CVE-2014-3559

The oVirt storage backend in Red Hat Enterprise Virtualization 3.4 does not wipe memory snapshots when deleting a VM, even when wipe-after-delete (WAD) is configured for the VM's disk, which allows remote authenticated users with certain credentials to read portions of the deleted VM's memory and obtain sensitive information via an uninitialized storage volume.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:enterprise_virtualization:3.4:*:*:*:*:*:*:*

History

21 Nov 2024, 02:08

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2014-1002.html - Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2014-1002.html - Vendor Advisory
References () http://www.securitytracker.com/id/1030664 - () http://www.securitytracker.com/id/1030664 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1121925 - () https://bugzilla.redhat.com/show_bug.cgi?id=1121925 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/95098 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/95098 -

Information

Published : 2014-08-06 19:55

Updated : 2024-11-21 02:08


NVD link : CVE-2014-3559

Mitre link : CVE-2014-3559

CVE.ORG link : CVE-2014-3559


JSON object : View

Products Affected

redhat

  • enterprise_virtualization
CWE
CWE-264

Permissions, Privileges, and Access Controls