Activity log for bug #1415087

Date Who What changed Old value New value Message
2015-01-27 15:59:37 Bastian Blank bug added bug
2015-01-27 16:35:56 Tristan Cacqueray bug task added ossa
2015-01-27 16:36:11 Tristan Cacqueray ossa: status New Incomplete
2015-01-27 16:37:06 Tristan Cacqueray description Cinder does not provide input format to several calls of "qemu-img convert". This allows the attacker to play the format guessing by providing a volume with a qcow2 signature. If this signature contains a base file, this file will be read by a process running as root and embedded in the output. This bug is similar to CVE-2013-1922. Tested with: lvm backed volume storage, it may apply to others as well Steps to reproduce: - create volume and attach to vm, - create a qcow2 signature with base-file[1] from within the vm and - trigger upload to glance with "cinder upload-to-image --disk-type qcow2"[2]. The image uploaded to glance will have /etc/passwd from the cinder-volume host embedded. Affected versions: tested on 2014.1.3, found while reading 2014.2.1 Fix: Always specify both input "-f" and output format "-O" to "qemu-img convert". The code is in module cinder.image.image_utils. Bastian Blank [1]: qemu-img create -f qcow2 -b /etc/passwd /dev/vdb [2]: The disk-type != raw triggers the use of "qemu-img convert" This issue is being treated as a potential security risk under embargo. Please do not make any public mention of embargoed (private) security vulnerabilities before their coordinated publication by the OpenStack Vulnerability Management Team in the form of an official OpenStack Security Advisory. This includes discussion of the bug or associated fixes in public forums such as mailing lists, code review systems and bug trackers. Please also avoid private disclosure to other individuals not already approved for access to this information, and provide this same reminder to those who are made aware of the issue prior to publication. All discussion should remain confined to this private bug report, and any proposed fixes should be added as to the bug as attachments. Cinder does not provide input format to several calls of "qemu-img convert". This allows the attacker to play the format guessing by providing a volume with a qcow2 signature. If this signature contains a base file, this file will be read by a process running as root and embedded in the output. This bug is similar to CVE-2013-1922. Tested with: lvm backed volume storage, it may apply to others as well Steps to reproduce: - create volume and attach to vm, - create a qcow2 signature with base-file[1] from within the vm and - trigger upload to glance with "cinder upload-to-image --disk-type qcow2"[2]. The image uploaded to glance will have /etc/passwd from the cinder-volume host embedded. Affected versions: tested on 2014.1.3, found while reading 2014.2.1 Fix: Always specify both input "-f" and output format "-O" to "qemu-img convert". The code is in module cinder.image.image_utils. Bastian Blank [1]: qemu-img create -f qcow2 -b /etc/passwd /dev/vdb [2]: The disk-type != raw triggers the use of "qemu-img convert"
2015-01-29 10:33:40 Thierry Carrez bug added subscriber Cinder Core security contacts
2015-02-02 18:18:22 Mike Perez cinder: status New Confirmed
2015-02-05 13:21:20 Thierry Carrez ossa: status Incomplete Confirmed
2015-02-05 13:22:02 Thierry Carrez ossa: importance Undecided High
2015-02-05 13:22:18 Thierry Carrez cinder: importance Undecided High
2015-02-05 13:22:56 Thierry Carrez bug task added nova
2015-02-05 13:23:32 Thierry Carrez bug added subscriber Nova Core security contacts
2015-02-18 22:52:17 Tony Breeds nova: importance Undecided Medium
2015-02-18 22:52:17 Tony Breeds nova: status New Confirmed
2015-02-18 22:52:17 Tony Breeds nova: assignee Tony Breeds (o-tony)
2015-02-24 14:17:34 Andrew Laski bug added subscriber Daniel Berrange
2015-02-24 15:37:01 Mike Perez cinder: assignee Mike Perez (thingee)
2015-02-26 14:53:12 Thierry Carrez nova: status Confirmed Triaged
