In OpenStack Nova before 27.4.1, 28 before 28.2.1, and 29 before 29.1.1, by supplying a raw format image that is actually a crafted QCOW2 image with a backing file path or VMDK flat image with a descriptor file path, an authenticated user may convince systems to return a copy of the referenced file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Nova deployments are affected. NOTE: this issue exists because of an incomplete fix for CVE-2022-47951 and CVE-2024-32498.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 08 Aug 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:openstack:16.1::el8 |
Thu, 08 Aug 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:openstack:16.2::el8 |
Wed, 07 Aug 2024 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat openstack |
|
CPEs | cpe:/a:redhat:openstack:17.1::el9 | |
Vendors & Products |
Redhat
Redhat openstack |

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-30T14:21:59.316Z
Reserved: 2024-07-10T00:00:00
Link: CVE-2024-40767

Updated: 2024-08-02T04:39:54.912Z

Status : Modified
Published: 2024-07-24T05:15:12.907
Modified: 2024-11-21T09:31:35.113
Link: CVE-2024-40767
