Debian Bug report logs - #909389
virt-inst --location security concern

version graph

Package: virtinst; Maintainer for virtinst is Debian Libvirt Maintainers <pkg-libvirt-maintainers@lists.alioth.debian.org>; Source for virtinst is src:virt-manager (PTS, buildd, popcon).

Reported by: Simon Josefsson <simon@josefsson.org>

Date: Sat, 22 Sep 2018 21:06:01 UTC

Severity: normal

Tags: fixed-upstream

Found in version virt-manager/1:1.4.0-5

Forwarded to https://bugzilla.redhat.com/show_bug.cgi?id=1632132

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Libvirt Maintainers <pkg-libvirt-maintainers@lists.alioth.debian.org>:
Bug#909389; Package virtinst. (Sat, 22 Sep 2018 21:06:03 GMT) (full text, mbox, link).


Acknowledgement sent to Simon Josefsson <simon@josefsson.org>:
New Bug report received and forwarded. Copy sent to Debian Libvirt Maintainers <pkg-libvirt-maintainers@lists.alioth.debian.org>. (Sat, 22 Sep 2018 21:06:03 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Simon Josefsson <simon@josefsson.org>
To: submit@bugs.debian.org
Subject: virt-inst --location security concern
Date: Sat, 22 Sep 2018 22:51:36 +0200
[Message part 1 (text/plain, inline)]
Package: virtinst
Version: 1:1.4.0-5

I rediscovered a problem I found a couple of years ago, and thought I'd
report it properly this time.

The problem is that "virt-install --location" does not verify
checksums/signatures of what is downloaded, and is thus vulnerable to a
network attack where someone replaces the kernel/initrd with a version
that is malicious.  As far as I know, there is no way to tell virt-
install what checksums to expect.

See earlier discussion here: https://www.redhat.com/archives/virt-tools
-list/2015-April/msg00214.html

Quoting the manpage which gives http-URLs to use:

       --location OPTIONS
...
           Debian
               http://ftp.us.debian.org/debian/dists/stable/main/instal
ler-amd64/

           Ubuntu
               http://us.archive.ubuntu.com/ubuntu/dists/wily/main/inst
aller-amd64/

A workaround is to replace the recommended http URLs with https URLs. 
I checked that CA verification of the domain name works.  This gives
some protection, but far from a GnuPG-based verification that would be
ideal.

Run this command to see what is happening:

virt-install --name foo --memory 500 --disk none --location http://deb.
debian.org/debian/dists/stable/main/installer-amd64/ --noautoconsole --
debug

/Simon
[signature.asc (application/pgp-signature, inline)]

Set Bug forwarded-to-address to 'https://bugzilla.redhat.com/show_bug.cgi?id=1632132'. Request was from Guido Günther <agx@sigxcpu.org> to control@bugs.debian.org. (Mon, 24 Sep 2018 08:03:08 GMT) (full text, mbox, link).


Added tag(s) fixed-upstream. Request was from debian-bts-link@lists.debian.org to control@bugs.debian.org. (Thu, 17 Sep 2020 17:21:12 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Debian Libvirt Maintainers <pkg-libvirt-maintainers@lists.alioth.debian.org>:
Bug#909389; Package virtinst. (Mon, 30 Nov 2020 08:21:03 GMT) (full text, mbox, link).


Acknowledgement sent to Pino Toscano <pino@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Libvirt Maintainers <pkg-libvirt-maintainers@lists.alioth.debian.org>. (Mon, 30 Nov 2020 08:21:03 GMT) (full text, mbox, link).


Message #14 received at 909389@bugs.debian.org (full text, mbox, reply):

From: Pino Toscano <pino@debian.org>
To: Simon Josefsson <simon@josefsson.org>, 909389@bugs.debian.org
Subject: Re: Bug#909389: virt-inst --location security concern
Date: Mon, 30 Nov 2020 09:19:36 +0100
[Message part 1 (text/plain, inline)]
Hi,

In data sabato 22 settembre 2018 22:51:36 CET, hai scritto:
> Package: virtinst
> Version: 1:1.4.0-5
> 
> I rediscovered a problem I found a couple of years ago, and thought I'd
> report it properly this time.
> 
> The problem is that "virt-install --location" does not verify
> checksums/signatures of what is downloaded, and is thus vulnerable to a
> network attack where someone replaces the kernel/initrd with a version
> that is malicious.  As far as I know, there is no way to tell virt-
> install what checksums to expect.
> 
> See earlier discussion here: https://www.redhat.com/archives/virt-tools
> -list/2015-April/msg00214.html
> 
> Quoting the manpage which gives http-URLs to use:
> 
>        --location OPTIONS
> ...
>            Debian
>                http://ftp.us.debian.org/debian/dists/stable/main/instal
> ler-amd64/
> 
>            Ubuntu
>                http://us.archive.ubuntu.com/ubuntu/dists/wily/main/inst
> aller-amd64/
> 
> A workaround is to replace the recommended http URLs with https URLs. 
> I checked that CA verification of the domain name works.  This gives
> some protection, but far from a GnuPG-based verification that would be
> ideal.

Upstream switched to https URLs with two commits:
- a712549b2b9b0100907878fea18442be68b8d35f [1]
- b1460ba0654c00527c8d5632d69b30c7030dc182 [2]
which are both available in virt-manager 2.0.0.

Note that even before the above fixes it was possible to pass https
URLs to the installer location.

Also, the upstream bug rh#1632132 [3] was recently closed, also for
low priorities and not much interest shown in it. I'd tend to close
this bug as well, however I'm not strongly for it.

[1] https://github.com/virt-manager/virt-manager/commit/a712549b2b9b0100907878fea18442be68b8d35f
[2] https://github.com/virt-manager/virt-manager/commit/b1460ba0654c00527c8d5632d69b30c7030dc182
[3] https://bugzilla.redhat.com/show_bug.cgi?id=1632132

-- 
Pino Toscano
[signature.asc (application/pgp-signature, inline)]

Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sat Aug 26 19:36:36 2023; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.