First published: Thu Jun 25 2015(Updated: )
OpenStack Cinder before 2014.1.5 (icehouse), 2014.2.x before 2014.2.4 (juno), and 2015.1.x before 2015.1.1 (kilo) allows remote authenticated users to read arbitrary files via a crafted qcow2 signature in an image to the upload-to-image command.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/cinder | <7.0.0a0 | 7.0.0a0 |
Ubuntu | =15.04 | |
OpenStack Icehouse | <=2014.1.4 | |
OpenStack Juno | =2014.2 | |
OpenStack Juno | =2014.2.2 | |
OpenStack Juno | =2014.2.3 | |
OpenStack Kilo | =2015.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1851 is classified as a moderately severe vulnerability that potentially allows unauthorized access to files on the server.
To fix CVE-2015-1851, upgrade to Cinder version 7.0.0a0 or later, or apply the appropriate patches for affected OpenStack versions.
CVE-2015-1851 affects users of OpenStack Cinder versions prior to 2014.1.5, 2014.2.x before 2014.2.4, and 2015.1.x before 2015.1.1.
CVE-2015-1851 can be exploited by remote authenticated users using a crafted qcow2 signature in an image during the upload-to-image command.
OpenStack versions Icehouse before 2014.1.5, Juno before 2014.2.4, and Kilo before 2015.1.1 are all impacted by CVE-2015-1851.