Date: Tue, 12 Jan 2016 10:07:25 -0800 From: Grant Murphy <grant.murphy@....com> To: oss-security@...ts.openwall.com Subject: [OSSA 2016-002] Xen connection password leak in logs via StorageError (CVE-2015-8749) ==================================================================== OSSA-2016-002: Xen connection password leak in logs via StorageError ==================================================================== :Date: January 11, 2016 :CVE: CVE-2015-8749 Affects ~~~~~~~ - Nova: >=2014.2 <= 2015.1.2, == 12.0.0 Description ~~~~~~~~~~~ Matt Riedemann from IBM reported an information disclosure vulnerability in Nova. If a StorageError occurs when attempting to connect a volume using the Xen API, the connection parameters will be logged. These parameters may include credentials that are not masked. An attacker with read access to Nova logs could use these credentials with the Xen API directly. Only Nova deployments using the Xen backend are affected by this flaw. Patches ~~~~~~~ - https://review.openstack.org/249239 (Kilo) - https://review.openstack.org/247825 (Liberty) - https://review.openstack.org/245987 (Mitaka) Credits ~~~~~~~ - Matt Riedemann from IBM (CVE-2015-8749) References ~~~~~~~~~~ - https://bugs.launchpad.net/bugs/1516765 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8749 Notes ~~~~~ - This fix will be included in future 2015.1.3 (kilo) and 12.0.1 (liberty) releases. Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.