Adding OSSN-0091 for VirtualBMC & Sushy-tools

CVE-2022-44020

Change-Id: I6e004dae84136e662506c30bfdf7c2d3d03feefc
This commit is contained in:
Jay Faulkner 2022-10-26 09:21:38 -07:00
parent 0a99808d7d
commit 1816dbe20d
1 changed files with 52 additions and 0 deletions

52
security-notes/OSSN-0091 Normal file
View File

@ -0,0 +1,52 @@
BMC emulators developed in OpenStack community do not preserve passwords on VMs
---
### Summary ###
When deploying VirtualBMC or Sushy-Tools in an unsupported, production-like
configuration, it can remove secret data, including VNC passwords, from a
libvirt domain permanently. Operators impacted by this vulnerability must
reconfigure any secret data, including VNC passwords, for the libvirt domain.
These virtual machine emulators are tools to help emulate a physical machine's
Baseboard Management Controller (BMC) to aid in development and testing of
software that would otherwise require physical machines to perform integration
testing activities. They are not intended or supported for production or
long-term use of any kind.
### Affected Services / Software ###
- Sushy-Tools, <=0.21.0
- VirtualBMC, <=2.2.2
There is no impact to any OpenStack software or services intended for
production use.
### Discussion ###
To perform some advanced operations on Libvirt virtual machines, the underlying
XML document describing the virtual machine's domain must be extracted,
modified, and then updated. These specific actions are for aspects such as
"setting a boot device" (VirtualBMC, Sushy-Tools), Setting a boot mode
(Sushy-Tools), and setting a virtual media device (Sushy-Tools).
This issue is triggered when a VM has any kind of "secure" information defined
in the XML domain definition. If an operator deploys VirtualBMC or Sushy-Tools
to manage one of these libvirt VMs, the first time any action is performed that
requires rewriting of the XML domain definition, all secure information --
including a VNC console password, if set -- is lost and removed from the domain
definition, leaving the libvirt VM's exposed to a malicious console user.
### Recommended Actions ###
Operators who may have been impacted by this vulnerability should immediately
remove use of VirtualBMC and/or Sushy-Tools from their production environment.
Then, validate and if necessary, reconfigure passwords for VNC access or any
other impacted secrets.
### Credits ###
Julia Kreger, Red Hat
### Contacts / References ###
Author: Jay Faulkner, G-Research Open Source Software
This OSSN: https://wiki.openstack.org/wiki/OSSN/OSSN-0091#Discussion
Original Storyboard bug: https://storyboard.openstack.org/#!/story/2010382
Mailing List : [Security] tag on openstack-discuss@lists.openstack.org
OpenStack Security Project : https://launchpad.net/~openstack-ossg
CVE: CVE-2022-44020

After

Width:  |  Height:  |  Size: 2.4 KiB