Security Advisory Moderate: openstack-heat security, bug fix, and enhancement update

Advisory: RHSA-2014:0090-1
Type: Security Advisory
Severity: Moderate
Issued on: 2014-01-22
Last updated on: 2014-01-22
Affected Products: Red Hat OpenStack 4.0
CVEs (cve.mitre.org): CVE-2013-6426
CVE-2013-6428

Details

Updated openstack-heat packages that fix two security issues, several bugs,
and add various enhancements are now available for Red Hat Enterprise Linux
OpenStack Platform 4.0.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

The openstack-heat packages provide heat, a Python implementation of the
OpenStack Orchestration engine, to launch multiple composite cloud
applications based on templates.

It was found that heat did not properly enforce cloudformation-compatible
API policy rules. An in-instance attacker could use the CreateStack or
UpdateStack methods to create or update a stack, resulting in a violation
of the API policy. Note that only setups using Orchestration's
cloudformation-compatible API were affected. (CVE-2013-6426)

A flaw was found in the way Orchestration's REST API implementation handled
modified request paths. An authenticated remote user could use this flaw to
bypass the tenant-scoping restriction by modifying the request path,
resulting in privilege escalation. Note that only setups using
Orchestration's cloudformation-compatible API were affected.
(CVE-2013-6428)

Red Hat would like to thank Jeremy Stanley of the OpenStack Project for
reporting these issues. Upstream acknowledges Steven Hardy of Red Hat as
the original reporter.

The openstack-heat packages have been upgraded to upstream version
2013.2.1, which provides a number of bug fixes and enhancements over the
previous version. The most notable fixes and enhancements are:

- Auto-scaling has been fixed when AdjustmentType was set to
PercentChangeInCapacity.

- A QPID broker restart no longer permanently disrupts subscribed clients.

- RPC requests are now only serviced by one server in a given topic group.

- Auto-scaling group growth or shrinkage has been fixed to utilize the full
available size, regardless of the scaling policy adjustment.

(BZ#1045430)

This update also fixes the following bugs:

* The outdated heat-db-setup tool, which only supported local installs, has
been removed. The Red Hat Enterprise Linux OpenStack Platform 4
Installation and Configuration Guide has been updated to show how to create
the necessary database and associated tables for Orchestration, allowing
the deployment of the database server on a local or remote system (see
Installing the OpenStack Orchestration Service). (BZ#1046326)

* The heat-engine source code had a hard-coded reference to a Fedora image
name in the implementation of the AWS-compatible LoadBalancer resource.
This meant that you could not specify an alternative LoadBalancer image
name in deployments (for example, Red Hat Enterprise Linux). A new option
has been added to the Orchestration configuration file,
/etc/heat/heat.conf, which is named loadbalancer_template. The new
loadbalancer_template option can now be used to specify an alternate
LoadBalancer template that contains a different image name. (BZ#1048215)

* Due to a packaging error, the heat-manage tool was not working properly
(which prohibited a successful database creation). This error has been
fixed by moving the parallel package selection code so that all
Orchestration tools now use the proper packages for use at runtime.
(BZ#1048335)

All openstack-heat users are advised to upgrade to these updated packages,
which correct these issues and add these enhancements.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Documentation for releases of Red Hat Enterprise Linux OpenStack Platform
is available at
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/

Updated packages

Red Hat OpenStack 4.0

SRPMS:
openstack-heat-2013.2.1-4.el6ost.src.rpm
File outdated by:  RHSA-2014:1687
    MD5: 17fd95c960b56e7ee87d05c7f04c5f70
SHA-256: 1977f864fe3ca0e0ac80b0c187f04eb96970efcc7700d3bd73caefd9dd3492cc
 
x86_64:
openstack-heat-api-2013.2.1-4.el6ost.noarch.rpm
File outdated by:  RHSA-2014:1687
    MD5: 2d49879ecb667a38c9fd6d4b8c7644bb
SHA-256: de08995537ff258bd06db0eb9f50c16237f968f423e4a8d29a757d9e0df205ae
openstack-heat-api-cfn-2013.2.1-4.el6ost.noarch.rpm
File outdated by:  RHSA-2014:1687
    MD5: a9d32ee6c6b9bf619d3892ca3ede7546
SHA-256: 70b00352f706e60b2ee85c5253afef7cf1ae99aa32711f9c32396440577e1b6e
openstack-heat-api-cloudwatch-2013.2.1-4.el6ost.noarch.rpm
File outdated by:  RHSA-2014:1687
    MD5: 228043278d45ca5043dafa0e666ad193
SHA-256: dd66d23c78c7a3f9bf1daa4717efbc4f3a8765a6c59a20c041695a7fd244203a
openstack-heat-common-2013.2.1-4.el6ost.noarch.rpm
File outdated by:  RHSA-2014:1687
    MD5: 6faed2457b55421622bbf124ac05ce1e
SHA-256: be80eb1a7f5dd650ba88daa08952457033fd3b92c744274a6f7e02d5747389ec
openstack-heat-engine-2013.2.1-4.el6ost.noarch.rpm
File outdated by:  RHSA-2014:1687
    MD5: 7d774f916761e43d8df60905eafcfa9a
SHA-256: 2b3a025a674d0e7b6f5c71e214ee1b8e5ccc42132b7ff725fd3be1fc895af841
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1039141 - CVE-2013-6426 OpenStack Heat: CFN policy rules not all enforced
1039144 - CVE-2013-6428 OpenStack Heat: ReST API doesn't respect tenant scoping
1046326 - remove heat-db-setup from openstack-heat packaging
1048335 - heat-manage doesn't work on EL


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/