Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2020-10755

Published: 10 June 2020

An insecure-credentials flaw was found in all openstack-cinder versions before openstack-cinder 14.1.0, all openstack-cinder 15.x.x versions before openstack-cinder 15.2.0 and all openstack-cinder 16.x.x versions before openstack-cinder 16.1.0. When using openstack-cinder with the Dell EMC ScaleIO or VxFlex OS backend storage driver, credentials for the entire backend are exposed in the ``connection_info`` element in all Block Storage v3 Attachments API calls containing that element. This flaw enables an end-user to create a volume, make an API call to show the attachment detail information, and retrieve a username and password that may be used to connect to another user's volume. Additionally, these credentials are valid for the ScaleIO or VxFlex OS Management API, should an attacker discover the Management API endpoint. Source: OpenStack project

Notes

AuthorNote
mdeslaur
Fixing this moves VxFlex OS passwords from the
block_device_mapping table to a file called
/opt/emc/scaleio/openstack/connector.conf

From python-os-brick patch:
It requires that a configuration file be deployed on compute
nodes, cinder nodes, and anywhere you would perform a volume
attachment in your deployment, when using Cinder with a Dell
EMC VxFlex OS backend.

If we fix this in stable releases, it will break environments
until the new configuration file is deployed.

Priority

Low

Cvss 3 Severity Score

6.5

Score breakdown

Status

Package Release Status
cinder
Launchpad, Ubuntu, Debian
bionic
Released (2:12.0.9-0ubuntu1.2)
eoan Ignored
(end of life)
focal
Released (2:16.1.0-0ubuntu1)
groovy Ignored
(end of life)
hirsute Ignored
(end of life)
impish Ignored
(end of life)
jammy Not vulnerable

kinetic Not vulnerable

lunar Not vulnerable

mantic Not vulnerable

trusty Does not exist

upstream
Released (14.1.0,15.2.0,16.1.0)
xenial Needed

python-os-brick
Launchpad, Ubuntu, Debian
bionic
Released (2.3.0-0ubuntu1.2)
eoan Ignored
(end of life)
focal
Released (3.0.1-0ubuntu1.2)
groovy Ignored
(end of life)
hirsute Ignored
(end of life)
impish Ignored
(end of life)
jammy Needed

kinetic Ignored
(end of life, was needed)
lunar Ignored
(end of life, was needed)
mantic Needed

trusty Does not exist

upstream
Released (2.8.5,2.10.3,3.0.2)
xenial Needed

Patches:
upstream: https://opendev.org/openstack/os-brick/commit/72c63681178286ed9cd1e1ab48969a64b9004d7c
upstream: https://opendev.org/openstack/os-brick/commit/b5891702cc24b0c9cedf6961d3223a37830341b9
upstream: https://opendev.org/openstack/os-brick/commit/55fc99852166f72b95d85dc917197f5544861e7c
upstream: https://opendev.org/openstack/os-brick/commit/a1c9f649448bc91325b0735c48e780cce44df2c1
upstream: https://opendev.org/openstack/os-brick/commit/5414305a2b2c776be62b695c4144dd4ace7f5b30

Severity score breakdown

Parameter Value
Base score 6.5
Attack vector Network
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N