Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/cinder@2:17.0.1-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/cinder@2:17.0.1-1%2Bdeb11u1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (13)
Vulnerability Summary Aliases
VCID-4cvx-j5g1-23hx The clear_volume function in LVMVolumeDriver driver in OpenStack Cinder 2013.1.1 through 2013.1.2 does not properly clear data when deleting a snapshot, which allows local users to obtain sensitive information via unspecified vectors. CVE-2013-4183
GHSA-q3rw-wcj6-8cjf
PYSEC-2013-35
VCID-7uus-f9pq-qkb5 An insecure-credentials flaw was found in all openstack-cinder versions before openstack-cinder 14.1.0, all openstack-cinder 15.x.x versions before openstack-cinder 15.2.0 and all openstack-cinder 16.x.x versions before openstack-cinder 16.1.0. When using openstack-cinder with the Dell EMC ScaleIO or VxFlex OS backend storage driver, credentials for the entire backend are exposed in the ``connection_info`` element in all Block Storage v3 Attachments API calls containing that element. This flaw enables an end-user to create a volume, make an API call to show the attachment detail information, and retrieve a username and password that may be used to connect to another user's volume. Additionally, these credentials are valid for the ScaleIO or VxFlex OS Management API, should an attacker discover the Management API endpoint. Source: OpenStack project CVE-2020-10755
GHSA-v3m2-pg96-w33m
PYSEC-2020-228
VCID-br4q-499g-vqhg OpenStack Cinder, glance, and Nova vulnerable to Path Traversal An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. CVE-2022-47951
GHSA-7h75-hwxx-qpgc
VCID-ea21-seng-n3fw OpenStack Cinder Exposure of Sensitive Information to an Unauthorized Actor vulnerability The (1) GlusterFS and (2) Linux Smbfs drivers in OpenStack Cinder before 2014.1.3 allows remote authenticated users to obtain file data from the Cinder-volume host by cloning and attaching a volume with a crafted qcow2 header. CVE-2014-3641
GHSA-qhch-g8qr-p497
VCID-ggmm-svqw-bkhv OpenStack Cinder file disclosure in image convert OpenStack Cinder before 2014.1.5 (icehouse), 2014.2.x before 2014.2.4 (juno), and 2015.1.x before 2015.1.1 (kilo) allows remote authenticated users to read arbitrary files via a crafted qcow2 signature in an image to the upload-to-image command. CVE-2015-1851
GHSA-9hcj-h2qc-689p
VCID-h6rd-5p7q-s3gq OpenStack Cinder, Glance, and Nova vulnerable to arbitrary file access An issue was discovered in OpenStack Cinder through 24.0.0, Glance before 28.0.2, and Nova before 29.0.3. Arbitrary file access can occur via custom QCOW2 external data. By supplying a crafted QCOW2 image that references a specific data file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Cinder and Nova deployments are affected; only Glance deployments with image conversion enabled are affected. CVE-2024-32498
GHSA-r4v4-w9pv-6fph
VCID-hd9e-1msb-uqa6 openstack-cinder: silently access other user's volumes CVE-2023-2088
VCID-kgrz-64rh-cbdd OpenStack Cinder Denial of Service using XML entities The (1) backup (api/contrib/backups.py) and (2) volume transfer (contrib/volume_transfer.py) APIs in OpenStack Cinder Grizzly 2013.1.3 and earlier allows remote attackers to cause a denial of service (resource consumption and crash) via an XML Entity Expansion (XEE) attack. NOTE: this issue is due to an incomplete fix for CVE-2013-1664. CVE-2013-4202
GHSA-mfg4-9xf4-f45q
VCID-kncr-vrmh-fygm The OpenStack Nova (python-nova) package 1:2013.2.3-0 before 1:2013.2.3-0ubuntu1.2 and 1:2014.1-0 before 1:2014.1-0ubuntu1.2 and Openstack Cinder (python-cinder) package 1:2013.2.3-0 before 1:2013.2.3-0ubuntu1.1 and 1:2014.1-0 before 1:2014.1-0ubuntu1.1 for Ubuntu 13.10 and 14.04 LTS does not properly set the sudo configuration, which makes it easier for attackers to gain privileges by leveraging another vulnerability. CVE-2013-1068
VCID-nyak-4rzf-9fhp openstack-cinder: Data retained after deletion of a ScaleIO volume CVE-2017-15139
VCID-t88t-p8tx-cfcu Multiple vulnerabilities have been found in libxml2, allowing remote attackers to execute arbitrary code or cause Denial of Service. CVE-2013-1664
GHSA-qrh7-x6fp-c2mp
VCID-ykzj-fz7y-eug8 Trove: potential leak of passwords into log files CVE-2014-7230
VCID-zy9m-d25c-5uga OpenStack Cinder, Glance, and Nova contain Uncontrolled Resource Consumption A resource vulnerability in the OpenStack Compute (nova), Block Storage (cinder), and Image (glance) services was found in their use of qemu-img. An unprivileged user could consume as much as 4 GB of RAM on the compute host by uploading a malicious image. This flaw could lead possibly to host out-of-memory errors and negatively affect other running tenant instances. oslo.concurrency has been updated to support process limits ('prlimit'), which is needed to fix this flaw. CVE-2015-5162
