Skip to navigation

Security Advisory Important: Foreman security and bug fix update

Advisory: RHSA-2013:0995-1
Type: Security Advisory
Severity: Important
Issued on: 2013-06-27
Last updated on: 2013-06-27
Affected Products: Red Hat OpenStack 3.0
CVEs (cve.mitre.org): CVE-2013-2113
CVE-2013-2121

Details

Updated Foreman packages that fix two security issues and multiple bugs
are now available for Red Hat OpenStack 3.0 (Grizzly) Preview.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The Foreman packages provide facilities for rapidly deploying Red Hat
OpenStack 3.0 ("Grizzly") Preview. These packages are provided as a
Technology Preview. For more information on the scope and nature of support
for items marked as Technology Preview, refer to
https://access.redhat.com/support/offerings/techpreview/

A flaw was found in the create method of the Foreman Bookmarks controller.
A user with privileges to create a bookmark could use this flaw to execute
arbitrary code with the privileges of the user running Foreman, giving them
control of the system running Foreman (such as installing new packages) and
all systems managed by Foreman. (CVE-2013-2121)

A flaw was found in the way the Foreman UsersController controller handled
user creation. A non-admin user with privileges to create non-admin
accounts could use this flaw to create admin accounts, giving them control
of the system running Foreman (such as installing new packages) and all
systems managed by Foreman. (CVE-2013-2113)

These issues were discovered by Ramon de C Valle of the Red Hat Product
Security Team.

This update also fixes the following bugs:

* The cron job for Puppet had an incorrect path when installed via the
Foreman installer. (BZ#969531)

* This update removes provisioning templates and installation media for
unsupported client operating systems. (BZ#971545)

* Previously, the init script for Foreman was installed in the /opt/
directory, resulting in errors when attempting to use the "service"
command to control Foreman, and errors when installing or upgrading the
Foreman packages. As the Foreman service is not needed for Red Hat
OpenStack, this update removes the init script. (BZ#972755)

* Previously, after using Foreman to install controller and compute nodes,
it was not possible to launch compute instances. (BZ#972780)

* Previously, Foreman compiled assets for an incorrect path. The assets
were configured for "[fully qualified domain name]/foreman", which is not
where Foreman is served from in Red Hat OpenStack. (BZ#975068)

* Previously, the Foreman installer used a reference to an OpenStack
host's network interface instead of its own secondary interface when
creating a subnet, which could cause subnet creation to fail and a "rake
aborted!" message to be displayed. (BZ#976907)

Users of Foreman are advised to upgrade to these updated packages, which
correct these issues. In Red Hat OpenStack, Foreman runs on the Apache HTTP
Server using mod_passenger. As such, after installing the updated packages,
the httpd service must be restarted ("service httpd restart") for this
update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat OpenStack 3.0

SRPMS:
ruby193-foreman-1.1.10009-3.el6ost.src.rpm
File outdated by:  RHSA-2013:1522
    MD5: 2363928725f0c37a3282a34b0d622f13
SHA-256: a9172789410ff16a0065332d53974e176c05c0ab970188982b14dc3814091838
ruby193-foreman-proxy-1.1.10001-4.el6ost.src.rpm     MD5: 3e6ff5f700a1ceb28241004c6c91774c
SHA-256: 413268a7f6277a99eca3ceb1c65fdf5fb209f71f555f46b0ccfcacb3bf02778c
ruby193-openstack-foreman-installer-0.0.18-1.el6ost.src.rpm
File outdated by:  RHBA-2013:1186
    MD5: deb7804882fedf8b93ec2f933d920f8d
SHA-256: 09196353621d558150465aec8667799c1ac6654d99a4a11b0301c43e6ce1faae
ruby193-rubygem-ancestry-1.3.0-5.el6ost.src.rpm     MD5: 3ada2fe296dd98259e84ac39650a7fd4
SHA-256: 90ca6e2344d84c65de7009d6985d65dd41f3389806bb265f295c8f6bdcafe330
ruby193-rubygem-fog-1.10.1-11.el6ost.src.rpm     MD5: 61e4242aea42ff852e38c5d7289b7ffb
SHA-256: d58e85850a6cf282843fa194ba6a9e457e1368508ae0b18bc8cdeb13e3de8d99
ruby193-rubygem-mysql-2.8.1-4.el6ost.src.rpm     MD5: a07d34f3aff2a8361e0d677ce059ec5d
SHA-256: 9bf17e78496170a865248f5f381e477f070108939ab69991c6316f78458bccd4
ruby193-rubygem-safemode-1.2.0-9.el6ost.src.rpm     MD5: 6ef50f0c15b316fdeec23d32d08b9157
SHA-256: 2ec095e88963255f125f9c272c921f65fbc371386d602bc9f44a183c02a70fa5
 
