Bug 896473 (CVE-2014-3632) - VUL-0: CVE-2014-3632: openstack-neutron: regression of fix for CVE-2013-6433
Summary: VUL-0: CVE-2014-3632: openstack-neutron: regression of fix for CVE-2013-6433
Status: RESOLVED INVALID
Alias: CVE-2014-3632
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Vincent Untz
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/106125/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-09-12 13:38 UTC by Marcus Meissner
Modified: 2016-04-27 20:01 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2014-09-12 13:38:33 UTC
via rh bugzilla

please cross check if we made the same mistake.

It was discovered that openstack-neutron for RedHat Enterprise Open Stack Platform 5.0 was released with a sudoers file containing the configuration error that lead to CVE-2013-6433.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1140949
Comment 1 Swamp Workflow Management 2014-09-12 22:01:11 UTC
bugbot adjusting priority
Comment 2 Marcus Meissner 2014-09-25 12:39:04 UTC
can the cloud team state if we are affected or not?

if not, please close
Comment 3 Ralf Haferkamp 2014-09-25 13:10:16 UTC
I am pretty sure we aren't. We have this in /etc/sudoers.d/openstack-neutron on both Cloud3 and Cloud4:

neutron ALL = (root) NOPASSWD: /usr/bin/neutron-rootwrap /etc/neutron/rootwrap.conf *

The problem was specific to Red Hat's packages it seems (where neutron-rootwrap was not limited to "/etc/neutron/rootwrap.conf" AFAICS).