CVE-2024-40767
Description
In OpenStack Nova before 27.4.1, 28 before 28.2.1, and 29 before 29.1.1, by supplying a raw format image that is actually a crafted QCOW2 image with a backing file path or VMDK flat image with a descriptor file path, an authenticated user may convince systems to return a copy of the referenced file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Nova deployments are affected. NOTE: this issue exists because of an incomplete fix for CVE-2022-47951 and CVE-2024-32498.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Authenticated OpenStack users can read arbitrary server files by uploading crafted disk images that exploit incomplete fixes for earlier path-traversal vulnerabilities.
Root
Cause
CVE-2024-40767 is a path-traversal vulnerability in OpenStack Nova that arises from incomplete fixes for two prior CVEs: CVE-2022-47951 and CVE-2024-32498 [1][4]. When Nova handles raw-format images, it does not sufficiently validate that the supplied file is actually a raw image; an attacker can upload a crafted QCOW2 image that specifies a backing file path or a VMDK flat image containing a descriptor file path [2]. These paths can point to arbitrary files on the server's filesystem.
Exploitation
An authenticated OpenStack user can upload such a crafted image (e.g., a QCOW2 file with a backing file set to /etc/hosts or a VMDK with a descriptor file pointing at the same) and then boot an instance from that image [2]. The Nova compute service, when preparing the instance disk, will follow the embedded path and access the target file. The attack requires only standard user credentials for image upload and instance boot; no administrative privileges or special network access are needed [1][4].
Impact
Successful exploitation allows an authenticated user to read arbitrary files from the Nova compute node's filesystem. Sensitive data, such as configuration files, cryptographic keys, or other secrets accessible to the Nova process, can be exfiltrated [1][4]. The vulnerability affects all Nova deployments, including those that had previously applied fixes for the related CVEs [1].
Mitigation
Red Hat and the OpenStack project have released patched versions: Nova 27.4.1, 28.2.1, and 29.1.1 [1][4]. Operators should upgrade to these or later versions immediately. The fix strengthens image format validation to detect and reject crafted QCOW2 and VMDK files that attempt to specify backing or descriptor file paths outside of allowed boundaries [2][4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
NovaPyPI | <= 27.4.0 | — |
NovaPyPI | >= 28.0.0, <= 28.2.0 | — |
NovaPyPI | >= 29.0.0, <= 29.1.0 | — |
Affected products
2- OpenStack/Novadescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- github.com/advisories/GHSA-rm86-h44c-2r2mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-40767ghsaADVISORY
- launchpad.net/bugs/2071734ghsaWEB
- lists.debian.org/debian-lts-announce/2024/09/msg00017.htmlghsaWEB
- review.opendev.org/c/openstack/nova/+/924731ghsaWEB
- security.openstack.orgghsaWEB
- security.openstack.org/ossa/OSSA-2024-002.htmlghsaWEB
- www.openwall.com/lists/oss-security/2024/07/23/2ghsaWEB
News mentions
0No linked articles in our index yet.