Search for packages
| purl | pkg:deb/debian/nova@2:33.0.0-2?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1fb2-ccby-7yfq | An issue was discovered in Guest.migrate in virt/libvirt/guest.py in OpenStack Nova before 19.3.1, 20.x before 20.3.1, and 21.0.0. By performing a soft reboot of an instance that has previously undergone live migration, a user may gain access to destination host devices that share the same paths as host devices previously referenced by the virtual machine on the source host. This can include block devices that map to different Cinder volumes at the destination than at the source. Only deployments allowing host-based connections (for instance, root and ephemeral devices) are affected. |
CVE-2020-17376
GHSA-c7w7-9c85-4qxv PYSEC-2020-243 |
| VCID-1p1c-fevy-bydg | Insufficient Verification of Data Authenticity It was discovered that the OpenStack Compute (nova) console websocket does not correctly verify the origin header. An attacker could use this flaw to conduct a cross-site websocket hijack attack. Note that only Compute setups with VNC or SPICE enabled were affected by this flaw. |
CVE-2015-0259
GHSA-x8xr-rm9r-7mvf |
| VCID-1qbm-qguj-gkem | OpenStack Nova Filter Scheduler Bypass In OpenStack Nova through 14.0.9, 15.x through 15.0.7, and 16.x through 16.0.2, by rebuilding an instance, an authenticated user may be able to circumvent the Filter Scheduler bypassing imposed filters (for example, the ImagePropertiesFilter or the IsolatedHostsFilter). All setups using Nova Filter Scheduler are affected. Because of the regression described in Launchpad Bug #1732947, the preferred fix is a 14.x version after 14.0.10, a 15.x version after 15.0.8, or a 16.x version after 16.0.3. |
CVE-2017-16239
GHSA-w2wf-cgwh-vpqg |
| VCID-2dpk-ncrc-1fcw | An issue was discovered in OpenStack Nova before 17.0.12, 18.x before 18.2.2, and 19.x before 19.0.2. If an API request from an authenticated user ends in a fault condition due to an external exception, details of the underlying environment may be leaked in the response, and could include sensitive configuration or other data. |
CVE-2019-14433
GHSA-pg64-r7rr-phv8 PYSEC-2019-191 |
| VCID-4475-ffcq-cff8 | Directory traversal vulnerability in virt/disk/api.py in OpenStack Compute (Nova) Folsom (2012.2) and Essex (2012.1), when used over libvirt-based hypervisors, allows remote authenticated users to write arbitrary files to the disk image via a .. (dot dot) in the path attribute of a file element. |
CVE-2012-3360
GHSA-m454-cm7h-rqhh PYSEC-2012-38 |
| VCID-5nfz-1bk3-93fe | OpenStack Nova instance migration process does not stop when instance is deleted OpenStack Compute (nova) 2015.1 through 2015.1.1, 2014.2.3, and earlier does not stop the migration process when the instance is deleted, which allows remote authenticated users to cause a denial of service (disk, network, and other resource consumption) by resizing and then deleting an instance. |
CVE-2015-3241
GHSA-3vx7-xff6-h2vx |
| VCID-5tkb-w761-4qc6 | keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora. |
CVE-2013-2030
GHSA-pxxv-rv32-2qgv PYSEC-2013-45 |
| VCID-5w9q-vw2n-zfdu | OpenStack Nova Denial of Service in network source security groups Algorithmic complexity vulnerability in OpenStack Compute (Nova) before 2013.1.3 and Havana before havana-3 does not properly handle network source security group policy updates, which allows remote authenticated users to cause a denial of service (nova-network consumption) via a large number of server-creation operations, which triggers a large number of update requests. |
CVE-2013-4185
GHSA-ph2h-hh49-vh27 |
| VCID-6n3z-x4zj-4bez | OpenStack Compute (Nova) allows remote attackers to bypass intended restriction A vulnerability was discovered in the way OpenStack Compute (nova) networking handled security group updates; changes were not applied to already running VM instances. A remote attacker could use this flaw to access running VM instances. |
CVE-2015-7713
