A resource-permission flaw was found in the openstack-tripleo-heat-templates package where ceph.client.openstack.keyring is created as world-readable. A local attacker with access to the key could read or modify data on Ceph cluster pools for OpenStack as though the attacker were the OpenStack service, thus potentially reading or modifying data in an OpenStack Block Storage volume.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2018:1593 | vendor advisory |
https://access.redhat.com/errata/RHSA-2018:1627 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1489360 | mitigation issue tracking |
https://bugs.launchpad.net/tripleo/+bug/1720787 | patch issue tracking |
https://access.redhat.com/errata/RHSA-2018:0602 | vendor advisory |