Bug 2278663 (2024-emu, CVE-2024-32498)
Summary: | CVE-2024-32498 OpenStack: malicious qcow2/vmdk images | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Mauro Matteo Cascella <mcascell> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | urgent | Docs Contact: | |
Priority: | urgent | ||
Version: | unspecified | CC: | alfrgarc, athomas, brian.rosmaita, cinder-bugs, cyril, dasmith, eglynn, gfidente, hreitz, jhakimra, jjoyce, jschluet, kchamart, kwolf, lhh, lsvaty, ltoscano, mburns, mgarciac, osp-dfg-compute, pgrist, sbauza, security-response-team, sgordon, tsaito, tvignaud, udesale, vgoyal, vromanso, ytale |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
An input validation flaw was discovered in how multiple OpenStack services validate images with backing file references. An authenticated attacker could provide a malicious image via upload, or by creating and modifying an image from an existing volume. Validation of images can be triggered during image upload or when attaching images to virtual machines. During this process, the affected OpenStack services could be tricked into reading or writing to the host with the equivalent privileges of QEMU. This bypasses isolation restrictions, significantly reducing the security of an affected compute host, and could enable arbitrary code execution, a denial of service, or leaking of secrets. If exploited, the immediate impact is limited to an individual compute host. However, if the attacker has access to multiple hosts and enough time to repeat it, they could potentially spread across all compute hosts.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2278665, 2278666, 2278667, 2278668, 2278669, 2278670, 2294740, 2295197, 2295307, 2295308, 2295309 | ||
Bug Blocks: | 2278671 |
Description
Mauro Matteo Cascella
2024-05-02 16:04:55 UTC
This issue has been addressed in the following products: Red Hat OpenStack Platform 17.1 for RHEL 9 Via RHSA-2024:4272 https://access.redhat.com/errata/RHSA-2024:4272 This issue has been addressed in the following products: Red Hat OpenStack Platform 16.2 Via RHSA-2024:4273 https://access.redhat.com/errata/RHSA-2024:4273 This issue has been addressed in the following products: Red Hat OpenStack Platform 17.1 for RHEL 8 Via RHSA-2024:4274 https://access.redhat.com/errata/RHSA-2024:4274 This issue has been addressed in the following products: Red Hat OpenStack Platform 16.1 Via RHSA-2024:4425 https://access.redhat.com/errata/RHSA-2024:4425 |