prometheanfire    15/06/17 21:50:18

  Added:                CVE-2015-1851_2015.1.0.patch
                        CVE-2015-1851_2014.2.3.patch
  Log:
  fixing CVE-2015-1851
  
  (Portage version: 2.2.18/cvs/Linux x86_64, signed Manifest commit with key 
0x33ED3FD25AFC78BA)

Revision  Changes    Path
1.1                  sys-cluster/cinder/files/CVE-2015-1851_2015.1.0.patch

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo-x86/sys-cluster/cinder/files/CVE-2015-1851_2015.1.0.patch?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo-x86/sys-cluster/cinder/files/CVE-2015-1851_2015.1.0.patch?rev=1.1&content-type=text/plain

Index: CVE-2015-1851_2015.1.0.patch
===================================================================
>From 9634b76ba5886d6c2f2128d550cb005dabf48213 Mon Sep 17 00:00:00 2001
From: Eric Harney <ehar...@redhat.com>
Date: Tue, 31 Mar 2015 19:48:17 -0400
Subject: [PATCH] Disallow backing files when uploading volumes to image

Volumes with a header referencing a backing file can leak
file data into the destination image when uploading a
volume to an image.

Halt the upload process if the volume data references a
backing file to prevent this.

Closes-Bug: #1415087
Change-Id: Iab9718794e7f7e8444015712cfa08c46848ebf78
(cherry picked from commit b1143ee45323e63b965a3710f9063e65b252c978)
---
 cinder/image/image_utils.py      | 14 ++++++++++++++
 cinder/tests/test_image_utils.py |  8 ++++++--
 2 files changed, 20 insertions(+), 2 deletions(-)

diff --git a/cinder/image/image_utils.py b/cinder/image/image_utils.py
index 6e5e2fb..6ae0f81 100644
--- a/cinder/image/image_utils.py
+++ b/cinder/image/image_utils.py
@@ -344,6 +344,20 @@ def upload_volume(context, image_service, image_meta, 
volume_path,
     with temporary_file() as tmp:
         LOG.debug("%s was %s, converting to %s",
                   image_id, volume_format, image_meta['disk_format'])
+
+        data = qemu_img_info(volume_path, run_as_root=run_as_root)
+        backing_file = data.backing_file
+        fmt = data.file_format
+        if backing_file is not None:
+            # Disallow backing files as a security measure.
+            # This prevents a user from writing an image header into a raw
+            # volume with a backing file pointing to data they wish to
+            # access.
+            raise exception.ImageUnacceptable(
+                image_id=image_id,
+                reason=_("fmt=%(fmt)s backed by:%(backing_file)s")
+                % {'fmt': fmt, 'backing_file': backing_file})
+
         convert_image(volume_path, tmp, image_meta['disk_format'],
                       run_as_root=run_as_root)
 
diff --git a/cinder/tests/test_image_utils.py b/cinder/tests/test_image_utils.py
index ab41243..3f8e763 100644
--- a/cinder/tests/test_image_utils.py
+++ b/cinder/tests/test_image_utils.py
@@ -381,6 +381,7 @@ def test_diff_format(self, mock_os, mock_temp, 
mock_convert, mock_info,
         mock_os.name = 'posix'
         data = mock_info.return_value
         data.file_format = mock.sentinel.disk_format
+        data.backing_file = None
         temp_file = mock_temp.return_value.__enter__.return_value
 
         output = image_utils.upload_volume(ctxt, image_service, image_meta,
@@ -391,7 +392,8 @@ def test_diff_format(self, mock_os, mock_temp, 
mock_convert, mock_info,
                                              temp_file,
                                              mock.sentinel.disk_format,
                                              run_as_root=True)
-        mock_info.assert_called_once_with(temp_file, run_as_root=True)
+        mock_info.assert_called_with(temp_file, run_as_root=True)
+        self.assertEqual(mock_info.call_count, 2)
         mock_open.assert_called_once_with(temp_file, 'rb')
         image_service.update.assert_called_once_with(
             ctxt, image_meta['id'], {},
@@ -470,6 +472,7 @@ def test_convert_error(self, mock_os, mock_temp, 
mock_convert, mock_info,
         mock_os.name = 'posix'
         data = mock_info.return_value
         data.file_format = mock.sentinel.other_disk_format
+        data.backing_file = None
         temp_file = mock_temp.return_value.__enter__.return_value
 
         self.assertRaises(exception.ImageUnacceptable,
@@ -479,7 +482,8 @@ def test_convert_error(self, mock_os, mock_temp, 
mock_convert, mock_info,
                                              temp_file,
                                              mock.sentinel.disk_format,
                                              run_as_root=True)
-        mock_info.assert_called_once_with(temp_file, run_as_root=True)
+        mock_info.assert_called_with(temp_file, run_as_root=True)
+        self.assertEqual(mock_info.call_count, 2)
         self.assertFalse(image_service.update.called)
 
