Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2014-9493

Published: 7 January 2015

The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.2.2 and 2014.1.4 allows remote authenticated users to read or delete arbitrary files via a full pathname in a file: URL in the image location property.

Notes

AuthorNote
jdstrand
Per upstream, "A potential mitigation strategy available for
operators is to change the glance policy to restrict access to administrators
for get_image_location, set_image_location, and delete_image_location."
Ubuntu 12.04 LTS not affected (does not have V2 API)
preliminary packages for Ubuntu 14.04 LTS and 14.10 can be found in:
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages
mdeslaur
This issue wasn't fully addressed by the original patches, see:
http://lists.openstack.org/pipermail/openstack-announce/2015-January/000323.html
incomplete fix got CVE-2015-1195

Priority

Medium

Status

Package Release Status
glance
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Not vulnerable
(code not present)
trusty
Released (1:2014.1.4-0ubuntu1)
upstream Needs triage

utopic Not vulnerable
(1:2014.2.2-0ubuntu1)
vivid Not vulnerable
(1:2015.1~b1-0ubuntu3)
Patches:
upstream: https://review.openstack.org/142788
upstream: https://review.openstack.org/142373
upstream: https://review.openstack.org/141706