what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2018-2714-01

Red Hat Security Advisory 2018-2714-01
Posted Sep 18, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2714-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects. Issues addressed include a denial of service vulnerability.

tags | advisory, denial of service
systems | linux, redhat
advisories | CVE-2017-18191
SHA-256 | 842f3cd94f5e21ca8717710a120b344f86bd97e45ba420c50f70113dde8d66b8

Red Hat Security Advisory 2018-2714-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: openstack-nova security and bug fix update
Advisory ID: RHSA-2018:2714-01
Product: Red Hat Enterprise Linux OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2018:2714
Issue date: 2018-09-17
CVE Names: CVE-2017-18191
====================================================================
1. Summary:

An update for openstack-nova is now available for Red Hat OpenStack
Platform 10.0 (Newton).

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenStack Platform 10.0 - noarch

3. Description:

OpenStack Compute (nova) launches and schedules large networks of virtual
machines, creating a redundant and scalable cloud computing platform.
Compute provides the software, control panels, and APIs required to
orchestrate a cloud, including running virtual machine instances and
controlling access through users and projects.

Security Fix(es):

* openstack-nova: Swapping encrypted volumes can allow an attacker to
corrupt the LUKS header causing a denial of service in the host
(CVE-2017-18191)

For more details about the security issue, including the impact, a CVSS
score, and other related information, refer to the CVE page listed in the
References section.

Bug Fix(es):

* Previously, the MTU of TAP devices was not configured. As a result, the
network could be configured with a different MTU than a guest TAP device.

With this update, you can configure libvirt when you create the TAP device
for the guest. Nova passes the correct parameter to libvirt, and the TAP
device now has the same configuration as the network. (BZ#1553839)

* Previously, the MTU of TAP devices was not configured. As a result, the
network could be configured with a different MTU than a guest TAP device.

With this update, you can configure libvirt when you create the TAP device
for the guest. Nova passes the correct parameter to libvirt, and the TAP
device now has the same configuration as the network. (BZ#1553559)

* Previously, the '[vnc] keymap' option was 'en-us' by default, and it was
not possible to unset this configuration. As a result of this, non-US
locales experienced ineffective key mappings.

With this update, users can unset the '[vnc] keymap' value. In this case,
the VNC client configures the locale and non-US users attain more effective
key mappings. (BZ#1441962)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1441962 - Remove default option for keymap in code and config files
1546937 - CVE-2017-18191 openstack-nova: Swapping encrypted volumes can allow an attacker to corrupt the LUKS header causing a denial of service in the host
1546965 - Launching Instance fails when image property hw_disk_bus=scsi is set
1553559 - Configured jumbo frames and tap device is still being created with the MTU 1500
1553839 - if ovs_hybrid_plugulse for a VM instance neutron port, the MTU is not always set correctly
1569953 - preallocate_images = space is not honoured when using qcow2
1575989 - Duplicate imports of oslo_config types

6. Package List:

Red Hat OpenStack Platform 10.0:

Source:
openstack-nova-14.1.0-26.el7ost.src.rpm

noarch:
openstack-nova-14.1.0-26.el7ost.noarch.rpm
openstack-nova-api-14.1.0-26.el7ost.noarch.rpm
openstack-nova-cells-14.1.0-26.el7ost.noarch.rpm
openstack-nova-cert-14.1.0-26.el7ost.noarch.rpm
openstack-nova-common-14.1.0-26.el7ost.noarch.rpm
openstack-nova-compute-14.1.0-26.el7ost.noarch.rpm
openstack-nova-conductor-14.1.0-26.el7ost.noarch.rpm
openstack-nova-console-14.1.0-26.el7ost.noarch.rpm
openstack-nova-migration-14.1.0-26.el7ost.noarch.rpm
openstack-nova-network-14.1.0-26.el7ost.noarch.rpm
openstack-nova-novncproxy-14.1.0-26.el7ost.noarch.rpm
openstack-nova-placement-api-14.1.0-26.el7ost.noarch.rpm
openstack-nova-scheduler-14.1.0-26.el7ost.noarch.rpm
openstack-nova-serialproxy-14.1.0-26.el7ost.noarch.rpm
openstack-nova-spicehtml5proxy-14.1.0-26.el7ost.noarch.rpm
python-nova-14.1.0-26.el7ost.noarch.rpm
python-nova-tests-14.1.0-26.el7ost.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2017-18191
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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CTNy
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close