=====================================================================
OSSA-2015-011: Cinder host file disclosure through qcow2 backing file
=====================================================================
:Date: June 16, 2015
:CVE: CVE-2015-1850
Affects
~~~~~~~
- Cinder: versions through 2014.1.4,
and 2014.2 versions through 2014.2.3,
and version 2015.1.0
Description
~~~~~~~~~~~
Bastian Blank from credativ reported a vulnerability in Cinder. By
overwriting an image with a malicious qcow2 header, an authenticated
user may mislead Cinder upload-to-image action, resulting in
disclosure of any file from the Cinder server. All Cinder setups are
affected.
Patches
~~~~~~~
- https://review.openstack.org/191871 (Icehouse)
- https://review.openstack.org/191865 (Juno)
- https://review.openstack.org/191786 (Kilo)
- https://review.openstack.org/191785 (Liberty)
Credits
~~~~~~~
- Bastian Blank from Credativ (CVE-2015-1850)
References
~~~~~~~~~~
- https://launchpad.net/bugs/1415087
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1850
Notes
~~~~~
- This fix will be included in future 2014.1.5 (icehouse), 2014.2.4
(juno) and 2015.1.1 (kilo) releases.
--
Tristan Cacqueray
OpenStack Vulnerability Management Team
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 473 bytes
Desc: OpenPGP digital signature
URL: <http://lists.openstack.org/pipermail/openstack-announce/attachments/20150616/72c9f57f/attachment.pgp>