First published: Tue Jan 31 2023(Updated: )
Guillaume Espanel, Pierre Libeau, Arnaud Morin, and Damien Rannou discovered that Nova incorrectly handled VMDK image processing. An authenticated attacker could possibly supply a specially crafted VMDK flat image and obtain arbitrary files from the server containing sensitive information.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/nova-common | <3:26.1.0-0ubuntu1 | 3:26.1.0-0ubuntu1 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/python3-nova | <3:26.1.0-0ubuntu1 | 3:26.1.0-0ubuntu1 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/nova-common | <3:25.1.0-0ubuntu1 | 3:25.1.0-0ubuntu1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/python3-nova | <3:25.1.0-0ubuntu1 | 3:25.1.0-0ubuntu1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/nova-common | <2:21.2.4-0ubuntu2.1 | 2:21.2.4-0ubuntu2.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/python3-nova | <2:21.2.4-0ubuntu2.1 | 2:21.2.4-0ubuntu2.1 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-5835-3 is categorized as high due to the potential for an authenticated attacker to exploit the vulnerability.
To fix USN-5835-3, upgrade to the appropriate package versions specified in the advisory for your Ubuntu release.
The impact of USN-5835-3 allows an authenticated attacker to read arbitrary files from the server which may contain sensitive information.
USN-5835-3 affects Ubuntu 22.10, 22.04, and 20.04 with specific versions of nova-common and python3-nova.
The USN-5835-3 vulnerability was discovered by Guillaume Espanel, Pierre Libeau, Arnaud Morin, and Damien Rannou.