Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 12 Jan 2016 10:07:25 -0800
From: Grant Murphy <grant.murphy@....com>
To: oss-security@...ts.openwall.com
Subject: [OSSA 2016-002] Xen connection password leak in logs via
 StorageError (CVE-2015-8749)

====================================================================
OSSA-2016-002: Xen connection password leak in logs via StorageError
====================================================================

:Date: January 11, 2016
:CVE: CVE-2015-8749


Affects
~~~~~~~
- Nova: >=2014.2 <= 2015.1.2, == 12.0.0


Description
~~~~~~~~~~~
Matt Riedemann from IBM reported an information disclosure
vulnerability in Nova. If a StorageError occurs when attempting to
connect a volume using the Xen API, the connection parameters will be
logged. These parameters may include credentials that are not masked.
An attacker with read access to Nova logs could use these credentials
with the Xen API directly. Only Nova deployments using the Xen backend
are affected by this flaw.


Patches
~~~~~~~
- https://review.openstack.org/249239 (Kilo)
- https://review.openstack.org/247825 (Liberty)
- https://review.openstack.org/245987 (Mitaka)


Credits
~~~~~~~
- Matt Riedemann from IBM (CVE-2015-8749)


References
~~~~~~~~~~
- https://bugs.launchpad.net/bugs/1516765
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8749


Notes
~~~~~
- This fix will be included in future 2015.1.3 (kilo) and 12.0.1
  (liberty) releases.

Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.