Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2022-47951

Published: 27 January 2023

An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data.

Notes

AuthorNote
mdeslaur
image conversion was introduced in glance 17.0.0, so bionic and
earlier are not vulnerable.

Priority

Medium

Cvss 3 Severity Score

5.7

Score breakdown

Status

Package Release Status
cinder
Launchpad, Ubuntu, Debian
bionic
Released (2:12.0.10-0ubuntu2.2)
focal
Released (2:16.4.2-0ubuntu2.1)
jammy
Released (2:20.1.0-0ubuntu1)
kinetic
Released (2:21.1.0-0ubuntu1)
lunar
Released (2:21.1.0+git2023012815.c9e65529-0ubuntu1)
mantic
Released (2:21.1.0+git2023012815.c9e65529-0ubuntu1)
trusty Ignored
(end of standard support)
upstream Needs triage

xenial Needed

glance
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(code not present)
focal
Released (2:20.2.0-0ubuntu1.1)
jammy
Released (2:24.1.0-0ubuntu1.1)
kinetic
Released (2:25.0.0-0ubuntu1.1)
lunar
Released (2:26.0.0~b2+git2023012815.907c5626-0ubuntu1)
mantic
Released (2:26.0.0~b2+git2023012815.907c5626-0ubuntu1)
trusty Ignored
(end of standard support)
upstream Needs triage

xenial Not vulnerable
(code not present)
nova
Launchpad, Ubuntu, Debian
bionic
Released (2:17.0.13-0ubuntu5.2)
focal
Released (2:21.2.4-0ubuntu2.1)
jammy
Released (3:25.1.0-0ubuntu1)
kinetic
Released (3:26.1.0-0ubuntu1)
lunar
Released (3:26.1.0+git2023012815.98daf501-0ubuntu1)
mantic
Released (3:26.1.0+git2023012815.98daf501-0ubuntu1)
trusty Ignored
(end of standard support)
upstream Needs triage

xenial Needed

Severity score breakdown

Parameter Value
Base score 5.7
Attack vector Network
Attack complexity Low
Privileges required Low
User interaction Required
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N