A vulnerability in VMDK image processing for Cinder, Glance, and Nova. By supplying a specially created VMDK flat image which references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server resulting in unauthorized access to potentially sensitive data. All Cinder deployments are affected; only Glance deployments with image conversion enabled are affected; all Nova deployments are affected.
Created openstack-cinder tracking bugs for this issue: Affects: openstack-rdo [bug 2164304] Created openstack-glance tracking bugs for this issue: Affects: openstack-rdo [bug 2164303] Created openstack-nova tracking bugs for this issue: Affects: openstack-rdo [bug 2164302]
This issue has been addressed in the following products: Red Hat OpenStack Platform 17.0 Via RHSA-2023:1015 https://access.redhat.com/errata/RHSA-2023:1015
This issue has been addressed in the following products: Red Hat OpenStack Platform 17.0 Via RHSA-2023:1016 https://access.redhat.com/errata/RHSA-2023:1016
This issue has been addressed in the following products: Red Hat OpenStack Platform 17.0 Via RHSA-2023:1017 https://access.redhat.com/errata/RHSA-2023:1017
This issue has been addressed in the following products: Red Hat OpenStack Platform 13.0 - ELS Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS Red Hat OpenStack Platform 16.1 Red Hat OpenStack Platform 16.2 Via RHSA-2023:1278 https://access.redhat.com/errata/RHSA-2023:1278
This issue has been addressed in the following products: Red Hat OpenStack Platform 13.0 - ELS Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS Red Hat OpenStack Platform 16.1 Red Hat OpenStack Platform 16.2 Via RHSA-2023:1279 https://access.redhat.com/errata/RHSA-2023:1279
This issue has been addressed in the following products: Red Hat OpenStack Platform 13.0 - ELS Red Hat OpenStack Platform 13.0 (Queens) for RHEL 7.6 EUS Red Hat OpenStack Platform 16.1 Red Hat OpenStack Platform 16.2 Via RHSA-2023:1280 https://access.redhat.com/errata/RHSA-2023:1280
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-47951