x86_64:
ruby193-foreman-1.1.10009-3.el6ost.noarch.rpm
File outdated by:  RHSA-2013:1522
    MD5: ad0dd97fabde2316b28b37a566cf3eba
SHA-256: 7e4743ceb14cbe8cf3d2106930fcf712112f9a5f48a65e343a3fd049b087aa93
ruby193-foreman-mysql-1.1.10009-3.el6ost.noarch.rpm
File outdated by:  RHSA-2013:1522
    MD5: 5c978d6ed3845a3b9a2122029ebd8d62
SHA-256: e7df0c7225de135cd54c0c259743f9f7a215e94f22ba8bf15b8538d084aca980
ruby193-foreman-proxy-1.1.10001-4.el6ost.noarch.rpm     MD5: 16db3508749a807c495cbf51f077c7e4
SHA-256: 210fce5b5c7479fb3378d48d21f042a0b2f2db1283084177e9470ba60b78606c
ruby193-openstack-foreman-installer-0.0.18-1.el6ost.x86_64.rpm
File outdated by:  RHBA-2013:1186
    MD5: 007a3afd433392e788c4c9b6bd759617
SHA-256: 0b75f28db8c69e3a904d4622f0113346765bf453b9621bb2f1c9f9f0af7c89d4
ruby193-openstack-foreman-installer-debuginfo-0.0.18-1.el6ost.x86_64.rpm
File outdated by:  RHBA-2013:1186
    MD5: 4c250bbf39e9cb9f91e002d7790e61f4
SHA-256: 7972a0913a274bb2dd51a2ec84b8a9b7650bab2587e5c38e182d51fb9a87d860
ruby193-rubygem-ancestry-1.3.0-5.el6ost.noarch.rpm     MD5: 2abd833bd11c64476fcae57f60a9628b
SHA-256: 19b3c00474e3d296dda8a8ea5f7a37fed31b20c4f5b1d401a5e0eec863184758
ruby193-rubygem-ancestry-doc-1.3.0-5.el6ost.noarch.rpm     MD5: 89c44bb05bf0f64e71aff7c379eeb63f
SHA-256: bb7d9d69f939bc9530b1c5c8b0c3e4f4bef83df38c06deb99c9a59d614ddbd85
ruby193-rubygem-fog-1.10.1-11.el6ost.noarch.rpm     MD5: afab528076787074ee448f935065f8e5
SHA-256: a94378e95ebbbe91caf85d9ed3a490a5126a61a15c8a0deb58297c4515c1655b
ruby193-rubygem-fog-doc-1.10.1-11.el6ost.noarch.rpm     MD5: 139a12c6a95873fc5cb8b4deaaa543db
SHA-256: 46e927860af794d92d827f7762e725fadb6ab84a52ca154d85f80c3ab0f9fd6c
ruby193-rubygem-mysql-2.8.1-4.el6ost.x86_64.rpm     MD5: 33b6732a1bd364d394e6f7a2557725e3
SHA-256: 93ab541b76aa77d9fd956403dab96dd566d70d25867f64e4590b505087e916d5
ruby193-rubygem-mysql-debuginfo-2.8.1-4.el6ost.x86_64.rpm     MD5: 1a5339d47cfb8c16bee113d7fc097778
SHA-256: 4a9e66bb836ea0e9ca0ad66b4f618da4129f2b5d930ed87abe0dc59592938470
ruby193-rubygem-safemode-1.2.0-9.el6ost.noarch.rpm     MD5: e21cfd767b26d7cc499e1ee627947030
SHA-256: 2dadc1ebf3b7378a412daef7d33b3daf987e71f0a1e10d83f19a803fe8b1d9ca
ruby193-rubygem-safemode-doc-1.2.0-9.el6ost.noarch.rpm     MD5: 38dd63b7a72eb0f204736fbe0fb4b17f
SHA-256: 1f3fc8905b6669723aef6d54d2d828bfa45dafcee7c49de4b70e13fc8611261e
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

966804 - CVE-2013-2113 Foreman: app/controllers/users_controller.rb arbitrary admin user creation due to mass assignment
968166 - CVE-2013-2121 Foreman: app/controllers/bookmarks_controller.rb remote code execution
969531 - puppet cron installed with wrong path
971545 - Brand: remove non-RHEL templates and install media from Foreman
972780 - Unable to launch a compute instance (openstack-foreman)
975068 - Foreman asset compilation directory incorrect
976907 - Foreman installer ruby setup uses wrong nic


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/