|
Message-ID: <568EA307.7070605@redhat.com>
Date: Thu, 7 Jan 2016 17:40:23 +0000
From: Tristan Cacqueray <tdecacqu@...hat.com>
To: oss-security@...ts.openwall.com
Subject: [OSSA 2016-001] Nova host data leak through snapshot (CVE-2015-7548)
===================================================
OSSA-2016-001: Nova host data leak through snapshot
===================================================
:Date: January 07, 2016
:CVE: CVE-2015-7548
Affects
~~~~~~~
- Nova: <=2015.1.2, ==12.0.0
Description
~~~~~~~~~~~
Matthew Booth from Red Hat reported a vulnerability in Nova instance
snapshot. By overwriting the disk inside an instance with a malicious
image and requesting a snapshot, an authenticated user would be able
to read an arbitrary file from the compute host. Note that the host
file needs to be readable by the nova user to be exposed except when
using lvm for instance storage, when all files readable by root are
exposed. Only setups using libvirt to spawn instances are vulnerable.
Of these, setups which use filesystem storage, and do not set
"use_cow_images = False" in Nova configuration are not affected.
Setups which use ceph or lvm for instance storage, and setups which
use filesystem storage with "use_cow_images = False" are all affected.
Patches
~~~~~~~
- https://review.openstack.org/264819 (Kilo)
- https://review.openstack.org/264820 (Kilo)
- https://review.openstack.org/264821 (Kilo)
- https://review.openstack.org/264815 (Liberty)
- https://review.openstack.org/264816 (Liberty)
- https://review.openstack.org/264817 (Liberty)
- https://review.openstack.org/264812 (Mitaka)
- https://review.openstack.org/264813 (Mitaka)
- https://review.openstack.org/264814 (Mitaka)
Credits
~~~~~~~
- Matthew Booth from Red Hat (CVE-2015-7548)
References
~~~~~~~~~~
- https://bugs.launchpad.net/bugs/1524274
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7548
Notes
~~~~~
- This fix will be included in future 2015.1.3 (kilo) and 12.0.1
(liberty) releases.
--
Tristan Cacqueray
OpenStack Vulnerability Management Team
Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.