Bug 934753 (CVE-2015-1851) - VUL-0: CVE-2015-1851: openstack-cinder: Host file disclosure through qcow2 backing file
Summary: VUL-0: CVE-2015-1851: openstack-cinder: Host file disclosure through qcow2 ba...
Status: RESOLVED FIXED
Alias: CVE-2015-1851
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: CVSSv2:RedHat:CVE-2015-1851:5.5:(AV:A...
Keywords:
Depends on:
Blocks:
 
Reported: 2015-06-15 13:45 UTC by Andreas Stieger
Modified: 2016-04-27 19:39 UTC (History)
5 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2015-06-15 13:45:47 UTC
http://seclists.org/oss-sec/2015/q2/704

> OpenStack Cinder and Nova do not provide input format to several calls
> of "qemu-img convert".  In Cinder these calls are done as root.  This
> allows the attacker to play the format guessing in qemu-img by providing
> input with a qcow2 signature.  If this signature contains a base file,
> this file will be read by a process running as root and embedded in the
> output.  This bug is similar to CVE-2013-1922 and has been assigned
> CVE-2015-1850.
> 
> Tested with: lvm backed volume storage in Cinder, it may apply to others
> as well.
> 
> Steps to reproduce:
> - create volume and attach to vm,
> - create a qcow2 signature on the volume containing a base-file[1] from
>   within the vm and
> - trigger an upload to Glance with "cinder upload-to-image --disk-type
>   qcow2"[2].
> The image uploaded to Glance will have the base-file from the
> cinder-volume host embedded.
> 
> Affected versions: tested on 2014.1.3, found while reading 2014.2.1
> 
> Timeline:
> - Reported upstream 2015-01-27
> - Published 2015-06-13
> [...]
> 
> [1]: qemu-img create -f qcow2 -b /etc/passwd /dev/vdb
> [2]: The disk-type != raw triggers the use of "qemu-img convert"


References:
https://bugs.launchpad.net/cinder/+bug/1415087
https://bugzilla.redhat.com/show_bug.cgi?id=1231816

https://review.openstack.org/#/c/191785/
Comment 1 Andreas Stieger 2015-06-15 14:41:49 UTC
OpenStack 2015.1 (kilo) known affected for cinder and nova.

OpenStack 2014.2 (Juno) - Cloud 5:

Cinder: cinder/image/image_utils.py upload_volume() looks affected, patch needs tweaking.
Nova: unknown

OpenStack 2014.1 (Icehouse) - Cloud 4:

Cinder: cinder/image/image_utils.py upload_volume() looks affected, but run_as_root is not used. Needs clarification.
Nova: unknown

No upstream announcement, watching bug.
Comment 2 Andreas Stieger 2015-06-15 15:09:51 UTC
https://bugs.launchpad.net/cinder/+bug/1415087/comments/56

Title: Cinder host file disclosure through qcow2 backing file
Reporter: Bastian Blank (credativ)
Products: Cinder
Affects: versions through 2014.1.4, and 2014.2 versions through 2014.2.3, and version 2015.1.0

Description:
Bastian Blank from credativ reported a vulnerability in Cinder. By overwriting an image with a malicious qcow2 header, an authenticated user may mislead Cinder upload-to-image action, resulting in disclosure of any file from the Cinder server. All Cinder and Nova setups are affected.
Comment 3 Swamp Workflow Management 2015-06-15 22:00:17 UTC
bugbot adjusting priority
Comment 5 Vincent Untz 2015-10-01 19:53:46 UTC
Patch for this was already released as part of an update for Cloud 5, but bug and CVE were not mentioned in the .changes. Do you want me to amend the .changes file for this?
Comment 6 Johannes Segitz 2015-10-12 07:40:11 UTC
(In reply to Vincent Untz from comment #5)
Please change it in the next round of updates.
Comment 7 Vincent Untz 2015-10-12 08:25:04 UTC
(In reply to Johannes Segitz from comment #6)
> (In reply to Vincent Untz from comment #5)
> Please change it in the next round of updates.

Done; will propagate to next round of update.
Comment 8 Vincent Untz 2015-10-12 08:43:39 UTC
(In reply to Vincent Untz from comment #7)
> (In reply to Johannes Segitz from comment #6)
> > (In reply to Vincent Untz from comment #5)
> > Please change it in the next round of updates.
> 
> Done; will propagate to next round of update.

mr#73705
Comment 9 Marcus Meissner 2016-02-10 07:37:30 UTC
released