CVE-2022-47951
Published: 27 January 2023
An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data.
Notes
Author | Note |
---|---|
mdeslaur | image conversion was introduced in glance 17.0.0, so bionic and earlier are not vulnerable. |
Priority
Status
Package | Release | Status |
---|---|---|
cinder Launchpad, Ubuntu, Debian |
lunar |
Released
(2:21.1.0+git2023012815.c9e65529-0ubuntu1)
|
bionic |
Released
(2:12.0.10-0ubuntu2.2)
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Needs triage
|
|
xenial |
Needed
|
|
focal |
Released
(2:16.4.2-0ubuntu2.1)
|
|
jammy |
Released
(2:20.1.0-0ubuntu1)
|
|
kinetic |
Released
(2:21.1.0-0ubuntu1)
|
|
mantic |
Released
(2:21.1.0+git2023012815.c9e65529-0ubuntu1)
|
|
glance Launchpad, Ubuntu, Debian |
kinetic |
Released
(2:25.0.0-0ubuntu1.1)
|
lunar |
Released
(2:26.0.0~b2+git2023012815.907c5626-0ubuntu1)
|
|
bionic |
Not vulnerable
(code not present)
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Needs triage
|
|
xenial |
Not vulnerable
(code not present)
|
|
focal |
Released
(2:20.2.0-0ubuntu1.1)
|
|
jammy |
Released
(2:24.1.0-0ubuntu1.1)
|
|
mantic |
Released
(2:26.0.0~b2+git2023012815.907c5626-0ubuntu1)
|
|
nova Launchpad, Ubuntu, Debian |
focal |
Released
(2:21.2.4-0ubuntu2.1)
|
jammy |
Released
(3:25.1.0-0ubuntu1)
|
|
kinetic |
Released
(3:26.1.0-0ubuntu1)
|
|
lunar |
Released
(3:26.1.0+git2023012815.98daf501-0ubuntu1)
|
|
bionic |
Released
(2:17.0.13-0ubuntu5.2)
|
|
trusty |
Ignored
(end of standard support)
|
|
upstream |
Needs triage
|
|
xenial |
Needed
|
|
mantic |
Released
(3:26.1.0+git2023012815.98daf501-0ubuntu1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.7 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47951
- https://security.openstack.org/ossa/OSSA-2023-002.html
- https://ubuntu.com/security/notices/USN-5835-1
- https://ubuntu.com/security/notices/USN-5835-2
- https://ubuntu.com/security/notices/USN-5835-3
- https://ubuntu.com/security/notices/USN-5835-4
- https://ubuntu.com/security/notices/USN-5835-5
- NVD
- Launchpad
- Debian