Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/cinder@2:8.0.0-4~bpo8%2B1
purl pkg:deb/debian/cinder@2:8.0.0-4~bpo8%2B1
Next non-vulnerable version 2:21.3.1-1~deb12u1
Latest non-vulnerable version 2:21.3.1-1~deb12u1
Risk 4.1
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-7uus-f9pq-qkb5
Aliases:
CVE-2020-10755
GHSA-v3m2-pg96-w33m
PYSEC-2020-228
An insecure-credentials flaw was found in all openstack-cinder versions before openstack-cinder 14.1.0, all openstack-cinder 15.x.x versions before openstack-cinder 15.2.0 and all openstack-cinder 16.x.x versions before openstack-cinder 16.1.0. When using openstack-cinder with the Dell EMC ScaleIO or VxFlex OS backend storage driver, credentials for the entire backend are exposed in the ``connection_info`` element in all Block Storage v3 Attachments API calls containing that element. This flaw enables an end-user to create a volume, make an API call to show the attachment detail information, and retrieve a username and password that may be used to connect to another user's volume. Additionally, these credentials are valid for the ScaleIO or VxFlex OS Management API, should an attacker discover the Management API endpoint. Source: OpenStack project
2:17.0.1-1+deb11u1
Affected by 2 other vulnerabilities.
VCID-br4q-499g-vqhg
Aliases:
CVE-2022-47951
GHSA-7h75-hwxx-qpgc
OpenStack Cinder, glance, and Nova vulnerable to Path Traversal An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data.
2:17.0.1-1+deb11u1
Affected by 2 other vulnerabilities.
VCID-h6rd-5p7q-s3gq
Aliases:
CVE-2024-32498
GHSA-r4v4-w9pv-6fph
OpenStack Cinder, Glance, and Nova vulnerable to arbitrary file access An issue was discovered in OpenStack Cinder through 24.0.0, Glance before 28.0.2, and Nova before 29.0.3. Arbitrary file access can occur via custom QCOW2 external data. By supplying a crafted QCOW2 image that references a specific data file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Cinder and Nova deployments are affected; only Glance deployments with image conversion enabled are affected.
2:21.3.1-1~deb12u1
Affected by 0 other vulnerabilities.
VCID-hd9e-1msb-uqa6
Aliases:
CVE-2023-2088
openstack-cinder: silently access other user's volumes
2:21.3.1-1~deb12u1
Affected by 0 other vulnerabilities.
VCID-nyak-4rzf-9fhp
Aliases:
CVE-2017-15139
openstack-cinder: Data retained after deletion of a ScaleIO volume
2:13.0.3-1
Affected by 4 other vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-ggmm-svqw-bkhv OpenStack Cinder file disclosure in image convert OpenStack Cinder before 2014.1.5 (icehouse), 2014.2.x before 2014.2.4 (juno), and 2015.1.x before 2015.1.1 (kilo) allows remote authenticated users to read arbitrary files via a crafted qcow2 signature in an image to the upload-to-image command. CVE-2015-1851
GHSA-9hcj-h2qc-689p
VCID-zy9m-d25c-5uga OpenStack Cinder, Glance, and Nova contain Uncontrolled Resource Consumption A resource vulnerability in the OpenStack Compute (nova), Block Storage (cinder), and Image (glance) services was found in their use of qemu-img. An unprivileged user could consume as much as 4 GB of RAM on the compute host by uploading a malicious image. This flaw could lead possibly to host out-of-memory errors and negatively affect other running tenant instances. oslo.concurrency has been updated to support process limits ('prlimit'), which is needed to fix this flaw. CVE-2015-5162
GHSA-g2j5-7vgx-6xrx

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-15T21:40:11.058654+00:00 Debian Oval Importer Affected by VCID-br4q-499g-vqhg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T21:35:11.842146+00:00 Debian Oval Importer Affected by VCID-nyak-4rzf-9fhp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:30:53.668803+00:00 Debian Oval Importer Fixing VCID-ggmm-svqw-bkhv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:11:06.027578+00:00 Debian Oval Importer Affected by VCID-hd9e-1msb-uqa6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:10:58.112464+00:00 Debian Oval Importer Affected by VCID-7uus-f9pq-qkb5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:52:19.690301+00:00 Debian Oval Importer Affected by VCID-h6rd-5p7q-s3gq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:37:42.596282+00:00 Debian Oval Importer Fixing VCID-zy9m-d25c-5uga https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-11T21:19:01.054350+00:00 Debian Oval Importer Affected by VCID-br4q-499g-vqhg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T21:14:11.967877+00:00 Debian Oval Importer Affected by VCID-nyak-4rzf-9fhp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T19:13:44.420719+00:00 Debian Oval Importer Fixing VCID-ggmm-svqw-bkhv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:54:44.094328+00:00 Debian Oval Importer Affected by VCID-hd9e-1msb-uqa6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:58:25.040359+00:00 Debian Oval Importer Affected by VCID-7uus-f9pq-qkb5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:39:57.349669+00:00 Debian Oval Importer Affected by VCID-h6rd-5p7q-s3gq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:25:36.327409+00:00 Debian Oval Importer Fixing VCID-zy9m-d25c-5uga https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-08T20:57:46.512283+00:00 Debian Oval Importer Affected by VCID-br4q-499g-vqhg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:53:07.194587+00:00 Debian Oval Importer Affected by VCID-nyak-4rzf-9fhp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:57:44.666287+00:00 Debian Oval Importer Fixing VCID-ggmm-svqw-bkhv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:39:24.825747+00:00 Debian Oval Importer Affected by VCID-hd9e-1msb-uqa6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:51:31.776782+00:00 Debian Oval Importer Affected by VCID-7uus-f9pq-qkb5 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:33:51.961389+00:00 Debian Oval Importer Affected by VCID-h6rd-5p7q-s3gq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:20:04.660824+00:00 Debian Oval Importer Fixing VCID-zy9m-d25c-5uga https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0