GHSA-67rh-9p29-vrxr |
| VCID-7wvt-bvww-g7ck | OpenStack Compute (Nova) Resource limit circumvention in Nova private flavors The "create an instance" API in OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not properly enforce the os-flavor-access:is_public property, which allows remote authenticated users to boot arbitrary flavors by guessing the flavor id. NOTE: this issue is due to an incomplete fix for CVE-2013-2256. |
CVE-2013-4278
GHSA-43cm-73px-5v4m |
| VCID-7yp4-ebnm-g3c3 | OpenStack Nova host data access through resize/migration The libvirt driver in OpenStack Compute (Nova) before 2015.1.4 (kilo) and 12.0.x before 12.0.3 (liberty), when using raw storage and use_cow_images is set to false, allows remote authenticated users to read arbitrary files via a crafted qcow2 header in an ephemeral or root disk. |
CVE-2016-2140
GHSA-49jv-37hm-6gfp |
| VCID-9se5-m6dx-8kcj | OpenStack Nova Potential Xen connection password leak via StorageError The volume_utils._parse_volume_info function in OpenStack Compute (Nova) before 2015.1.3 (kilo) and 12.0.x before 12.0.1 (liberty) includes the connection_info dictionary in the StorageError message when using the Xen backend, which might allow attackers to obtain sensitive password information by reading log files or other unspecified vectors. |
CVE-2015-8749
GHSA-c36r-g737-9qp8 |
| VCID-9vq2-2nsa-bbfa | openstack-nova: Nova VMware driver may connect VNC to another tenant's console |
CVE-2014-8750
|
| VCID-az4e-wgmd-gyc3 | OpenStack Compute (Nova) Denial of service due to improper validation of virtual size of QCOW2 image OpenStack Compute (Nova) Folsom, Grizzly, and Havana, when use_cow_images is set to False, does not verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) by transferring an image with a large virtual size that does not contain a large amount of data from Glance. NOTE: this issue is due to an incomplete fix for CVE-2013-2096. |
CVE-2013-4469
GHSA-2w87-5qcj-j6gx |
| VCID-bauj-n7jg-gkd2 | OpenStack Compute (Nova) Denial of Service vulnerability A denial of service flaw was found in the way OpenStack Compute (nova) looked up VM instances based on an IP address filter. An attacker with sufficient privileges on an OpenStack installation with a large amount of VMs could use this flaw to cause the main nova process to block for an extended amount of time. |
CVE-2014-3708
GHSA-43hc-pwvx-pmfg |
| VCID-br4q-499g-vqhg | OpenStack Cinder, glance, and Nova vulnerable to Path Traversal An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. |
CVE-2022-47951
GHSA-7h75-hwxx-qpgc |
| VCID-c7ya-v12e-8bfq | virt/disk/api.py in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), and Diablo (2011.3) allows remote authenticated users to overwrite arbitrary files via a symlink attack on a file in an image. |
CVE-2012-3361
GHSA-cm54-3vvf-f5p8 PYSEC-2012-39 |
| VCID-cwub-w9dp-wfgy | OpenStack Nova DoS by rebuilding the same instance with a new image multiple times An issue was discovered in the default FilterScheduler in OpenStack Nova 16.0.3. By repeatedly rebuilding an instance with new images, an authenticated user may consume untracked resources on a hypervisor host leading to a denial of service, aka doubled resource allocations. This regression was introduced with the fix for OSSA-2017-005 (CVE-2017-16239); however, only Nova stable/pike or later deployments with that fix applied and relying on the default FilterScheduler are affected. |
CVE-2017-17051
GHSA-vq76-rxx3-4r4r |
| VCID-cy7p-gzf8-eqcj | OpenStack Nova Denial of service attack on the compute host An issue was discovered in OpenStack Nova 15.x through 15.1.0 and 16.x through 16.1.1. By detaching and reattaching an encrypted volume, an attacker may access the underlying raw volume and corrupt the LUKS header, resulting in a denial of service attack on the compute host. (The same code error also results in data loss, but that is not a vulnerability because the user loses their own data.) All Nova setups supporting encrypted volumes are affected. |
