Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 05 Dec 2017 14:53:30 +0000
From: Tristan Cacqueray <tdecacqu@...hat.com>
To: oss-security@...ts.openwall.com
Subject: [OSSA 2017-005.1] Nova Filter Scheduler bypass through rebuild action
 (CVE-2017-16239) ERRATA

====================================================================
OSSA-2017-005.1: Nova Filter Scheduler bypass through rebuild action
====================================================================

:Date: November 14, 2017
:CVE: CVE-2017-16239


Affects
~~~~~~~
- Nova: <=14.0.10, >=15.0.0 <=15.0.8, >=16.0.0 <=16.0.3


Description
~~~~~~~~~~~
George Shuklin from servers.com reported a vulnerability in Nova. By
rebuilding an instance, an authenticated user may be able to
circumvent the Filter Scheduler bypassing imposed filters (for
example, the ImagePropertiesFilter or the IsolatedHostsFilter). All
setups using Nova Filter Scheduler are affected.


Errata
~~~~~~
The former fix introduced regressions in the rebuild functionality.
Rebuild may fail depending on configured scheduler filters and
environment, for example, when the compute host is running at capacity
or when the host is disabled. This update provides an additional set
of fixes for these regressions.


Patches
~~~~~~~
- https://review.openstack.org/519684 (Newton)
- https://review.openstack.org/523434 (errata) (Newton)
- https://review.openstack.org/519681 (Ocata)
- https://review.openstack.org/523427 (errata) (Ocata)
- https://review.openstack.org/519672 (Pike)
- https://review.openstack.org/523212 (errata) (Pike)
- https://review.openstack.org/519662 (Queens)
- https://review.openstack.org/521186 (errata) (Queens)


Credits
~~~~~~~
- George Shuklin from Servers.com (CVE-2017-16239)


References
~~~~~~~~~~
- https://launchpad.net/bugs/1664931
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16239


OSSA History
~~~~~~~~~~~~
- 2017-12-05 - Errata 1
- 2017-11-14 - Original Version

--
Tristan Cacqueray
OpenStack Vulnerability Management Team

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