|
Message-Id: <20141021162823.1C00FC5092C@smtptsrv1.mitre.org> Date: Tue, 21 Oct 2014 12:28:23 -0400 (EDT) From: cve-assign@...re.org To: tristan.cacqueray@...vance.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request for vulnerability in OpenStack Nova -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > Products: Nova > Versions: up to 2014.1.3 > > Zhu Zhu from IBM reported a vulnerability in Nova VMware driver. If an > authenticated user deletes an instance while it is in resize state, it > will cause the original instance to not be deleted. An attacker can use > this to launch a denial of service attack. All Nova VMware setups are > affected. > > https://launchpad.net/bugs/1359138 > https://review.openstack.org/125492 > the problem is as follows: When a resize is done a new VM is > created on the back end. So prior to the resize you would have > a instance called uuid. When a resize takes place there will > be a cloned VM called uuid-orig. Hence the additional delete > that needs to take place. > during the window for resize step migration_disk_and_poweroff after > disassociate VM(rename) or new VM clone but before migration status to > be finished, the deletion of VM will not delete those uuid-orig VMs. > looks like a DoS attack by using up capacity without being charged for > it. Use CVE-2014-8333 for this virt/vmwareapi/vmops.py race condition that results in inadvertent preservation of the -orig instance. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJURoh1AAoJEKllVAevmvmsuycIALoSRHTtUV3Kk+XzgQm3Cl9c qNFi+n2AQTeGqtefqZBgdKJ7iNY29g5hMMT9eGKyalPw4zxv2vxKKHsMGSyyZYDY PvaHUJ7hOUxO5k22m++cHAdEgZjSVjTEFYSfbjBK6GqSY7Lqq4d9dqW4WBNYR4cH tyX7FvEK7yPA4gEywLxa8KVUBWskj+uDZvFg9mYUzOFd0u+WANFffdo7lVAvyMvc 8DO+vA8Q/H26Bvf7q3Lebs2CNoTwOfUrCnG1RcO0WkcJ0N+DAAWAjOvn+2IxbEd4 fYavN9bdncevvHwOSLl/V+ikjSnv39S/whcKkxj3Xh9X6thp+62dkr0j2p4F/P4= =o9fR -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.