Running a soft reboot on an instance after it has been through a live migration rolls back the libvirt domain to a state before the migration. This can potentially give an attacker read/write access to resources they should not have.
External References: https://bugs.launchpad.net/nova/+bug/1890501
Acknowledgments: Name: Tadayoshi Hosoya (NEC), Lee Yarwood (Red Hat)
Mitigation: Public clouds using non-default configurations (allowing untrusted users to initiate live migrations) face significant additional risk. If it is not possible to immediately apply patches, a temporary policy change is recommended: disable soft reboots by setting wait_soft_reboot_seconds to zero. This effectively forces any soft reboots to instead be overridden as a hard reboot. Find more information in Nova's documentation https://docs.openstack.org/nova/ussuri/configuration/config.html Deployments which use unique device paths for each cinder volume face an extremely low risk of being affected by this flaw.
This issue has been addressed in the following products: Red Hat OpenStack Platform 16.1 Via RHSA-2020:3702 https://access.redhat.com/errata/RHSA-2020:3702
This issue has been addressed in the following products: Red Hat OpenStack Platform 16.0 (Train) Via RHSA-2020:3704 https://access.redhat.com/errata/RHSA-2020:3704
This issue has been addressed in the following products: Red Hat OpenStack Platform 15.0 (Stein) Via RHSA-2020:3706 https://access.redhat.com/errata/RHSA-2020:3706
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-17376
This issue has been addressed in the following products: Red Hat OpenStack Platform 13.0 (Queens) Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS Via RHSA-2020:3708 https://access.redhat.com/errata/RHSA-2020:3708
This issue has been addressed in the following products: Red Hat OpenStack Platform 10.0 (Newton) Via RHSA-2020:3711 https://access.redhat.com/errata/RHSA-2020:3711
Statement: Red Hat OpenStack Platform 10 was initially marked as affected, however it has since been discovered that the flaw is actually not present in this version. For this reason, the update in RHSA-2020:3711 can be either applied or ignored for RHOSP 10.