2015-02-26 14:53:15 Thierry Carrez cinder: status Confirmed Triaged
2015-02-26 16:35:20 Tristan Cacqueray ossa: status Confirmed Triaged
2015-02-26 16:35:23 Tristan Cacqueray ossa: assignee Tristan Cacqueray (tristan-cacqueray)
2015-03-02 15:08:22 Thierry Carrez nova: importance Medium High
2015-03-02 23:24:02 Grant Murphy attachment added 0001-Require-source-image-format-for-convert_image-calls.patch https://bugs.launchpad.net/cinder/+bug/1415087/+attachment/4332707/+files/0001-Require-source-image-format-for-convert_image-calls.patch
2015-03-10 21:18:41 Grant Murphy attachment removed 0001-Require-source-image-format-for-convert_image-calls.patch https://bugs.launchpad.net/cinder/+bug/1415087/+attachment/4332707/+files/0001-Require-source-image-format-for-convert_image-calls.patch
2015-03-10 21:28:29 Grant Murphy attachment added 0001-Require-source-image-format-for-convert_image-calls.patch https://bugs.launchpad.net/cinder/+bug/1415087/+attachment/4340460/+files/0001-Require-source-image-format-for-convert_image-calls.patch
2015-03-31 15:09:33 Duncan Thomas bug added subscriber Duncan Thomas
2015-03-31 18:32:27 Mike Perez cinder: assignee Mike Perez (thingee) Eric Harney (eharney)
2015-03-31 23:53:43 Eric Harney attachment added 0001-Disallow-backing-files-when-uploading-volumes-to-ima.patch https://bugs.launchpad.net/cinder/+bug/1415087/+attachment/4362440/+files/0001-Disallow-backing-files-when-uploading-volumes-to-ima.patch
2015-04-02 16:23:01 Tristan Cacqueray cve linked 2015-1850
2015-04-02 16:23:33 Tristan Cacqueray summary Format-guessing and file disclosure in image convert Format-guessing and file disclosure in image convert (CVE-2015-1850)
2015-06-13 14:30:17 Jeremy Stanley information type Private Security Public Security
2015-06-13 14:37:42 Jeremy Stanley description This issue is being treated as a potential security risk under embargo. Please do not make any public mention of embargoed (private) security vulnerabilities before their coordinated publication by the OpenStack Vulnerability Management Team in the form of an official OpenStack Security Advisory. This includes discussion of the bug or associated fixes in public forums such as mailing lists, code review systems and bug trackers. Please also avoid private disclosure to other individuals not already approved for access to this information, and provide this same reminder to those who are made aware of the issue prior to publication. All discussion should remain confined to this private bug report, and any proposed fixes should be added as to the bug as attachments. Cinder does not provide input format to several calls of "qemu-img convert". This allows the attacker to play the format guessing by providing a volume with a qcow2 signature. If this signature contains a base file, this file will be read by a process running as root and embedded in the output. This bug is similar to CVE-2013-1922. Tested with: lvm backed volume storage, it may apply to others as well Steps to reproduce: - create volume and attach to vm, - create a qcow2 signature with base-file[1] from within the vm and - trigger upload to glance with "cinder upload-to-image --disk-type qcow2"[2]. The image uploaded to glance will have /etc/passwd from the cinder-volume host embedded. Affected versions: tested on 2014.1.3, found while reading 2014.2.1 Fix: Always specify both input "-f" and output format "-O" to "qemu-img convert". The code is in module cinder.image.image_utils. Bastian Blank [1]: qemu-img create -f qcow2 -b /etc/passwd /dev/vdb [2]: The disk-type != raw triggers the use of "qemu-img convert" Cinder does not provide input format to several calls of "qemu-img convert". This allows the attacker to play the format guessing by providing a volume with a qcow2 signature. If this signature contains a base file, this file will be read by a process running as root and embedded in the output. This bug is similar to CVE-2013-1922. Tested with: lvm backed volume storage, it may apply to others as well Steps to reproduce: - create volume and attach to vm, - create a qcow2 signature with base-file[1] from within the vm and - trigger upload to glance with "cinder upload-to-image --disk-type qcow2"[2]. The image uploaded to glance will have /etc/passwd from the cinder-volume host embedded. Affected versions: tested on 2014.1.3, found while reading 2014.2.1 Fix: Always specify both input "-f" and output format "-O" to "qemu-img convert". The code is in module cinder.image.image_utils. Bastian Blank [1]: qemu-img create -f qcow2 -b /etc/passwd /dev/vdb [2]: The disk-type != raw triggers the use of "qemu-img convert"
