An updated openshift-origin-broker-util package that fixes one securityissue is now available for Red Hat OpenShift Enterprise 1.2.7.The Red Hat Security Response Team has rated this update as havingImportant security impact. A Common Vulnerability Scoring System (CVSS)base score, which gives a detailed severity rating, is available from theCVE link in the References section.
The openshift-origin-broker-util package provides utility scripts for theOpenShift Broker service, which manages all user logins, DNS nameresolution, application states, and general orchestration of theapplications.It was discovered that the mcollective client.cfg configuration file wasworld-readable by default. A malicious, local user on a host with theOpenShift Broker installed could read sensitive information regarding themcollective installation, including mcollective authentication credentials.A malicious user able to obtain said credentials would potentially havefull control over all OpenShift nodes managed via mcollective.(CVE-2014-0164)This issue was discovered by Jeremy Choi of the Red Hat QualityEngineering Group.All openshift-origin-broker-util users are advised to upgrade to thisupdated package, which corrects this issue.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258
1083847 – CVE-2014-0164 mcollective: world readable client config
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from: