CVE-2015-1851 – openstack-cinder: Host file disclosure through qcow2 backing file
https://notcve.org/view.php?id=CVE-2015-1851
OpenStack Cinder before 2014.1.5 (icehouse), 2014.2.x before 2014.2.4 (juno), and 2015.1.x before 2015.1.1 (kilo) allows remote authenticated users to read arbitrary files via a crafted qcow2 signature in an image to the upload-to-image command. OpenStack Cinder anterior a 2014.1.5 (icehouse), 2014.2.x anterior a 2014.2.4 (juno), y 2015.1.x anterior a 2015.1.1 (kilo) permite a usuarios remotos autenticados leer ficheros arbitrarios a través de una firma qcow2 manipulada en una imagen en el comando 'subir a imagen' (upload-to-image). A flaw was found in the OpenStack Block Storage (cinder) upload-to-image functionality. When processing a malicious qcow2 header, cinder could be tricked into reading an arbitrary file from the cinder host. • http://lists.openstack.org/pipermail/openstack-announce/2015-June/000367.html http://rhn.redhat.com/errata/RHSA-2015-1206.html http://www.debian.org/security/2015/dsa-3292 http://www.openwall.com/lists/oss-security/2015/06/13/1 http://www.openwall.com/lists/oss-security/2015/06/17/2 http://www.openwall.com/lists/oss-security/2015/06/17/7 http://www.ubuntu.com/usn/USN-2703-1 https://bugs.launchpad.net/cinder/+bug/1415087 https://access.redhat.com/sec • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2014-0162 – openstack-glance: remote code execution in Glance Sheepdog backend
https://notcve.org/view.php?id=CVE-2014-0162
The Sheepdog backend in OpenStack Image Registry and Delivery Service (Glance) 2013.2 before 2013.2.4 and icehouse before icehouse-rc2 allows remote authenticated users with permission to insert or modify an image to execute arbitrary commands via a crafted location. El backend Sheepdog en OpenStack Image Registry and Delivery Service (Glance) 2013.2 anterior a 2013.2.4 y icehouse anterior a icehouse-rc2 permite a usuarios remotos autenticados con permiso insertar o modificar un imagen para ejecutar comandos arbitrarios a través de una localización manipulada. • http://rhn.redhat.com/errata/RHSA-2014-0455.html http://www.openwall.com/lists/oss-security/2014/04/10/13 http://www.ubuntu.com/usn/USN-2193-1 https://launchpad.net/bugs/1298698 https://access.redhat.com/security/cve/CVE-2014-0162 https://bugzilla.redhat.com/show_bug.cgi?id=1085163 • CWE-20: Improper Input Validation CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2014-0167 – openstack-nova: RBAC policy not properly enforced in Nova EC2 API
https://notcve.org/view.php?id=CVE-2014-0167
The Nova EC2 API security group implementation in OpenStack Compute (Nova) 2013.1 before 2013.2.4 and icehouse before icehouse-rc2 does not enforce RBAC policies for (1) add_rules, (2) remove_rules, (3) destroy, and other unspecified methods in compute/api.py when using non-default policies, which allows remote authenticated users to gain privileges via these API requests. En la implementación del grupo de seguridad Nova EC2 API en OpenStack Compute (Nova) 2013.1 anterior a 2013.2.4 y icehouse anteior icehouse-rc2 no fuerza políticas RBAC para (1) add_rules, (2) remove_rules, (3) destroy, y otros métodos no especificados en compute/api.py cuando hace uso de políticas no por defecto, lo que permite a los usuarios remotos autenticados obtener privilegios a través de estas peticiones API. It was found that RBAC policies were not enforced in certain methods of the OpenStack Compute EC2 (Amazon Elastic Compute Cloud) API. A remote attacker could use this flaw to escalate their privileges beyond the user group they were originally restricted to. Note that only certain setups using non-default RBAC rules for OpenStack Compute were affected. • http://www.openwall.com/lists/oss-security/2014/04/09/26 http://www.ubuntu.com/usn/USN-2247-1 https://launchpad.net/bugs/1290537 https://access.redhat.com/security/cve/CVE-2014-0167 https://bugzilla.redhat.com/show_bug.cgi?id=1084868 • CWE-264: Permissions, Privileges, and Access Controls CWE-862: Missing Authorization •
CVE-2013-7130 – nova: Live migration can leak root disk into ephemeral storage
https://notcve.org/view.php?id=CVE-2013-7130
The i_create_images_and_backing (aka create_images_and_backing) method in libvirt driver in OpenStack Compute (Nova) Grizzly, Havana, and Icehouse, when using KVM live block migration, does not properly create all expected files, which allows attackers to obtain snapshot root disk contents of other users via ephemeral storage. El método i_create_images_and_backing (también conocido como create_images_and_backing) en el driver libvirt en OpenStack Compute (Nova) Grizzly, Havana, and Icehouse, cuando hace uso de un bloque de migración KVM en vivo, no crea debidamente todos los archivos esperados, lo que permite a atacantes obtener contenido de una instantánea del disco raíz de otros usuarios a través del almacenamiento efímero. • http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127732.html http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127735.html http://osvdb.org/102416 http://rhn.redhat.com/errata/RHSA-2014-0231.html http://secunia.com/advisories/56450 http://www.openwall.com/lists/oss-security/2014/01/23/5 http://www.securityfocus.com/bid/65106 http://www.ubuntu.com/usn/USN-2247-1 https://bugs.launchpad.net/nova/+bug/1251590 https://exchange.xfo • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •