Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <527677FE.2020804@redhat.com>
Date: Sun, 03 Nov 2013 09:21:18 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request for a vulnerability in OpenStack Nova

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 11/03/2013 09:07 AM, Jeremy Stanley wrote:
> A vulnerability was discovered in OpenStack (see below). In order
> to ensure full traceability, we need a CVE number assigned that we
> can attach to further notifications. This issue is already public, 
> although an advisory was not sent yet.
> 
> Title: XenAPI security groups not kept through migrate or resize 
> Reporter: Chris Behrens (Rackspace) and Vangelis Tasoulas Products:
> Nova Affects: Folsom, Grizzly
> 
> Description: Chris Behrens with Rackspace and Vangelis Tasoulas
> reported a set of vulnerabilities in OpenStack Nova. When migrating
> or resizing an instance, including live migration, existing
> security groups may not be reapplied after the operation completes.
> This can lead to unintentional network exposure for virtual
> machines. Only setups using the XenAPI backend are affected.
> 
> References: https://launchpad.net/bugs/1073306 
> https://launchpad.net/bugs/1202266
> 
> Thanks in advance,
> 

Please use CVE-2013-4497 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
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=EkPq
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.