Search for packages
| purl | pkg:deb/debian/cinder@2:8.0.0-4~bpo8%2B1 |
| Next non-vulnerable version | 2:21.3.1-1~deb12u1 |
| Latest non-vulnerable version | 2:21.3.1-1~deb12u1 |
| Risk | 4.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-7uus-f9pq-qkb5
Aliases: CVE-2020-10755 GHSA-v3m2-pg96-w33m PYSEC-2020-228 |
An insecure-credentials flaw was found in all openstack-cinder versions before openstack-cinder 14.1.0, all openstack-cinder 15.x.x versions before openstack-cinder 15.2.0 and all openstack-cinder 16.x.x versions before openstack-cinder 16.1.0. When using openstack-cinder with the Dell EMC ScaleIO or VxFlex OS backend storage driver, credentials for the entire backend are exposed in the ``connection_info`` element in all Block Storage v3 Attachments API calls containing that element. This flaw enables an end-user to create a volume, make an API call to show the attachment detail information, and retrieve a username and password that may be used to connect to another user's volume. Additionally, these credentials are valid for the ScaleIO or VxFlex OS Management API, should an attacker discover the Management API endpoint. Source: OpenStack project |
Affected by 2 other vulnerabilities. |
|
VCID-br4q-499g-vqhg
Aliases: CVE-2022-47951 GHSA-7h75-hwxx-qpgc |
OpenStack Cinder, glance, and Nova vulnerable to Path Traversal An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. |
Affected by 2 other vulnerabilities. |
|
VCID-h6rd-5p7q-s3gq
Aliases: CVE-2024-32498 GHSA-r4v4-w9pv-6fph |
OpenStack Cinder, Glance, and Nova vulnerable to arbitrary file access An issue was discovered in OpenStack Cinder through 24.0.0, Glance before 28.0.2, and Nova before 29.0.3. Arbitrary file access can occur via custom QCOW2 external data. By supplying a crafted QCOW2 image that references a specific data file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Cinder and Nova deployments are affected; only Glance deployments with image conversion enabled are affected. |
Affected by 0 other vulnerabilities. |
|
VCID-hd9e-1msb-uqa6
Aliases: CVE-2023-2088 |
openstack-cinder: silently access other user's volumes |
Affected by 0 other vulnerabilities. |
|
VCID-nyak-4rzf-9fhp
Aliases: CVE-2017-15139 |
openstack-cinder: Data retained after deletion of a ScaleIO volume |
Affected by 4 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-ggmm-svqw-bkhv | OpenStack Cinder file disclosure in image convert OpenStack Cinder before 2014.1.5 (icehouse), 2014.2.x before 2014.2.4 (juno), and 2015.1.x before 2015.1.1 (kilo) allows remote authenticated users to read arbitrary files via a crafted qcow2 signature in an image to the upload-to-image command. |
CVE-2015-1851
GHSA-9hcj-h2qc-689p |
| VCID-zy9m-d25c-5uga | OpenStack Cinder, Glance, and Nova contain Uncontrolled Resource Consumption A resource vulnerability in the OpenStack Compute (nova), Block Storage (cinder), and Image (glance) services was found in their use of qemu-img. An unprivileged user could consume as much as 4 GB of RAM on the compute host by uploading a malicious image. This flaw could lead possibly to host out-of-memory errors and negatively affect other running tenant instances. oslo.concurrency has been updated to support process limits ('prlimit'), which is needed to fix this flaw. |
CVE-2015-5162
GHSA-g2j5-7vgx-6xrx |