Date: Tue, 05 Dec 2017 14:53:30 +0000 From: Tristan Cacqueray <tdecacqu@...hat.com> To: oss-security@...ts.openwall.com Subject: [OSSA 2017-005.1] Nova Filter Scheduler bypass through rebuild action (CVE-2017-16239) ERRATA ==================================================================== OSSA-2017-005.1: Nova Filter Scheduler bypass through rebuild action ==================================================================== :Date: November 14, 2017 :CVE: CVE-2017-16239 Affects ~~~~~~~ - Nova: <=14.0.10, >=15.0.0 <=15.0.8, >=16.0.0 <=16.0.3 Description ~~~~~~~~~~~ George Shuklin from servers.com reported a vulnerability in Nova. By rebuilding an instance, an authenticated user may be able to circumvent the Filter Scheduler bypassing imposed filters (for example, the ImagePropertiesFilter or the IsolatedHostsFilter). All setups using Nova Filter Scheduler are affected. Errata ~~~~~~ The former fix introduced regressions in the rebuild functionality. Rebuild may fail depending on configured scheduler filters and environment, for example, when the compute host is running at capacity or when the host is disabled. This update provides an additional set of fixes for these regressions. Patches ~~~~~~~ - https://review.openstack.org/519684 (Newton) - https://review.openstack.org/523434 (errata) (Newton) - https://review.openstack.org/519681 (Ocata) - https://review.openstack.org/523427 (errata) (Ocata) - https://review.openstack.org/519672 (Pike) - https://review.openstack.org/523212 (errata) (Pike) - https://review.openstack.org/519662 (Queens) - https://review.openstack.org/521186 (errata) (Queens) Credits ~~~~~~~ - George Shuklin from Servers.com (CVE-2017-16239) References ~~~~~~~~~~ - https://launchpad.net/bugs/1664931 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16239 OSSA History ~~~~~~~~~~~~ - 2017-12-05 - Errata 1 - 2017-11-14 - Original Version -- Tristan Cacqueray OpenStack Vulnerability Management Team Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