state of a pod in pending phase
- OSPRH-9908 - SAST: Provide access to secrets via volume mounts instead of setting `valueFrom.secretKeyRef` in `env`
- OSPRH-8065 - Autoscaling is ignoring prometheusTLS field
- OSPRH-8074 - telemetry-operator panics when using customMonitoringStack and ScrapeInterval isn't set
- OSPRH-8118 - OVNDbCluster: ovsdb-server process is not exited gracefully
- OSPRH-8212 - Improve TERM signal handling in OVNDbCluster startup scripts
- OSPRH-8508 - Support ipv6 for metrics retrieval
- OSPRH-8535 - DataplaneNetwork should be optional
- OSPRH-8582 - telemetry-operator must support empty template
- OSPRH-9455 - Live migration fails with TLS cert error when ctlplane network is not listed as the first network
- OSPRH-4128 - Power Consumptions Metrics using CeilometerIpmi
- OSPRH-10090 - Fix race condition if ring rebalance is needed
- OSPRH-10282 - Allow to match BMH and EDPM node's hostname one by one
- OSPRH-1478 - Cinder edge/dcn support
- OSPRH-2428 - As a cloud operator I would like to adopt my existing 17.1 OpenStack environment where the control plane is running on Baremetal so that I am on a Red Hat supported platform & architecture.
- OSPRH-3466 - Deploy an arbitrary number of glanceAPI
- OSPRH-6501 - Golang update to version 1.21 in all modules and submodules
- OSPRH-8192 - [cinder] Modifying osp-secret triggers an almost complete restart of the podified control plane
- OSPRH-9910 - Node provisioning should only be possible with configured IPAM
- OSPRH-6624 - Enable/disable TLS as day 2 operation
- OSPRH-7324 - Implement Octavia log offloading in the Podified Control Plane
- OSPRH-8078 - RabbitMQ does not disable TLS when previously enabled
CVEs
x86_64
rhoso-operators/barbican-rhel9-operator@sha256:9d4c302bf3ef3861b54fc401d1742e91b089e9172c28fcf7d450dac4c50f03ea |
rhoso-operators/cinder-rhel9-operator@sha256:5b0a67c7eb1eeda740c1d7659eea8ab51a21427e1ba2ff1714860bc7f01a3ca6 |
rhoso-operators/designate-rhel9-operator@sha256:a5646a3a3d6f7584538ecddeac5537e26ae6c0f60b36df7ebae1bd527cc982c7 |
rhoso-operators/glance-rhel9-operator@sha256:a1c8bcc3bc80b8787bed607276084c23bc7891ddb91eba6f145779a8fe481834 |
rhoso-operators/heat-rhel9-operator@sha256:ea965c08c2c7d31410ed80b8eb808933cc511783f8c69b0d1bd8a17ee9abf19d |
rhoso-operators/horizon-rhel9-operator@sha256:17246bbe4f31daffc1614ac6a3d5d90a552b2cdd68d757bd48be6c57d31f6c2e |
rhoso-operators/infra-rhel9-operator@sha256:5c873e80bc6a33ac0244e75ef93582e22f211125ed50fd06b4537cc8db15e37e |
rhoso-operators/ironic-rhel9-operator@sha256:030589a0e86a20a306c3e9118c3f29ee95d409fc88a1173f174c11556c6ca58c |
rhoso-operators/keystone-rhel9-operator@sha256:6d2d87f44b7c0b3b5aff6bc2ad112d4bcd3e5f2a2a157f449842cc9340789392 |
rhoso-operators/manila-rhel9-operator@sha256:15356683398fada9c162ccc37f150477f39a1c53f55033d07c712ad6aa317e36 |
rhoso-operators/mariadb-rhel9-operator@sha256:98bcc0d3c4b05d160a615165426c13bb2318597fa126c2fe9a38688d81fd4ea1 |
rhoso-operators/neutron-rhel9-operator@sha256:850c2f1377fa0a5a0143ed226abccbec78ed03d86adcdc1e9daaa2dd45614d49 |
rhoso-operators/nova-rhel9-operator@sha256:641657e9340a21d5e82e81407b2b3719df6eed8cd8334171aaa338dde86d6d52 |
rhoso-operators/octavia-rhel9-operator@sha256:605b6c299ab3bd243638a7896c2f5105fcfddbe92d1d6975ad3819f449c00709 |
rhoso-operators/openstack-baremetal-agent-rhel9@sha256:f08212d197b81bbcd1e44ffb5e20d2b7327b3b438b103e37065783f9027c020c |
rhoso-operators/openstack-baremetal-rhel9-operator@sha256:0960068ccad1929734b174c67a64e06d7afc1851123c117dc942d2873046f808 |
rhoso-operators/openstack-must-gather-rhel9@sha256:586ab3bab72c0dd76418c6e4fbf49577c289430212567aab495cd7231d52e4fc |
rhoso-operators/openstack-rhel9-operator@sha256:7d7de1bbcd1154bb6aa9c1d0e94c1413aad4714b3cbe8d6d2512bca238af3292 |
rhoso-operators/ovn-rhel9-operator@sha256:cca32c23677bf4ad3405d7151ced32b4963860edd50981b236b8ef636567e982 |
rhoso-operators/placement-rhel9-operator@sha256:44c1ef6eacfa049e4846dabd182648ccad01df7f5019ac7ea9d98bc8b0e2d95f |
rhoso-operators/rabbitmq-cluster-rhel9-operator@sha256:e9f6e20f5e7a11cea3533cebc6834ce36d20007ad3fc866c373e410c66c8195d |
rhoso-operators/sg-core-rhel9@sha256:e40fac6ed64076c41c6056df02153011ea9ac575ca018aa1c9c3b8093426f6d4 |
rhoso-operators/swift-rhel9-operator@sha256:59483bd45a23f40462c37064ec6dc334b8366f6266aa959825d2a8ed7075ff40 |
rhoso-operators/telemetry-rhel9-operator@sha256:66fefdca3acda5f33d8eefe32abd3a2c1e3665e5ae9456683dca604524001695 |
rhoso-operators/test-rhel9-operator@sha256:e248484aaea76516e4c504439608f3ccfd5236756521156780ada8a14bf25b98 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.