Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 8 Mar 2016 22:02:31 +0000
From: Tristan Cacqueray <tdecacqu@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: [OSSA 2016-007] Nova host data leak through
 resize/migration (CVE-2016-2140)

On 03/08/2016 08:16 PM, Tristan Cacqueray wrote:
> ===========================================================
> OSSA-2016-007: Nova host data leak through resize/migration
> ===========================================================
> 
> :Date: March 08, 2016
> :CVE: CVE-2016-2140
> 
> 
> Affects
> ~~~~~~~
> - Nova: <=2015.1.3, >=12.0.0 <=12.0.2
> 
> 
> Description
> ~~~~~~~~~~~
> Matthew Booth from Red Hat reported a vulnerability in Nova instance
> resize/migration. By overwriting an ephemeral or root disk with a
> malicious image before requesting a resize, an authenticated user may
> be able to read arbitrary files from the compute host. Only setups
> using libvirt driver with raw storage and setting "use_cow_images =
> False" (not default) are affected.
> 
> 
> Patches
> ~~~~~~~
> - https://review.openstack.org/289960 (Kilo)
> - https://review.openstack.org/289958 (Liberty)
> - https://review.openstack.org/289957 (Mitaka)
> 
> 
> Credits
> ~~~~~~~
> - Matthew Booth from Red Hat (CVE-2016-2140)
> 
> 
> References
> ~~~~~~~~~~
> - https://bugs.launchpad.net/bugs/1548450
> - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2140
> 
> 
> Notes
> ~~~~~
> - This fix will be included in future 2015.1.3 (kilo) and 12.0.3
>   (liberty) releases.

There is a typo in the note, this fix will be included in future
2015.1.4 (kilo). Further advisories will drop that note entirely, use
http://releases.openstack.org/ to check stable version number including
the fix.

--
Tristan Cacqueray
OpenStack Vulnerability Management Team





Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