Lucene search

K
redhatRedHatRHSA-2015:2673
HistoryDec 21, 2015 - 4:34 p.m.

(RHSA-2015:2673) Moderate: openstack-nova security and bug fix advisory

2015-12-2116:34:22
access.redhat.com
12

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.005 Low

EPSS

Percentile

74.1%

OpenStack Compute (nova) launches and schedules large networks of virtual
machines, creating a redundant and scalable cloud computing platform.
Compute provides the software, control panels, and APIs required to
orchestrate a cloud, including running virtual machine instances and
controlling access through users and projects.

A vulnerability was discovered in the way OpenStack Compute (nova)
networking handled security group updates; changes were not applied to
already running VM instances. A remote attacker could use this flaw to
access running VM instances. (CVE-2015-7713)

Additional updates include:

  • The openstack-nova packages have been upgraded to upstream version
    2015.1.2. See https://launchpad.net/nova/kilo/2015.1.2 for a complete list
    of bug fixes and enhancements. (BZ#1274875)

  • When using huge pages, the back-end memory for a guest was configured as
    private. This disallowed an external process connected to a vhostuser VIF
    type to access the QEMU guest’s memory, which is required by the QEMU
    network driver functionality. The memory mappings are now marked as
    shared, and the external process to provide QEMU network is able to access
    the guest’s memory. (BZ#1215790)

  • The termination of a WSGI application or an RPC server immediately
    stopped the service and interrupted requests that were in progress. This
    update adds a graceful handler for the SIGTERM signal sent to the parent
    WSGI process, so the termination is performed gracefully, which allows
    ongoing processes to continue. (BZ#1250269)

  • Previously, novaclient records requested time even when timing was set
    to False. As a consequence, system memory kept increasing. With this
    update, when timing is set to True, the time of each request is recorded
    and the timings are reset to clear the memory, which no longer
    increases. (BZ#1260868)

  • An earlier update changed the return value when no host devices were
    found when connecting to an iSCSI or iSER volume. Consequently, when no
    host devices were found, an exception was thrown and the connect volume
    attempt failed. This update adds an additional check to ensure
    os.path.exists(None) is never called. As a result, an exception is no
    longer thrown and the connect logic correctly retries finding present
    host devices. (BZ#1268051)

  • Compute’s rootwrap filters restricted an ln command used by the volume
    encryption providers to a specific iSCSI related target path. Consequently,
    iSER, NFS, and FC volumes encountered failures because the ln command was
    rejected by Compute’s rootwrap filters. This update makes Nova’s rootwrap
    filters more generic when calling ln allowing the volume encryption
    providers to succeed. (BZ#1273466)

  • FCoE devices have different sysfs paths to standard FC devices.
    Consequently, Nova failed when attempting to attach an FCoE based volume
    to an instance as it assumed these paths were the same. This update ensures
    that the required PCI information is parsed from both FC and FCoE sysfs
    device paths. As a result, Nova now succeeds in attaching FCoE based
    volumes to instances. (BZ#1274054)

  • Nova failed to parse the output from the multipath -l ${device} command
    when errors were present. Consequently, the attaching and detaching of
    volumes could fail. This update corrects the find_multipath_device method
    to ensure that any errors present in the output from the aforementioned
    command are ignored. As a result, both the attaching and detaching of
    volumes will now succeed even if errors occur. (BZ#1275937)

  • Volumes were not correctly detached if an error was encountered during
    the attach process, and could be left attached to an instance, resulting
    in data loss. This update ensures that the volume is both detached
    and the connection to the volume closed in the event of a failure during
    the attach process. (BZ#1276011)

  • The ability of the libvirt driver to set the admin password has been
    added. To use this feature, run the following command:
    nova root-password [server]
    (BZ#1261100)

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.005 Low

EPSS

Percentile

74.1%