CVE-2017-18191
GHSA-ffmh-r67w-m88f |
| VCID-dxxx-4thc-fyfh | virt/disk/api.py in OpenStack Compute (Nova) 2012.1.x before 2012.1.2 and Folsom before Folsom-3 allows remote authenticated users to overwrite arbitrary files via a symlink attack on a file in an image that uses a symlink that is only readable by root. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3361. |
CVE-2012-3447
GHSA-xc4g-7vw8-924h PYSEC-2012-21 |
| VCID-e1f1-xt6n-rqfp | OpenStack Nova Exposure of Sensitive Information to an Unauthorized Actor OpenStack Nova before 2012.1 allows someone with access to an EC2_ACCESS_KEY (equivalent to a username) to obtain the EC2_SECRET_KEY (equivalent to a password). Exposing the EC2_ACCESS_KEY via http or tools that allow man-in-the-middle over https could allow an attacker to easily obtain the EC2_SECRET_KEY. An attacker could also presumably brute force values for EC2_ACCESS_KEY. |
CVE-2011-4076
GHSA-vcmv-6rxx-fh7r |
| VCID-e6ne-73mv-73bc | OpenStack Nova vulnerable to unauthorized access to potentially sensitive data In OpenStack Nova before 27.4.1, 28 before 28.2.1, and 29 before 29.1.1, by supplying a raw format image that is actually a crafted QCOW2 image with a backing file path or VMDK flat image with a descriptor file path, an authenticated user may convince systems to return a copy of the referenced file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Nova deployments are affected. NOTE: this issue exists because of an incomplete fix for CVE-2022-47951 and CVE-2024-32498. |
CVE-2024-40767
GHSA-rm86-h44c-2r2m |
| VCID-ek6e-977t-3bew | OpenStack Compute (nova) allows remote authenticated users to cause a denial of service A flaw was found in the way OpenStack Compute (nova) handled the resize state. If an authenticated user deleted an instance while it was in the resize state, it could cause the original instance to not be deleted from the compute node it was running on, allowing the user to cause a denial of service. |
CVE-2015-3280
GHSA-mfmj-gwg3-vhw7 |
| VCID-ekfe-svz5-bbcq | Openstack Compute (Nova) Folsom, 2012.1, and 2011.3 does not limit the number of security group rules, which allows remote authenticated users with certain permissions to cause a denial of service (CPU and hard drive consumption) via a network request that triggers a large number of iptables rules. |
CVE-2012-2101
GHSA-hq3f-9gf7-73r8 PYSEC-2012-36 |
| VCID-ex1j-py3q-93hv | Exposure of Sensitive Information to an Unauthorized Actor api/metadata/handler.py in OpenStack Compute (Nova) before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2, when proxying metadata requests through Neutron, makes it easier for remote attackers to guess instance ID signatures via a brute-force attack that relies on timing differences in responses to instance metadata requests. |
CVE-2014-3517
GHSA-xjmj-p278-4jp5 |
| VCID-h6rd-5p7q-s3gq | OpenStack Cinder, Glance, and Nova vulnerable to arbitrary file access An issue was discovered in OpenStack Cinder through 24.0.0, Glance before 28.0.2, and Nova before 29.0.3. Arbitrary file access can occur via custom QCOW2 external data. By supplying a crafted QCOW2 image that references a specific data file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Cinder and Nova deployments are affected; only Glance deployments with image conversion enabled are affected. |
CVE-2024-32498
GHSA-r4v4-w9pv-6fph |
| VCID-hcsa-vfvp-buax | OpenStack Nova Router metadata queries are not restricted by tenant Interaction error in OpenStack Nova and Neutron before Havana 2013.2.1 and icehouse-1 does not validate the instance ID of the tenant making a request, which allows remote tenants to obtain sensitive metadata by spoofing the device ID that is bound to a port, which is not properly handled by (1) api/metadata/handler.py in Nova and (2) the neutron-metadata-agent (`agent/metadata/agent.py`) in Neutron. |
CVE-2013-6419
GHSA-22w9-j288-8p9w |
