[Openstack-security] [OSSN] Draft: Nova Baremetal Exposes Previous Tenant Data

Kurt Seifried kseifried at redhat.com
Wed Jul 3 07:37:20 UTC 2013


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/03/2013 12:41 AM, Clark, Robert Graham wrote:
> So I think two things probably need to happen here. One is a
> further discussion on how 'dangerous' code should be tagged in
> future, the second is if this needs a CVE.
> 
> In regard to the latter I don't think there's a big reason _NOT_ to
> cut a CVE but I'm not passionate about it either way. What I would
> like is some agreement so if there is a CVE I can reference it in
> the OSSN and if there isn't I can just go ahead and publish.

Since no-one seems to object, and we have a history of cve's for not
wiping disk before usage in these kinds of situations please use
CVE-2013-2235 for this issue.

> 
> Cheers -Rob
> 
> On 02/07/2013 20:15, "Kurt Seifried" <kseifried at redhat.com> wrote:
> 
> On 07/02/2013 01:06 PM, Jeremy Stanley wrote:
>>>> On 2013-07-02 12:53:34 -0600 (-0600), Kurt Seifried wrote:
>>>>> Huh? According to:
>>>>> https://wiki.openstack.org/wiki/Baremetal
>>>>> 
>>>>> "This driver was added to the Grizzly release, but it
>>>>> should be considered somewhat experimental at this point.
>>>>> See the Bugs section for information and links to the
>>>>> Launchpad bug listings."
>>>>> 
>>>>> also no mention of any security issues with respect to data
>>>>> not being wiped. Now I get that the software hasn't been
>>>>> officially blessed as production ready, but it has been
>>>>> released publicly. Unless there isa compelling reason not
>>>>> to assign a CVE for this (speak up now!) I'll do so later
>>>>> today.
>>>> 
>>>> I agree it's unfortunate if security precautions weren't
>>>> spelled out in the release notes, so if that qualifies for a
>>>> CVE then it sounds like we probably do need one. In your
>>>> opinion would it have needed a CVE if the situation were
>>>> spelled out in the release notes already?
> 
> If the documentation specifically said "WARNING: DATA MAY BE
> EXPOSED DUE TO LACK OF WIPING" then no CVE most likely. It's a
> continuum, but basically some examples:
> 
> ======================= http://seclists.org/oss-sec/2013/q1/155
> 
> Further note, for example:
> 
> A default account/password in a device or service. Is this a
> security issue or not? Different scenarios have different
> outcomes:
> 
> 1) The default account/password is well documented. The services 
> forces you to change the password when first run and will refuse
> to run until you do change the password. Generally not considered a
> vuln.
> 
> 2) The default account/password is well documented. The services
> does not force you to change the password when first run. Generally
> not considered a vuln as it falls into the "don't do stupid things"
> class of issues.
> 
> 3) The default account/password is not well documented or not 
> documented at all but can be changed. Generally this would be 
> considered a vulnerability.
> 
> 4) The default account/password is not well documented or not 
> documented at all and can NOT be changed. Generally this would be 
> considered a vulnerability.
> 
> Similar things for other things, is it a security vulnerability or 
> security hardening, or not a security issue at all? It definitely
> gets fuzzy/messy sometimes. =======================
> 
> So this looks like a #4, not documented, not something that can
> easily be fixed by the user.
> 
>>>> I suppose this drives to a process question for us as a
>>>> project, whether we can actually develop
>>>> work-in-progress/experimental features in-tree with a timed
>>>> release schedule, knowing that we may need to consider either
>>>> (dangerously) ripping them back out at release time or
>>>> announcing known security vulnerabilities in them at release
>>>> time instead.
> 
> That is a good question. One thing that might be helpful is to
> mark such code as experimental/dangerous/may eat all your datas and
> include any potential gotchas to warn people about, which is
> probably a good idea either way as it would reduce risk, or if not
> that at least let people make informed decisions about the risk
> they are taking.
> 
>> 
>> _______________________________________________ 
>> Openstack-security mailing list 
>> Openstack-security at lists.openstack.org 
>> http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-security
>
>> 
- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=ybb/
-----END PGP SIGNATURE-----




More information about the Openstack-security mailing list