** Changed in: nova
       Status: Fix Committed => Fix Released

** Changed in: nova
    Milestone: None => juno-3

-- 
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to OpenStack Compute (nova).
https://bugs.launchpad.net/bugs/1276862

Title:
  Nova libvirt driver live migration should sanitize target host

Status in OpenStack Compute (Nova):
  Fix Released
Status in OpenStack Security Advisories:
  Invalid

Bug description:
  In nova, an administrator can specify the target host for a libvirt
  live migrate action.

  This host is formatted into a base string (default="qemu+tcp://%s/system")
  
https://github.com/openstack/nova/blob/744fa6b7b88b131e0b9f5a1eca88b14a7351b540/nova/virt/libvirt/driver.py#L158
  and then passed directly to libvirt as a target URI:
  
https://github.com/openstack/nova/blob/744fa6b7b88b131e0b9f5a1eca88b14a7351b540/nova/virt/libvirt/driver.py#L4270
  dom.migrateToURI(CONF.libvirt.live_migration_uri % dest,

  The host does not appear to be validated, stripped, or otherwise checked to 
make sure that the value is reasonable. This allows an admin to attempt to 
migrate an instance out of a cloud (which may or may not be a security issue). 
Much more importantly, libvirt's URI format accepts many parameters in this 
URI, some of which allow execution of arbitrary commands at the same privilege 
level as libvirt.
  http://libvirt.org/remote.html#Remote_URI_reference

  Due to later checks it does not appear to be exploitable, but it
  should nevertheless be fixed to avoid future issues.

To manage notifications about this bug go to:
https://bugs.launchpad.net/nova/+bug/1276862/+subscriptions

-- 
Mailing list: https://launchpad.net/~yahoo-eng-team
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~yahoo-eng-team
More help   : https://help.launchpad.net/ListHelp

Reply via email to