 



1.1                  sys-cluster/cinder/files/CVE-2015-1851_2014.2.3.patch

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo-x86/sys-cluster/cinder/files/CVE-2015-1851_2014.2.3.patch?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo-x86/sys-cluster/cinder/files/CVE-2015-1851_2014.2.3.patch?rev=1.1&content-type=text/plain

Index: CVE-2015-1851_2014.2.3.patch
===================================================================
>From d31c937c566005dedf41a60c6b5bd5e7b26f221b Mon Sep 17 00:00:00 2001
From: Eric Harney <ehar...@redhat.com>
Date: Tue, 31 Mar 2015 19:48:17 -0400
Subject: [PATCH] Disallow backing files when uploading volumes to image

Volumes with a header referencing a backing file can leak
file data into the destination image when uploading a
volume to an image.

Halt the upload process if the volume data references a
backing file to prevent this.

Closes-Bug: #1415087
Change-Id: Iab9718794e7f7e8444015712cfa08c46848ebf78
(cherry picked from commit 9634b76ba5886d6c2f2128d550cb005dabf48213)
Conflicts:
    cinder/tests/test_image_utils.py (backport to old tests)
---
 cinder/image/image_utils.py      | 14 ++++++++++++++
 cinder/tests/test_image_utils.py | 13 +++++++++++++
 2 files changed, 27 insertions(+)

diff --git a/cinder/image/image_utils.py b/cinder/image/image_utils.py
index 160dfe7..cac0072 100644
--- a/cinder/image/image_utils.py
+++ b/cinder/image/image_utils.py
@@ -312,6 +312,20 @@ def upload_volume(context, image_service, image_meta, 
volume_path,
     with fileutils.remove_path_on_error(tmp):
         LOG.debug("%s was %s, converting to %s" %
                   (image_id, volume_format, image_meta['disk_format']))
+
+        data = qemu_img_info(volume_path)
+        backing_file = data.backing_file
+        fmt = data.file_format
+        if backing_file is not None:
+            # Disallow backing files as a security measure.
+            # This prevents a user from writing an image header into a raw
+            # volume with a backing file pointing to data they wish to
+            # access.
+            raise exception.ImageUnacceptable(
+                image_id=image_id,
+                reason=_("fmt=%(fmt)s backed by:%(backing_file)s")
+                % {'fmt': fmt, 'backing_file': backing_file})
+
         convert_image(volume_path, tmp, image_meta['disk_format'],
                       bps_limit=CONF.volume_copy_bps_limit)
 
diff --git a/cinder/tests/test_image_utils.py b/cinder/tests/test_image_utils.py
index 86168c0..2cf571a 100644
--- a/cinder/tests/test_image_utils.py
+++ b/cinder/tests/test_image_utils.py
@@ -462,6 +462,10 @@ def test_upload_volume(self, mock_stat, bps_limit=0):
         volume_utils.setup_blkio_cgroup(mox.IgnoreArg(), mox.IgnoreArg(),
                                         bps_limit).AndReturn(prefix)
 
+        utils.execute(
+            'env', 'LC_ALL=C', 'qemu-img', 'info',
+            mox.IgnoreArg(), run_as_root=True).AndReturn(
+                (TEST_RET, 'ignored'))
         utils.execute(*cmd, run_as_root=True)
         utils.execute(
             'env', 'LC_ALL=C', 'qemu-img', 'info',
@@ -497,6 +501,11 @@ def test_upload_volume_with_bps_limit(self, mock_stat):
 
         volume_utils.setup_blkio_cgroup(mox.IgnoreArg(), mox.IgnoreArg(),
                                         bps_limit).AndReturn(prefix)
+
+        utils.execute(
+            'env', 'LC_ALL=C', 'qemu-img', 'info',
+            mox.IgnoreArg(), run_as_root=True).AndReturn(
+                (TEST_RET, 'ignored'))
         utils.execute(*cmd, run_as_root=True)
         utils.execute(
             'env', 'LC_ALL=C', 'qemu-img', 'info',
@@ -534,6 +543,10 @@ def test_upload_volume_on_error(self, mock_stat):
         m.StubOutWithMock(utils, 'execute')
         m.StubOutWithMock(volume_utils, 'check_for_odirect_support')
 
+        utils.execute(
+            'env', 'LC_ALL=C', 'qemu-img', 'info',
+            mox.IgnoreArg(), run_as_root=True).AndReturn(
+                (TEST_RET, 'ignored'))
         utils.execute('qemu-img', 'convert', '-O', 'qcow2',
                       mox.IgnoreArg(), mox.IgnoreArg(), run_as_root=True)
         utils.execute(




Reply via email to