Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20150613091637.GE11230@mail.waldi.eu.org>
Date: Sat, 13 Jun 2015 11:17:05 +0200
From: Bastian Blank <waldi@...ian.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2015-1850: OpenStack Cinder/Nova: Format-guessing and file
 disclosure in image convert

Hi

OpenStack Cinder and Nova do not provide input format to several calls
of "qemu-img convert".  In Cinder these calls are done as root.  This
allows the attacker to play the format guessing in qemu-img by providing
input with a qcow2 signature.  If this signature contains a base file,
this file will be read by a process running as root and embedded in the
output.  This bug is similar to CVE-2013-1922 and has been assigned
CVE-2015-1850.

Tested with: lvm backed volume storage in Cinder, it may apply to others
as well.

Steps to reproduce:
- create volume and attach to vm,
- create a qcow2 signature on the volume containing a base-file[1] from
  within the vm and
- trigger an upload to Glance with "cinder upload-to-image --disk-type
  qcow2"[2].
The image uploaded to Glance will have the base-file from the
cinder-volume host embedded.

Affected versions: tested on 2014.1.3, found while reading 2014.2.1

Timeline:
- Reported upstream 2015-01-27
- Published 2015-06-13

Regards,
Bastian Blank

[1]: qemu-img create -f qcow2 -b /etc/passwd /dev/vdb
[2]: The disk-type != raw triggers the use of "qemu-img convert"
-- 
You can't evaluate a man by logic alone.
		-- McCoy, "I, Mudd", stardate 4513.3

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.