Bug 1231816 (CVE-2015-1850)
Summary: | CVE-2015-1850 openstack-nova: Host file disclosure through qcow2 backing file | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vasyl Kaigorodov <vkaigoro> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | abaron, akscram, alexander.sakhnov, aortega, apevec, apevec, ayoung, berrange, bfilippov, carnil, chrisw, dallan, dasmith, davidx, eglynn, gkotton, gmollett, itamar, jjoyce, jonathansteffan, jose.castro.leon, jschluet, kbasil, kchamart, lhh, lpeer, markmc, mburns, mlvov, mmagr, p, rbryant, rk, sbauza, sclewis, sferdjao, sgordon, slinaber, slong, srevivo, tdecacqu, vladanovic, vromanso |
Target Milestone: | --- | Keywords: | Reopened, Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
A flaw was found in how the OpenStack Compute (nova) service handles the qemu-img functionality during a snapshot upload. An authenticated attacker could possibly use this flaw to trick Compute into disclosing any file to which the Compute service user has access. However, it is unlikely that the code path can currently be exploited by an attacker.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2017-12-19 01:04:50 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1231819, 1231820, 1232929, 1232930, 1232931, 1232932 | ||
Bug Blocks: | 1231818 |
Description
Vasyl Kaigorodov
2015-06-15 12:48:15 UTC
Created openstack-nova tracking bugs for this issue: Affects: fedora-all [bug 1231819] Affects: openstack-rdo [bug 1231820] Statement: Red Hat Product Security has rated this issue as having Low security impact in all supported versions of Red Hat Enterprise Linux OpenStack Platform. While this issue is present, we do not believe the code path is currently reachable in an attacker exploitable fashion. A future update may address this flaw. |