{"id":"CVE-2024-32498","details":"An issue was discovered in OpenStack Cinder through 24.0.0, Glance before 28.0.2, and Nova before 29.0.3. Arbitrary file access can occur via custom QCOW2 external data. By supplying a crafted QCOW2 image that references a specific data file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Cinder and Nova deployments are affected; only Glance deployments with image conversion enabled are affected.","aliases":["GHSA-r4v4-w9pv-6fph"],"modified":"2026-04-10T05:12:13.924081Z","published":"2024-07-05T02:15:09.840Z","references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00017.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/02/2"},{"type":"WEB","url":"https://security.openstack.org/ossa/OSSA-2024-001.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00016.html"},{"type":"FIX","url":"https://launchpad.net/bugs/2059809"},{"type":"FIX","url":"https://www.openwall.com/lists/oss-security/2024/07/02/2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openstack/cinder","events":[{"introduced":"0"},{"last_affected":"bcf399027edbd7c898a2f0583020e363e06e50d2"},{"introduced":"0"},{"last_affected":"c36f40684e140a1492b00dd4812e8dce17fb2ebf"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"24.0.0"},{"introduced":"0"},{"last_affected":"27.0.0"}]}}],"versions":["10.0.0.0b1","10.0.0.0b2","10.0.0.0b3","10.0.0.0rc1","11.0.0.0b1","11.0.0.0b2","11.0.0.0b3","11.0.0.0rc1","12.0.0.0b1","12.0.0.0b2","12.0.0.0b3","12.0.0.0rc1","13.0.0.0b1","13.0.0.0b2","13.0.0.0b3","13.0.0.0rc1","14.0.0.0rc1","15.0.0.0rc1","16.0.0.0b1","16.0.0.0rc1","17.0.0.0rc1","18.0.0.0b1","18.0.0.0rc1","19.0.0.0b1","19.0.0.0rc1","20.0.0.0rc1","2013.1.g3","2013.1.rc1","2013.2.b1","2013.2.b2","2013.2.b3","2014.1.b1","2014.1.b2","2014.1.b3","2014.1.rc1","2014.2.b1","2014.2.b2","2014.2.b3","2014.2.rc1","2015.1.0b1","2015.1.0b2","2015.1.0b3","2015.1.0rc1","21.0.0.0rc1","22.0.0.0rc1","23.0.0.0rc1","24.0.0","24.0.0.0rc1","24.0.0.0rc2","25.0.0.0rc1","26.0.0.0rc1","27.0.0","27.0.0.0rc1","7.0.0.0b1","7.0.0.0b2","7.0.0.0b3","7.0.0.0rc1","7.0.0a0","8.0.0.0b1","8.0.0.0b2","8.0.0.0b3","8.0.0.0rc1","9.0.0.0b1","9.0.0.0b2","9.0.0.0b3","9.0.0.0rc1","folsom-2","folsom-3","grizzly-1","grizzly-2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-32498.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"22.1.3"}]},{"events":[{"introduced":"23.0.0"},{"fixed":"23.1.1"}]},{"events":[{"introduced":"0"},{"fixed":"26.0.1"}]},{"events":[{"introduced":"28.0.0"},{"fixed":"28.0.2"}]},{"events":[{"introduced":"0"},{"fixed":"27.3.1"}]},{"events":[{"introduced":"28.0.0"},{"fixed":"28.1.1"}]},{"events":[{"introduced":"29.0.0"},{"fixed":"29.0.3"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}