ALT-PU-2024-9720-7
Package openstack-nova updated to version 27.1.0-alt1.p10 for branch c10f1 in task 352372.
Closed vulnerabilities
BDU:2023-00689
Уязвимость сервиса блочного хранения данных Openstack Cinder, связанная с использованием файлов и каталогов, доступных внешним сторонам, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2015-9543
An issue was discovered in OpenStack Nova before 18.2.4, 19.x before 19.1.0, and 20.x before 20.1.0. It can leak consoleauth tokens into log files. An attacker with read access to the service's logs may obtain tokens used for console access. All Nova setups using novncproxy are affected. This is related to NovaProxyRequestHandlerBase.new_websocket_client in console/websocketproxy.py.
- [oss-security] 20200219 [OSSA-2020-001] Nova can leak consoleauth token into log files (CVE-2015-9543)
- [oss-security] 20200219 [OSSA-2020-001] Nova can leak consoleauth token into log files (CVE-2015-9543)
- https://launchpad.net/bugs/1492140
- https://launchpad.net/bugs/1492140
- https://review.opendev.org/220622
- https://review.opendev.org/220622
- https://security.openstack.org/ossa/OSSA-2020-001.html
- https://security.openstack.org/ossa/OSSA-2020-001.html
Modified: 2024-11-21
CVE-2020-17376
An issue was discovered in Guest.migrate in virt/libvirt/guest.py in OpenStack Nova before 19.3.1, 20.x before 20.3.1, and 21.0.0. By performing a soft reboot of an instance that has previously undergone live migration, a user may gain access to destination host devices that share the same paths as host devices previously referenced by the virtual machine on the source host. This can include block devices that map to different Cinder volumes at the destination than at the source. Only deployments allowing host-based connections (for instance, root and ephemeral devices) are affected.
Modified: 2024-11-21
CVE-2021-3654
A vulnerability was found in openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL.
- https://bugs.launchpad.net/nova/+bug/1927677
- https://bugs.launchpad.net/nova/+bug/1927677
- https://bugs.python.org/issue32084
- https://bugs.python.org/issue32084
- https://bugzilla.redhat.com/show_bug.cgi?id=1961439
- https://bugzilla.redhat.com/show_bug.cgi?id=1961439
- https://opendev.org/openstack/nova/commit/04d48527b62a35d912f93bc75613a6cca606df66
- https://opendev.org/openstack/nova/commit/04d48527b62a35d912f93bc75613a6cca606df66
- https://opendev.org/openstack/nova/commit/8906552cfc2525a44251d4cf313ece61e57251eb
- https://opendev.org/openstack/nova/commit/8906552cfc2525a44251d4cf313ece61e57251eb
- GLSA-202305-02
- GLSA-202305-02
- https://security.openstack.org/ossa/OSSA-2021-002.html
- https://security.openstack.org/ossa/OSSA-2021-002.html
- https://www.openwall.com/lists/oss-security/2021/07/29/2
- https://www.openwall.com/lists/oss-security/2021/07/29/2
Modified: 2024-11-21
CVE-2022-37394
An issue was discovered in OpenStack Nova before 23.2.2, 24.x before 24.1.2, and 25.x before 25.0.2. By creating a neutron port with the direct vnic_type, creating an instance bound to that port, and then changing the vnic_type of the bound port to macvtap, an authenticated user may cause the compute service to fail to restart, resulting in a possible denial of service. Only Nova deployments configured with SR-IOV are affected.
- https://bugs.launchpad.net/ossa/+bug/1981813
- https://review.opendev.org/c/openstack/nova/+/849985
- https://review.opendev.org/c/openstack/nova/+/850003
- https://bugs.launchpad.net/ossa/+bug/1981813
- https://review.opendev.org/c/openstack/nova/+/850003
- https://review.opendev.org/c/openstack/nova/+/849985
Modified: 2025-03-31
CVE-2022-47951
An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data.
- https://launchpad.net/bugs/1996188
- https://launchpad.net/bugs/1996188
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3300-1] glance security update
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3300-1] glance security update
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3301-1] cinder security update
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3301-1] cinder security update
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3302-1] nova security update
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3302-1] nova security update
- https://security.openstack.org/ossa/OSSA-2023-002.html
- https://security.openstack.org/ossa/OSSA-2023-002.html
- DSA-5336
- DSA-5336
- DSA-5337
- DSA-5337
- DSA-5338
- DSA-5338