Bug 1073591 (CVE-2012-6639)

Summary: CVE-2012-6639 cloud-init: insecure transmission of EC2 instance data can lead to root privilege escalation
Product: [Other] Security Response Reporter: Vincent Danen <vdanen>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: abaron, aortega, apevec, apevec, ayoung, chrisw, dallan, gholms, gkotton, Jan.van.Eldik, jrusnack, kseifried, lhh, markmc, mattdm, p, rbryant, sclewis, shardy, skottler, yeylon
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: cloud-init 0.7.0 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-03-07 08:43:50 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1073592    
Bug Blocks:    

Description Vincent Danen 2014-03-06 18:36:17 UTC
It was reported [1],[2] that cloud-init could send requests for EC2 instance data to untrusted systems.  This could allow someone who has control over a suitable domain name to obtain root rights on an affected system.

This issue was found and silently fixed in 2012; version 0.7.0 contains the fix [3].

[1] http://seclists.org/oss-sec/2014/q1/514
[2] https://bugs.launchpad.net/cloud-init/+bug/1040200
[3] http://bazaar.launchpad.net/~cloud-init-dev/cloud-init/trunk/revision/635


Not vulnerable. This issue did not affect the versions of cloud-init as shipped with Red Hat Enterprise Linux OpenStack Platform 3.0.

Comment 1 Vincent Danen 2014-03-06 18:37:07 UTC
Created cloud-init tracking bugs for this issue:

Affects: epel-5 [bug 1073592]

Comment 2 Vincent Danen 2014-03-06 18:39:05 UTC
This does affect EPEL5, however, as it provides cloud-init 0.6.3.  I do see now that EPEL 6 does in fact include 0.7.4.

Comment 3 Sam Kottler 2014-03-07 08:43:50 UTC
A patch that fixes this bug was added the cloud-init in EPEL 5 back in 2012, so it's not vulnerable either.


Comment 4 Vincent Danen 2014-03-07 17:57:15 UTC
Perfect, thanks Sam!