|
Message-Id: <1512485234.nayti5pl04.tristanC@fedora>
Date: Tue, 05 Dec 2017 14:53:30 +0000
From: Tristan Cacqueray <tdecacqu@...hat.com>
To: oss-security@...ts.openwall.com
Subject: [OSSA 2017-005.1] Nova Filter Scheduler bypass through rebuild action
(CVE-2017-16239) ERRATA
====================================================================
OSSA-2017-005.1: Nova Filter Scheduler bypass through rebuild action
====================================================================
:Date: November 14, 2017
:CVE: CVE-2017-16239
Affects
~~~~~~~
- Nova: <=14.0.10, >=15.0.0 <=15.0.8, >=16.0.0 <=16.0.3
Description
~~~~~~~~~~~
George Shuklin from servers.com reported a vulnerability in Nova. By
rebuilding an instance, an authenticated user may be able to
circumvent the Filter Scheduler bypassing imposed filters (for
example, the ImagePropertiesFilter or the IsolatedHostsFilter). All
setups using Nova Filter Scheduler are affected.
Errata
~~~~~~
The former fix introduced regressions in the rebuild functionality.
Rebuild may fail depending on configured scheduler filters and
environment, for example, when the compute host is running at capacity
or when the host is disabled. This update provides an additional set
of fixes for these regressions.
Patches
~~~~~~~
- https://review.openstack.org/519684 (Newton)
- https://review.openstack.org/523434 (errata) (Newton)
- https://review.openstack.org/519681 (Ocata)
- https://review.openstack.org/523427 (errata) (Ocata)
- https://review.openstack.org/519672 (Pike)
- https://review.openstack.org/523212 (errata) (Pike)
- https://review.openstack.org/519662 (Queens)
- https://review.openstack.org/521186 (errata) (Queens)
Credits
~~~~~~~
- George Shuklin from Servers.com (CVE-2017-16239)
References
~~~~~~~~~~
- https://launchpad.net/bugs/1664931
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16239
OSSA History
~~~~~~~~~~~~
- 2017-12-05 - Errata 1
- 2017-11-14 - Original Version
--
Tristan Cacqueray
OpenStack Vulnerability Management Team
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.