CVE-2024-40767: OpenStack Nova vulnerable to unauthorized access to potentially sensitive data
(updated )
In OpenStack Nova before 27.4.1, 28 before 28.2.1, and 29 before 29.1.1, by supplying a raw format image that is actually a crafted QCOW2 image with a backing file path or VMDK flat image with a descriptor file path, an authenticated user may convince systems to return a copy of the referenced file’s contents from the server, resulting in unauthorized access to potentially sensitive data. All Nova deployments are affected. NOTE: this issue exists because of an incomplete fix for CVE-2022-47951 and CVE-2024-32498.
References
- github.com/advisories/GHSA-rm86-h44c-2r2m
- github.com/openstack/nova
- launchpad.net/bugs/2071734
- lists.debian.org/debian-lts-announce/2024/09/msg00017.html
- nvd.nist.gov/vuln/detail/CVE-2024-40767
- review.opendev.org/c/openstack/nova/+/924731
- security.openstack.org/
- security.openstack.org/ossa/OSSA-2024-002.html
- www.openwall.com/lists/oss-security/2024/07/23/2
Code Behaviors & Features
Detect and mitigate CVE-2024-40767 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →