CVE-2015-2687

OpenStack Compute (nova) Icehouse, Juno and Havana when live migration fails allows local users to access VM volumes that they would normally not have permissions for.
References
Link Resource
http://www.openwall.com/lists/oss-security/2015/03/24/10 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/03/25/3 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/77505 Third Party Advisory VDB Entry
https://bugs.launchpad.net/nova/+bug/1419577 Issue Tracking Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1205313 Issue Tracking Third Party Advisory VDB Entry
https://review.openstack.org/#/c/338929/ Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/03/24/10 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2015/03/25/3 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/77505 Third Party Advisory VDB Entry
https://bugs.launchpad.net/nova/+bug/1419577 Issue Tracking Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1205313 Issue Tracking Third Party Advisory VDB Entry
https://review.openstack.org/#/c/338929/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:openstack:compute:2013.2:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2013.2.1:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2013.2.2:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2013.2.3:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2013.2.4:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2014.1:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2014.1.1:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2014.1.2:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2014.1.3:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2014.1.4:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2014.1.5:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2014.2:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2014.2.1:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2014.2.2:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2014.2.3:*:*:*:*:*:*:*
cpe:2.3:a:openstack:compute:2014.2.4:*:*:*:*:*:*:*

History

21 Nov 2024, 02:27

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2015/03/24/10 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2015/03/24/10 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2015/03/25/3 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2015/03/25/3 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/77505 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/77505 - Third Party Advisory, VDB Entry
References () https://bugs.launchpad.net/nova/+bug/1419577 - Issue Tracking, Third Party Advisory, VDB Entry () https://bugs.launchpad.net/nova/+bug/1419577 - Issue Tracking, Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1205313 - Issue Tracking, Third Party Advisory, VDB Entry () https://bugzilla.redhat.com/show_bug.cgi?id=1205313 - Issue Tracking, Third Party Advisory, VDB Entry
References () https://review.openstack.org/#/c/338929/ - Third Party Advisory () https://review.openstack.org/#/c/338929/ - Third Party Advisory

Information

Published : 2017-08-09 18:29

Updated : 2024-11-21 02:27


NVD link : CVE-2015-2687

Mitre link : CVE-2015-2687

CVE.ORG link : CVE-2015-2687


JSON object : View

Products Affected

openstack

  • compute
CWE
CWE-284

Improper Access Control