Bug 1869426 (CVE-2020-17376)
Summary: | CVE-2020-17376 openstack-nova: Soft reboot after live-migration reverts instance to original source domain XML | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Nick Tait <ntait> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | dasmith, dbecker, eglynn, jhakimra, jjoyce, jschluet, kbasil, kchamart, knoha, lhh, lpeer, lyarwood, mburns, nova-maint, sbauza, sclewis, security-response-team, sgordon, slinaber, vromanso |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | openstack-nova 20.3.1, openstack-nova 20.1.2, openstack-nova 19.3.1, openstack-nova 17.0.13, openstack-nova 14.1.0 | Doc Type: | If docs needed, set a value |
Doc Text: |
An information disclosure flaw was found in the live migration feature of OpenStack Nova. A user may gain access to destination host devices with the same path as those on the source host. This flaw allows an attacker to perform a soft reboot of an instance that has previously undergone live migration. The greatest impact of this vulnerability is to the confidentiality of many possible device types, but those at special risk are block storage devices, potentially revealing data of other users.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-09-10 07:17:44 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1823988, 1862353, 1870819, 1870820, 1870821, 1870822, 1870823, 1889289 | ||
Bug Blocks: | 1866598 |
Description
Nick Tait
2020-08-17 23:41:14 UTC
External References: https://bugs.launchpad.net/nova/+bug/1890501 Acknowledgments: Name: Tadayoshi Hosoya (NEC), Lee Yarwood (Red Hat) Mitigation: Public clouds using non-default configurations (allowing untrusted users to initiate live migrations) face significant additional risk. If it is not possible to immediately apply patches, a temporary policy change is recommended: disable soft reboots by setting wait_soft_reboot_seconds to zero. This effectively forces any soft reboots to instead be overridden as a hard reboot. Find more information in Nova's documentation https://docs.openstack.org/nova/ussuri/configuration/config.html Deployments which use unique device paths for each cinder volume face an extremely low risk of being affected by this flaw. This issue has been addressed in the following products: Red Hat OpenStack Platform 16.1 Via RHSA-2020:3702 https://access.redhat.com/errata/RHSA-2020:3702 This issue has been addressed in the following products: Red Hat OpenStack Platform 16.0 (Train) Via RHSA-2020:3704 https://access.redhat.com/errata/RHSA-2020:3704 This issue has been addressed in the following products: Red Hat OpenStack Platform 15.0 (Stein) Via RHSA-2020:3706 https://access.redhat.com/errata/RHSA-2020:3706 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-17376 This issue has been addressed in the following products: Red Hat OpenStack Platform 13.0 (Queens) Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS Via RHSA-2020:3708 https://access.redhat.com/errata/RHSA-2020:3708 This issue has been addressed in the following products: Red Hat OpenStack Platform 10.0 (Newton) Via RHSA-2020:3711 https://access.redhat.com/errata/RHSA-2020:3711 Statement: Red Hat OpenStack Platform 10 was initially marked as affected, however it has since been discovered that the flaw is actually not present in this version. For this reason, the update in RHSA-2020:3711 can be either applied or ignored for RHOSP 10. |