> Pádraig Brady from Red Hat discovered that the fix implemented for
> CVE-2012-3361 (OSSA-2012-008) was not covering all attack scenarios. By
> crafting a malicious image with root-readable-only symlinks and
> requesting a server based on it, an authenticated user could still
> corrupt arbitrary files (all setups affected) or inject arbitrary files
> (Essex and later setups with OpenStack API enabled and a libvirt-based
> hypervisor) on the host filesystem, potentially resulting in full
> compromise of that compute node.
>  

Unfortunately, this won't be the end of vulnerabilities coming from this 
"feature".

Even if all the edge-cases around safely writing files are handled (and I'm not 
sure they are), simply mounting a filesystem is a very dangerous operation for 
the host.

The idea had been suggested early-on to supporting ISO9660 filesystems created 
with mkisofs, which can be created in userspace, are read-only, and fairly safe 
to produce, even as root on compute host.

That idea was apparently shot-down because, "the people who 
documented/requested the blueprint requested a read-write filesystem that you 
cannot obtain with ISO9660".  Now, everyone has to live with a serious 
technical blunder.

Per the summit discussion Etherpad:
 "injecting files into a guest is a very popular desire."

Popular desires not necessary smart desires. We should remove all file 
injection post-haste.

Regards,
Eric Windisch




_______________________________________________
Mailing list: https://launchpad.net/~openstack
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~openstack
More help   : https://help.launchpad.net/ListHelp

Reply via email to