Thierry Carrez <thierry> reports: Pádraig Brady from Red Hat discovered that the fix implemented for CVE-2012-3361 (OSSA-2012-008) was not covering all attack scenarios. By crafting a malicious image with root-readable-only symlinks and requesting a server based on it, an authenticated user could still corrupt arbitrary files (all setups affected) or inject arbitrary files (Essex and later setups with OpenStack API enabled and a libvirt-based hypervisor) on the host filesystem, potentially resulting in full compromise of that compute node.
Created attachment 601803 [details] Patch for CVE-2012-3447 for essex
Created attachment 601804 [details] Patch for CVE-2012-3447 for folsom
References: http://thread.gmane.org/gmane.comp.security.oss.general/8126 https://bugs.launchpad.net/nova/+bug/1031311
Created openstack-nova tracking bugs for this issue Affects: fedora-all [bug 846624] Affects: epel-6 [bug 846625]