Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 8 Mar 2016 22:02:31 +0000
From: Tristan Cacqueray <tdecacqu@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: [OSSA 2016-007] Nova host data leak through
 resize/migration (CVE-2016-2140)

On 03/08/2016 08:16 PM, Tristan Cacqueray wrote:
> ===========================================================
> OSSA-2016-007: Nova host data leak through resize/migration
> ===========================================================
> 
> :Date: March 08, 2016
> :CVE: CVE-2016-2140
> 
> 
> Affects
> ~~~~~~~
> - Nova: <=2015.1.3, >=12.0.0 <=12.0.2
> 
> 
> Description
> ~~~~~~~~~~~
> Matthew Booth from Red Hat reported a vulnerability in Nova instance
> resize/migration. By overwriting an ephemeral or root disk with a
> malicious image before requesting a resize, an authenticated user may
> be able to read arbitrary files from the compute host. Only setups
> using libvirt driver with raw storage and setting "use_cow_images =
> False" (not default) are affected.
> 
> 
> Patches
> ~~~~~~~
> - https://review.openstack.org/289960 (Kilo)
> - https://review.openstack.org/289958 (Liberty)
> - https://review.openstack.org/289957 (Mitaka)
> 
> 
> Credits
> ~~~~~~~
> - Matthew Booth from Red Hat (CVE-2016-2140)
> 
> 
> References
> ~~~~~~~~~~
> - https://bugs.launchpad.net/bugs/1548450
> - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2140
> 
> 
> Notes
> ~~~~~
> - This fix will be included in future 2015.1.3 (kilo) and 12.0.3
>   (liberty) releases.

There is a typo in the note, this fix will be included in future
2015.1.4 (kilo). Further advisories will drop that note entirely, use
http://releases.openstack.org/ to check stable version number including
the fix.

--
Tristan Cacqueray
OpenStack Vulnerability Management Team





Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.