nova@23.0.1 vulnerabilities

Cloud computing fabric controller

Direct Vulnerabilities

Known vulnerabilities in the nova package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Exposure of Sensitive Information to an Unauthorized Actor

nova is an OpenStack Nova provides a cloud computing fabric controller, supporting a wide variety of compute technologies, including: libvirt (KVM, Xen, LXC and more), Hyper-V, VMware, XenServer, OpenStack Ironic and PowerVM.

Affected versions of this package are vulnerable to Exposure of Sensitive Information to an Unauthorized Actor due to improper input validation. An attacker can access sensitive data by supplying a specially crafted image that masquerades as a different format, which then references files on the server.

How to fix Exposure of Sensitive Information to an Unauthorized Actor?

Upgrade nova to version 29.2.0 or higher.

[,29.2.0)
  • C
Improper Input Validation

nova is an OpenStack Nova provides a cloud computing fabric controller, supporting a wide variety of compute technologies, including: libvirt (KVM, Xen, LXC and more), Hyper-V, VMware, XenServer, OpenStack Ironic and PowerVM.

Affected versions of this package are vulnerable to Improper Input Validation in QCOW2 image processing. An authenticated user may convince systems to return a copy of that file's contents from the server resulting in unauthorized access to potentially sensitive data and unbounded memory/CPU consumption.

Note: All Cinder deployments are affected; only Glance deployments with image conversion enabled are affected; all Nova deployments are affected.

How to fix Improper Input Validation?

Upgrade nova to version 27.4.0, 28.2.0, 29.1.0 or higher.

[,27.4.0) [28.0.0,28.2.0) [29.0.0,29.1.0)
  • M
Information Exposure

nova is an OpenStack Nova provides a cloud computing fabric controller, supporting a wide variety of compute technologies, including: libvirt (KVM, Xen, LXC and more), Hyper-V, VMware, XenServer, OpenStack Ironic and PowerVM.

Affected versions of this package are vulnerable to Information Exposure when supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data.

How to fix Information Exposure?

Upgrade nova to version 26.1.0 or higher.

[0,26.1.0)
  • M
Denial of Service (DoS)

nova is an OpenStack Nova provides a cloud computing fabric controller, supporting a wide variety of compute technologies, including: libvirt (KVM, Xen, LXC and more), Hyper-V, VMware, XenServer, OpenStack Ironic and PowerVM.

Affected versions of this package are vulnerable to Denial of Service (DoS) by creating a neutron port with the direct vnic_type, then creating an instance bound to that port, and then changing the vnic_type of the bound port to macvtap. Note: Only Nova deployments configured with SR-IOV are affected.

How to fix Denial of Service (DoS)?

Upgrade nova to version 26.0.0 or higher.

[,26.0.0)
  • M
Open Redirect

nova is an OpenStack Nova provides a cloud computing fabric controller, supporting a wide variety of compute technologies, including: libvirt (KVM, Xen, LXC and more), Hyper-V, VMware, XenServer, OpenStack Ironic and PowerVM.

Affected versions of this package are vulnerable to Open Redirect. The console proxies used (novnc, serial, spice) run in a websockify server whose request handler inherits from the python standard SimpleHTTPRequestHandler. There is a known issue in the SimpleHTTPRequestHandler which allows open redirects by way of URLs in the following format: http://vncproxy.my.domain.com//example.com/%2F.., which if visited, will redirect a user to example.com.

How to fix Open Redirect?

Upgrade nova to version 23.0.2, 22.3.0, 21.2.3 or higher.

[23.0.0.0rc1,23.0.2) [22.0.0.0rc1,22.3.0) [,21.2.3)