| VCID-hd9e-1msb-uqa6 | openstack-cinder: silently access other user's volumes |
CVE-2023-2088
|
| VCID-hgk8-jtvw-9fgb | nova: qpid SSL configuration |
CVE-2013-6491
|
| VCID-hur9-b4y5-euek | OpenStack Compute (Nova) Grizzly, Folsom (2012.2), and Essex (2012.1) does not properly implement a quota for fixed IPs, which allows remote authenticated users to cause a denial of service (resource exhaustion and failure to spawn new instances) via a large number of calls to the addFixedIp function. |
CVE-2013-1838
GHSA-63fq-8fp9-vhwq PYSEC-2013-44 |
| VCID-jdb7-71q5-pfcx | OpenStack Nova logs sensitive context from notification exceptions An issue was discovered in exception_wrapper.py in OpenStack Nova 13.x through 13.1.3, 14.x through 14.0.4, and 15.x through 15.0.1. Legacy notification exception contexts appearing in ERROR level logs may include sensitive information such as account passwords and authorization tokens. |
CVE-2017-7214
GHSA-f4g4-cj8f-3cr9 |
| VCID-jdn1-d4d3-sud7 | The instance rescue mode in OpenStack Compute (Nova) 2013.2 before 2013.2.3 and Icehouse before 2014.1, when using libvirt to spawn images and use_cow_images is set to false, allows remote authenticated users to read certain compute host files by overwriting an instance disk with a crafted image. |
CVE-2014-0134
GHSA-w429-xc55-hc48 PYSEC-2014-112 |
| VCID-k48d-ecqx-m3ed | openstack-nova: May fail to delete images in resize state regression |
CVE-2016-7498
|
| VCID-kncr-vrmh-fygm | The OpenStack Nova (python-nova) package 1:2013.2.3-0 before 1:2013.2.3-0ubuntu1.2 and 1:2014.1-0 before 1:2014.1-0ubuntu1.2 and Openstack Cinder (python-cinder) package 1:2013.2.3-0 before 1:2013.2.3-0ubuntu1.1 and 1:2014.1-0 before 1:2014.1-0ubuntu1.1 for Ubuntu 13.10 and 14.04 LTS does not properly set the sudo configuration, which makes it easier for attackers to gain privileges by leveraging another vulnerability. |
CVE-2013-1068
|
| VCID-kqbu-drg3-fycm | OpenStack Nova denial of service through compressed disk images OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not properly verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) via a compressed QCOW2 image. NOTE: this issue is due to an incomplete fix for CVE-2013-2096. |
CVE-2013-4463
GHSA-5644-2v3h-5w4x |
| VCID-m5vc-4my3-87gk | OpenStack Nova Changing vnic_type breaks compute service restart An issue was discovered in OpenStack Nova before 23.2.2, 24.x before 24.1.2, and 25.x before 25.0.2. By creating a neutron port with the direct vnic_type, creating an instance bound to that port, and then changing the vnic_type of the bound port to macvtap, an authenticated user may cause the compute service to fail to restart, resulting in a possible denial of service. Only Nova deployments configured with SR-IOV are affected. |
CVE-2022-37394
GHSA-v725-c588-h936 |
| VCID-n6d6-1kyd-qufe | OpenStack Compute Nova Improper Access Control The XenAPI backend in OpenStack Compute (Nova) Folsom, Grizzly, and Havana before 2013.2 does not properly apply security groups (1) when resizing an image or (2) during live migration, which allows remote attackers to bypass intended restrictions. |
CVE-2013-4497
GHSA-27q4-38qf-m25h |
| VCID-nb1y-cbzs-abhc | openstack-nova: Unprivileged API user can access host data using instance snapshot |
CVE-2015-7548
|
| VCID-nh9z-sxay-fkdv | The Nova scheduler in OpenStack Compute (Nova) Folsom (2012.2) and Essex (2012.1), when DifferentHostFilter or SameHostFilter is enabled, allows remote authenticated users to cause a denial of service (excessive database lookup calls and server hang) via a request with many repeated IDs in the os:scheduler_hints section. |
CVE-2012-3371
GHSA-xxgm-qpj5-4886 PYSEC-2012-40 |
| VCID-nryd-hrub-cydj | OpenStack Compute (Nova) Folsom before 2012.2.2 and Grizzly, when using libvirt and LVM backed instances, does not properly clear physical volume (PV) content when reallocating for instances, which allows attackers to obtain sensitive information by reading the memory of the previous logical volume (LV). |