2015-06-13 14:55:10 Dave Walker bug added subscriber Dave Walker
2015-06-15 13:01:12 OpenStack Infra cinder: status Triaged In Progress
2015-06-15 13:01:12 OpenStack Infra cinder: assignee Eric Harney (eharney) Tristan Cacqueray (tristan-cacqueray)
2015-06-15 14:41:35 Andreas Stieger bug added subscriber Andreas Stieger
2015-06-15 15:33:41 OpenStack Infra cinder: assignee Tristan Cacqueray (tristan-cacqueray) Eric Harney (eharney)
2015-06-15 17:10:09 Eric Harney nominated for series cinder/icehouse
2015-06-15 17:10:09 Eric Harney nominated for series cinder/kilo
2015-06-15 17:10:09 Eric Harney nominated for series cinder/juno
2015-06-15 19:47:49 OpenStack Infra cinder: status In Progress Fix Committed
2015-06-15 22:38:02 OpenStack Infra tags in-stable-kilo
2015-06-15 22:42:26 OpenStack Infra tags in-stable-kilo in-stable-juno in-stable-kilo
2015-06-15 22:45:00 OpenStack Infra tags in-stable-juno in-stable-kilo in-stable-icehouse in-stable-juno in-stable-kilo
2015-06-16 13:28:48 Tristan Cacqueray ossa: status Triaged In Progress
2015-06-16 17:40:15 Tristan Cacqueray summary Format-guessing and file disclosure in image convert (CVE-2015-1850) [OSSA 2015-011] Format-guessing and file disclosure in image convert (CVE-2015-1850)
2015-06-16 17:40:23 Tristan Cacqueray ossa: status In Progress Fix Committed
2015-06-17 12:54:09 Tristan Cacqueray summary [OSSA 2015-011] Format-guessing and file disclosure in image convert (CVE-2015-1850) [OSSA 2015-011] Format-guessing and file disclosure in image convert (CVE-2015-1850, CVE-2015-1851)
2015-06-17 12:55:17 Tristan Cacqueray cve linked 2015-1851
2015-06-17 17:00:16 Mike Perez bug task added cinder/icehouse
2015-06-17 17:00:30 Mike Perez bug task added cinder/juno
2015-06-17 17:00:44 Mike Perez bug task added cinder/kilo
2015-06-17 17:00:53 Mike Perez cinder: milestone liberty-1
2015-06-17 17:02:17 Mike Perez cinder/icehouse: assignee Eric Harney (eharney)
2015-06-17 17:02:24 Mike Perez cinder/juno: assignee Eric Harney (eharney)
2015-06-17 17:02:31 Mike Perez cinder/kilo: assignee Eric Harney (eharney)
2015-06-17 17:02:34 Mike Perez cinder/icehouse: importance Undecided High
2015-06-17 17:02:37 Mike Perez cinder/juno: importance Undecided High
2015-06-17 17:02:41 Mike Perez cinder/kilo: status New Fix Committed
2015-06-17 17:02:44 Mike Perez cinder/kilo: importance Undecided High
2015-06-17 17:02:47 Mike Perez cinder/icehouse: status New Fix Committed
2015-06-17 17:02:51 Mike Perez cinder/juno: status New Fix Committed
2015-06-17 18:16:14 Alan Pevec cinder/icehouse: milestone 2014.1.5
2015-06-19 12:52:12 Alan Pevec cinder/icehouse: status Fix Committed Fix Released
2015-06-23 14:39:49 Thierry Carrez cinder: status Fix Committed Fix Released
2015-07-09 14:38:51 Matthew Edmonds bug added subscriber Matthew Edmonds
2015-07-23 21:53:01 Alan Pevec cinder/kilo: milestone 2015.1.1
2015-07-29 21:40:59 Alan Pevec cinder/kilo: status Fix Committed Fix Released
2015-08-10 14:19:48 Tristan Cacqueray ossa: status Fix Committed Fix Released
2015-10-07 09:40:37 Hao Jun Wang bug added subscriber Hao Jun Wang
2015-10-15 11:40:20 Thierry Carrez cinder: milestone liberty-1 7.0.0
2015-10-28 17:23:13 Matt Riedemann nova: status Triaged Incomplete
2015-11-14 15:04:01 Alan Pevec cinder/juno: milestone 2014.2.4
2015-11-19 21:39:49 Alan Pevec cinder/juno: status Fix Committed Fix Released
2016-02-20 00:40:02 Sean Dague nova: status Incomplete Invalid