Potential privilege escalation with the default libvirtd TLS config

Bug #1730370 reported by Oliver Walsh on 2017-11-06
260
This bug affects 1 person
Affects Status Importance Assigned to Milestone
tripleo
High
Juan Antonio Osorio Robles

Bug Description

With the default TLS setup, any service with a certificate from the CA will be granted access to libvirtd.

There are a number of options to address this:
- use a different CA just for libvirt access
- filter allowed clients
- enable SASL auth for libvirtd
- disabled libvirt TLS

CVE References

Steven Hardy (shardy) wrote :

Triaged as this is already assigned, we should discuss the plan for merging/backporting before making this public,

Changed in tripleo:
status: New → Triaged
importance: Undecided → High
milestone: none → queens-2
Emilien Macchi (emilienm) wrote :

We should reach Summer Long <email address hidden> if whether or not embargo is required on this issue, and if a CVE is accurate.

Emilien Macchi (emilienm) wrote :

IMHO, we should use enable SASL auth for libvirtd and filter allowed clients at minimum.
Having an dedicated CA is good but I think not enough; I like the SASL layer for credentials, which will allow us to have granular authentification and enable PolicyKit for example.

Oliver Walsh (owalsh) wrote :

Do we have puppet support for managing SASL?

Oliver Walsh (owalsh) wrote :

BTW we had to drop polkit when we containerized this.

Thank you for the add and the info. Summer Long normally takes Director
etc but Summit!

Cheers,
Josh

On 07/11/17 12:30, Oliver Walsh wrote:
> BTW we had to drop polkit when we containerized this.
>

--
Joshua Padman / Red Hat Product Security

Oliver Walsh (owalsh) wrote :
information type: Private Security → Public Security
Changed in tripleo:
status: Triaged → Fix Released

This issue was fixed in the openstack/tripleo-heat-templates 8.0.0.0b2 development milestone.

To post a comment you must log in.
This report contains Public Security information  Edit
Everyone can see this security related information.

Other bug subscribers