First published: Tue Jan 31 2023(Updated: )
Guillaume Espanel, Pierre Libeau, Arnaud Morin, and Damien Rannou discovered that Cinder incorrectly handled VMDK image processing. An authenticated attacker could possibly supply a specially crafted VMDK flat image and obtain arbitrary files from the server containing sensitive information.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python3-cinder | <2:21.1.0-0ubuntu1 | 2:21.1.0-0ubuntu1 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/python3-cinder | <2:20.1.0-0ubuntu1 | 2:20.1.0-0ubuntu1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/python3-cinder | <2:16.4.2-0ubuntu2.1 | 2:16.4.2-0ubuntu2.1 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-5835-1 is classified as a high severity vulnerability due to the potential for an authenticated attacker to access sensitive information.
To fix USN-5835-1, you should upgrade to the latest patched version of python3-cinder listed in the advisory for your Ubuntu version.
USN-5835-1 affects Ubuntu versions 22.10, 22.04, and 20.04 that have specific versions of python3-cinder installed.
The vulnerability in USN-5835-1 involves improper handling of VMDK image processing which may lead to unauthorized file access.
The vulnerability in USN-5835-1 was discovered by researchers Guillaume Espanel, Pierre Libeau, Arnaud Morin, and Damien Rannou.