CVE-2012-5625
GHSA-rwhr-h69g-8qmq PYSEC-2012-41 |
| VCID-p288-4te1-6qhc | Nova 2011.3 and Essex, when using the OpenStack API, allows remote authenticated users to bypass access restrictions for tenants of other users via an OSAPI request with a modified project_id URI parameter. |
CVE-2012-0030
|
| VCID-q246-vzd6-3qfb | OpenStack Compute (Nova) allows remote authenticated users to gain privileges via API requests The Nova EC2 API security group implementation in OpenStack Compute (Nova) 2013.1 before 2013.2.4 and icehouse before icehouse-rc2 does not enforce RBAC policies for (1) add_rules, (2) remove_rules, (3) destroy, and other unspecified methods in compute/api.py when using non-default policies, which allows remote authenticated users to gain privileges via these API requests. |
CVE-2014-0167
GHSA-p258-xmh3-72pv |
| VCID-q9q9-jegz-pfa2 | OpenStack Nova Multiple directory traversal vulnerabilities Multiple directory traversal vulnerabilities in OpenStack Nova before 2011.3.1, when the EC2 API and the S3/RegisterImage image-registration method are enabled, allow remote authenticated users to overwrite arbitrary files via a crafted (1) tarball or (2) manifest. |
CVE-2011-4596
GHSA-qr62-r9xc-r2gj |
| VCID-qb9p-rpza-5fa5 | OpenStack Compute (Nova) allows remote authenticated users to obtain sensitive information CVE-2013-2256 OpenStack: Nova private flavors resource limit circumvention |
CVE-2013-2256
GHSA-5mj6-643f-2g85 |
| VCID-qe1w-wnfu-mudr | OpenStack: openstack-nova-compute console-log DoS |
CVE-2013-4261
|
| VCID-qfdm-g857-3yb5 | OpenStack Nova can leak consoleauth token into log files An issue was discovered in OpenStack Nova before 18.2.4, 19.x before 19.1.0, and 20.x before 20.1.0. It can leak consoleauth tokens into log files. An attacker with read access to the service's logs may obtain tokens used for console access. All Nova setups using novncproxy are affected. This is related to `NovaProxyRequestHandlerBase.new_websocket_client` in `console/websocketproxy.py`. |
CVE-2015-9543
GHSA-22jm-4hxw-35jf |
| VCID-qnhs-qv3p-myg2 | The VMWare driver in OpenStack Compute (Nova) 2013.2 through 2013.2.2 does not properly put VMs into RESCUE status, which allows remote authenticated users to bypass the quota limit and cause a denial of service (resource consumption) by requesting the VM be put into rescue and then deleting the image. |
CVE-2014-2573
GHSA-jv34-xvjq-ppch PYSEC-2014-113 |
| VCID-r558-z5xb-v3a8 | OpenStack Nova VMware instance leak potentially leading to compute DoS The VMware driver in OpenStack Compute (Nova) before 2014.1.4 allows remote authenticated users to cause a denial of service (disk consumption) by deleting an instance in the resize state. |
CVE-2014-8333
GHSA-g63p-mfcm-54c4 |
| VCID-rqyj-x6hj-g7fp | OpenStack Nova Long server names grow nova-api log files significantly OpenStack Compute (Nova) Essex before 2011.3 allows remote authenticated users to cause a denial of service (Nova-API log file and disk consumption) via a long server name. |
CVE-2012-1585
GHSA-pjvw-p2v5-wf6q |
| VCID-rvp9-etcr-wycj | OpenStack Nova DoS through ephemeral disk backing files The libvirt driver in OpenStack Compute (Nova) before 2013.2.2 and icehouse before icehouse-2 allows remote authenticated users to cause a denial of service (disk consumption) by creating and deleting instances with unique os_type settings, which triggers the creation of a new ephemeral disk backing file. |
CVE-2013-6437
GHSA-hrv9-4x4c-9jc8 |
| VCID-s69v-tc7x-37fe | OpenStack Nova calls qemu-img without format restrictions for resize An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qemu-img without a format restriction, resulting in an unsafe image resize operation that could destroy data on the host system. Only compute nodes using the Flat image backend (usually configured with use_cow_images=False) are affected. |
CVE-2026-24708
GHSA-m4f3-qp2w-gwh6 |
