Show plain JSON{"acknowledgement": "This issue was discovered by Gorka Eguileor (Red Hat) and Jan Wasilewski (Atman).", "affected_release": [{"advisory": "RHSA-2023:3161", "cpe": "cpe:/a:redhat:openstack:13::el7", "impact": "important", "package": "openstack-nova-1:17.0.13-41.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 - ELS", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3161", "cpe": "cpe:/a:redhat:openstack:13::el7", "impact": "important", "package": "python-glance-store-0:0.23.1-0.20190916165255.cc7ecc1.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 - ELS", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3161", "cpe": "cpe:/a:redhat:openstack:13::el7", "impact": "important", "package": "python-os-brick-0:2.3.9-12.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 - ELS", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3161", "cpe": "cpe:/a:redhat:openstack:13::el7", "impact": "important", "package": "openstack-nova-1:17.0.13-41.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3161", "cpe": "cpe:/a:redhat:openstack:13::el7", "impact": "important", "package": "python-glance-store-0:0.23.1-0.20190916165255.cc7ecc1.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3161", "cpe": "cpe:/a:redhat:openstack:13::el7", "impact": "important", "package": "python-os-brick-0:2.3.9-12.el7ost", "product_name": "Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3156", "cpe": "cpe:/a:redhat:openstack:16.1::el8", "impact": "important", "package": "openstack-cinder-1:15.4.0-1.20230510003501.58f0e73.el8ost", "product_name": "Red Hat OpenStack Platform 16.1", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3156", "cpe": "cpe:/a:redhat:openstack:16.1::el8", "impact": "important", "package": "openstack-nova-1:20.4.1-1.20221005193232.el8ost", "product_name": "Red Hat OpenStack Platform 16.1", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3156", "cpe": "cpe:/a:redhat:openstack:16.1::el8", "impact": "important", "package": "python-glance-store-0:1.0.2-1.20220219073735.el8ost", "product_name": "Red Hat OpenStack Platform 16.1", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3156", "cpe": "cpe:/a:redhat:openstack:16.1::el8", "impact": "important", "package": "python-os-brick-0:2.10.5-1.20220112193420.634fb4a.el8ost", "product_name": "Red Hat OpenStack Platform 16.1", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3158", "cpe": "cpe:/a:redhat:openstack:16.2::el8", "package": "openstack-cinder-1:15.6.1-2.20230310075425.a19c1c9.el8ost", "product_name": "Red Hat OpenStack Platform 16.2", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3158", "cpe": "cpe:/a:redhat:openstack:16.2::el8", "impact": "important", "package": "openstack-nova-1:20.6.2-2.20230308185149.el8ost", "product_name": "Red Hat OpenStack Platform 16.2", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3158", "cpe": "cpe:/a:redhat:openstack:16.2::el8", "impact": "important", "package": "python-glance-store-0:1.0.2-2.20230309124927.79e043a.el8ost", "product_name": "Red Hat OpenStack Platform 16.2", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3158", "cpe": "cpe:/a:redhat:openstack:16.2::el8", "impact": "important", "package": "python-os-brick-0:2.10.8-2.20220112064936.458bfad.el8ost", "product_name": "Red Hat OpenStack Platform 16.2", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3158", "cpe": "cpe:/a:redhat:openstack:16.2::el8", "impact": "important", "package": "tripleo-ansible-0:0.8.1-2.20230309004941.el8ost", "product_name": "Red Hat OpenStack Platform 16.2", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3157", "cpe": "cpe:/a:redhat:openstack:17.0::el9", "impact": "important", "package": "openstack-cinder-1:18.2.1-0.20230509200451.1776695.el9ost", "product_name": "Red Hat OpenStack Platform 17.0", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3157", "cpe": "cpe:/a:redhat:openstack:17.0::el9", "impact": "important", "package": "openstack-nova-1:23.2.2-0.20221209190754.7074ac0.el9ost", "product_name": "Red Hat OpenStack Platform 17.0", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3157", "cpe": "cpe:/a:redhat:openstack:17.0::el9", "impact": "important", "package": "python-glance-store-0:2.5.1-0.20230509140449.5f1cee6.el9ost", "product_name": "Red Hat OpenStack Platform 17.0", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3157", "cpe": "cpe:/a:redhat:openstack:17.0::el9", "impact": "important", "package": "python-os-brick-0:4.3.3-0.20220715140803.d09dc9e.el9ost", "product_name": "Red Hat OpenStack Platform 17.0", "release_date": "2023-05-17T00:00:00Z"}, {"advisory": "RHSA-2023:3157", "cpe": "cpe:/a:redhat:openstack:17.0::el9", "impact": "important", "package": "tripleo-ansible-0:3.3.1-0.20221208161844.fa5422f.el9ost", "product_name": "Red Hat OpenStack Platform 17.0", "release_date": "2023-05-17T00:00:00Z"}], "bugzilla": {"description": "openstack-cinder: silently access other user's volumes", "id": "2179587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179587"}, "csaw": false, "cvss3": {"cvss3_base_score": "9.1", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "status": "verified"}, "cwe": "CWE-440->CWE-200", "details": ["A flaw was found in OpenStack due to an inconsistency between Cinder and Nova. This issue can be triggered intentionally or by accident. A remote, authenticated attacker could exploit this vulnerability by detaching one of their volumes from Cinder. The highest impact is to confidentiality.", "A flaw was found in OpenStack due to an inconsistency between Cinder and Nova. This issue can be triggered intentionally or by accident. A remote, authenticated attacker could exploit this vulnerability by detaching one of their volumes from Cinder. The highest impact is to confidentiality."], "mitigation": {"lang": "en:us", "value": "Red Hat OpenStack Platform 13: https://access.redhat.com/solutions/7012184\nRed Hat OpenStack Platform 16 and newer: https://access.redhat.com/solutions/7012327"}, "name": "CVE-2023-2088", "package_state": [{"cpe": "cpe:/a:redhat:openstack:13", "fix_state": "Will not fix", "package_name": "openstack-cinder", "product_name": "Red Hat OpenStack Platform 13 (Queens)"}, {"cpe": "cpe:/a:redhat:openstack:16.1", "fix_state": "Not affected", "impact": "important", "package_name": "tripleo-ansible", "product_name": "Red Hat OpenStack Platform 16.1"}], "public_date": "2023-05-10T14:30:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2023-2088\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-2088\nhttps://bugs.launchpad.net/bugs/2004555\nhttps://github.com/advisories/GHSA-fvf4-jv3j-73mq\nhttps://security.openstack.org/ossa/OSSA-2023-003.html"], "statement": "There are two ways this flaw can be triggered:\nIntentional Type - A malicious user could use Cinder to detach their own volume. As Nova is not made aware of the situation, it might later grant the attacker access to a new volume of another user (later referred to as victim). As there are very little restrictions on how often this can be triggered and the victim might not have any way to identify if their volumes have been compromised, the impact to Cinder has been rated Critical. \nAccident Type - This can occur if communication between Nova and Cinder is interrupted during a volume detachment process. A potential attacker seeking to exploit this type would need real-time access to logs and the ability to tamper with the private network. Due to these significant restrictions against triggering the vulnerability, components affected by this type are rated as Important.\nWithin Red Hat OpenStack Platform 13, it is not possible to eliminate the intentional type by code changes alone. Changes to policy and configuration are also required to restrict this vector. For details read the KCS article linked in the mitigation section.", "threat_severity": "Critical"}