Bug 1313454 (CVE-2016-2140)

Summary: CVE-2016-2140 openstack-nova: Host data leak through resize/migration
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: abaron, anemec, aortega, apevec, ayoung, berrange, chrisw, dallan, dasmith, eglynn, gkotton, gmollett, jjoyce, jschluet, kbasil, kchamart, lhh, lpeer, lyarwood, markmc, mbooth, mburns, ndipanov, nova-maint, panbalag, rbryant, sbauza, sclewis, security-response-team, sferdjao, sgordon, slinaber, slong, tdecacqu, vromanso, yeylon
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
An information-exposure flaw was found in the OpenStack Compute (nova) resize and migrate functionality. An authenticated user could write a malicious qcow header to an ephemeral or root disk, referencing a block device as a backing file. With a subsequent resize or migration, file system content on the specified device would be leaked to the user. Only setups using libvirt with raw storage and "use_cow_images = False" were affected.
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-04-13 06:29:40 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1312924, 1313655, 1313656, 1313657, 1313658, 1315890, 1315891    
Bug Blocks: 1313456    

Description Adam Mariš 2016-03-01 15:55:56 UTC
It was reported that by overwriting an ephemeral or root disk with a malicious image before requesting a resize, an authenticated user may be able to read arbitrary files from the compute host. Only setups using libvirt driver with raw storage and setting "use_cow_images = False" (not default) are affected.

Affected versions: <=2015.1.2, >=12.0.0 <=12.0.2

Comment 1 Adam Mariš 2016-03-01 15:56:09 UTC
Acknowledgments:

Name: Matthew Booth (Red Hat)

Comment 3 Adam Mariš 2016-03-03 09:13:08 UTC
Created attachment 1132693 [details]
Master/mitaka patch

Comment 4 Adam Mariš 2016-03-03 09:13:38 UTC
Created attachment 1132694 [details]
Stable/kilo patch

Comment 5 Adam Mariš 2016-03-03 09:14:09 UTC
Created attachment 1132695 [details]
Stable/liberty patch

Comment 10 Adam Mariš 2016-03-08 15:36:25 UTC
Upstream patches:

https://review.openstack.org/289957 (mitaka)
https://review.openstack.org/289958 (liberty)
https://review.openstack.org/289960 (kilo)

Comment 12 Garth Mollett 2016-03-08 21:52:54 UTC
Created openstack-nova tracking bugs for this issue:

Affects: fedora-all [bug 1315891]

Comment 13 errata-xmlrpc 2016-03-08 22:56:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6

Via RHSA-2016:0366 https://rhn.redhat.com/errata/RHSA-2016-0366.html

Comment 14 errata-xmlrpc 2016-03-08 22:57:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7

Via RHSA-2016:0365 https://rhn.redhat.com/errata/RHSA-2016-0365.html

Comment 15 errata-xmlrpc 2016-03-08 22:57:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7

Via RHSA-2016:0364 https://rhn.redhat.com/errata/RHSA-2016-0364.html

Comment 16 errata-xmlrpc 2016-03-08 22:58:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7

Via RHSA-2016:0363 https://rhn.redhat.com/errata/RHSA-2016-0363.html

Comment 19 Andrej Nemec 2016-03-09 08:53:01 UTC
External references:

http://seclists.org/oss-sec/2016/q1/563

Comment 21 Andrej Nemec 2016-03-10 10:25:38 UTC
(In reply to Andrej Nemec from comment #19)
> External references:
> 
> http://seclists.org/oss-sec/2016/q1/563

There is an errata released, which concerns these patches.

http://seclists.org/oss-sec/2016/q1/579

Comment 22 Garth Mollett 2016-03-14 22:57:56 UTC
(In reply to Andrej Nemec from comment #21)
> (In reply to Andrej Nemec from comment #19)
> > External references:
> > 
> > http://seclists.org/oss-sec/2016/q1/563
> 
> There is an errata released, which concerns these patches.
> 
> http://seclists.org/oss-sec/2016/q1/579

Updated builds correcting this issue have been added to errata.