| VCID-sj2k-uq1g-suby | Improper Restriction of Operations within the Bounds of a Memory Buffer CVE-2013-4179 OpenStack: Nova XML entities DoS |
CVE-2013-4179
GHSA-j6xh-q826-55jw |
| VCID-t2sh-b3m5-vyax | OpenStack Compute (Nova) does not verify the virtual size of a QCOW2 image OpenStack Compute (Nova) Folsom, Grizzly, and Havana does not verify the virtual size of a QCOW2 image, which allows local users to cause a denial of service (host file system disk consumption) by creating an image with a large virtual size that does not contain a large amount of data. |
CVE-2013-2096
GHSA-m674-hmx2-ffhq |
| VCID-t88t-p8tx-cfcu | Multiple vulnerabilities have been found in libxml2, allowing remote attackers to execute arbitrary code or cause Denial of Service. |
CVE-2013-1664
GHSA-qrh7-x6fp-c2mp |
| VCID-tbxf-ky56-w7h5 | openstack-nova: Boot from volume allows access to random volumes |
CVE-2013-0208
|
| VCID-v47b-k4qx-h7a2 | OpenStack Nova live snapshots use an insecure local directory OpenStack Compute (Nova) Grizzly 2013.1.4, Havana 2013.2.1, and earlier uses world-writable and world-readable permissions for the temporary directory used to store live snapshots, which allows local users to read and modify live snapshots. |
CVE-2013-7048
GHSA-grp5-h379-j75x |
| VCID-v87z-d6p9-43c5 | The (1) EC2 and (2) OS APIs in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), and Diablo (2011.3) do not properly check the protocol when security groups are created and the network protocol is not specified entirely in lowercase, which allows remote attackers to bypass intended access restrictions. |
CVE-2012-2654
GHSA-46r8-9cj7-pw6g PYSEC-2012-37 |
| VCID-vena-h39k-v3fe | The i_create_images_and_backing (aka create_images_and_backing) method in libvirt driver in OpenStack Compute (Nova) Grizzly, Havana, and Icehouse, when using KVM live block migration, does not properly create all expected files, which allows attackers to obtain snapshot root disk contents of other users via ephemeral storage. |
CVE-2013-7130
GHSA-99rx-9x8v-9j8p PYSEC-2014-111 |
| VCID-wvc4-8zmb-6ucg | Openstack nova qcow format could expose host filesystem information Versions of nova before 2012.1 could expose hypervisor host files to a guest operating system when processing a maliciously constructed qcow filesystem. |
CVE-2011-3147
GHSA-hqfx-4x4w-vmwp |
| VCID-x5k4-dm9d-xkf7 | OpenStack Compute (Nova)'s VMWare driver vulnerable to denial of service CVE-2014-3608 openstack-nova: incomplete fix for CVE-2014-2573, Nova VMware driver still leaks rescued images |
CVE-2014-3608
GHSA-92hc-c226-32q7 |
| VCID-y8va-eyt2-3kfv | OpenStack Compute (nova) Icehouse, Juno and Havana when live migration fails allows local users to access VM volumes that they would normally not have permissions for. |
CVE-2015-2687
GHSA-97fv-22hc-mrgj PYSEC-2017-145 |
| VCID-ykzj-fz7y-eug8 | Trove: potential leak of passwords into log files |
CVE-2014-7230
|
| VCID-z5wc-py2m-6qhz | OpenStack Compute (Nova) Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote authenticated users to gain access to a VM in opportunistic circumstances by using the VNC token for a deleted VM that was bound to the same VNC port. |
CVE-2013-0335
GHSA-qfp8-hfqx-c79c PYSEC-2013-43 |
| VCID-zwuz-pgjz-rkb9 | URL Redirection to Untrusted Site ('Open Redirect') A vulnerability was found in openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL. |
CVE-2021-3654
GHSA-vqp6-j452-j6wp |
| VCID-zy9m-d25c-5uga | OpenStack Cinder, Glance, and Nova contain Uncontrolled Resource Consumption A resource vulnerability in the OpenStack Compute (nova), Block Storage (cinder), and Image (glance) services was found in their use of qemu-img. An unprivileged user could consume as much as 4 GB of RAM on the compute host by uploading a malicious image. This flaw could lead possibly to host out-of-memory errors and negatively affect other running tenant instances. oslo.concurrency has been updated to support process limits ('prlimit'), which is needed to fix this flaw. |
CVE-2015-5162
GHSA-g2j5-7vgx-6xrx |