GHSA-g2j5-7vgx-6xrx

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:54:05.458455+00:00 Debian Importer Fixing VCID-ea21-seng-n3fw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:37:23.475542+00:00 Debian Importer Fixing VCID-7uus-f9pq-qkb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:09:14.611141+00:00 Debian Importer Fixing VCID-zy9m-d25c-5uga https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:34:19.545204+00:00 Debian Importer Fixing VCID-kgrz-64rh-cbdd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:03:52.433664+00:00 Debian Importer Fixing VCID-hd9e-1msb-uqa6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:45:50.032149+00:00 Debian Importer Fixing VCID-ggmm-svqw-bkhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:22:11.390784+00:00 Debian Importer Fixing VCID-kncr-vrmh-fygm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:20:16.589077+00:00 Debian Importer Fixing VCID-br4q-499g-vqhg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:33:15.144069+00:00 Debian Importer Fixing VCID-nyak-4rzf-9fhp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:31:32.731735+00:00 Debian Importer Fixing VCID-t88t-p8tx-cfcu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:25:49.560601+00:00 Debian Importer Fixing VCID-4cvx-j5g1-23hx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:43:58.263912+00:00 Debian Importer Fixing VCID-ykzj-fz7y-eug8 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:39:32.957507+00:00 Debian Importer Fixing VCID-h6rd-5p7q-s3gq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:51:28.763603+00:00 Debian Importer Fixing VCID-ea21-seng-n3fw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:38:54.998833+00:00 Debian Importer Fixing VCID-7uus-f9pq-qkb5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:18:39.067758+00:00 Debian Importer Fixing VCID-zy9m-d25c-5uga https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:53:20.128255+00:00 Debian Importer Fixing VCID-kgrz-64rh-cbdd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:46.481127+00:00 Debian Importer Fixing VCID-hd9e-1msb-uqa6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:16:49.853844+00:00 Debian Importer Fixing VCID-ggmm-svqw-bkhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:59:08.107130+00:00 Debian Importer Fixing VCID-kncr-vrmh-fygm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:57:38.644026+00:00 Debian Importer Fixing VCID-br4q-499g-vqhg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:22:06.326339+00:00 Debian Importer Fixing VCID-nyak-4rzf-9fhp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:05.675923+00:00 Debian Importer Fixing VCID-t88t-p8tx-cfcu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:17:38.269281+00:00 Debian Importer Fixing VCID-4cvx-j5g1-23hx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:02.226263+00:00 Debian Importer Fixing VCID-ykzj-fz7y-eug8 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:49:16.600025+00:00 Debian Importer Fixing VCID-h6rd-5p7q-s3gq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-02T17:18:45.019663+00:00 Debian Importer Fixing VCID-ggmm-svqw-bkhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:18:16.382894+00:00 Debian Importer Fixing VCID-kgrz-64rh-cbdd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:16:32.797378+00:00 Debian Importer Fixing VCID-ea21-seng-n3fw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:37.319449+00:00 Debian Importer Fixing VCID-7uus-f9pq-qkb5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:23.866218+00:00 Debian Importer Fixing VCID-hd9e-1msb-uqa6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:15:04.646250+00:00 Debian Importer Fixing VCID-br4q-499g-vqhg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:52.197209+00:00 Debian Importer Fixing VCID-kncr-vrmh-fygm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:13:51.994679+00:00 Debian Importer Fixing VCID-zy9m-d25c-5uga https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:09:07.197761+00:00 Debian Importer Fixing VCID-nyak-4rzf-9fhp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:05:11.092685+00:00 Debian Importer Fixing VCID-t88t-p8tx-cfcu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:04:54.529932+00:00 Debian Importer Fixing VCID-4cvx-j5g1-23hx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:32.402273+00:00 Debian Importer Fixing VCID-ykzj-fz7y-eug8 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-02T17:02:15.936647+00:00 Debian Importer Fixing VCID-h6rd-5p7q-s3gq https://security-tracker.debian.org/tracker/data/json 38.1.0