CVE-2014-9493
Published: 7 January 2015
The V2 API in OpenStack Image Registry and Delivery Service (Glance) before 2014.2.2 and 2014.1.4 allows remote authenticated users to read or delete arbitrary files via a full pathname in a file: URL in the image location property.
Notes
Author | Note |
---|---|
jdstrand | Per upstream, "A potential mitigation strategy available for operators is to change the glance policy to restrict access to administrators for get_image_location, set_image_location, and delete_image_location." Ubuntu 12.04 LTS not affected (does not have V2 API) preliminary packages for Ubuntu 14.04 LTS and 14.10 can be found in: https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages |
mdeslaur | This issue wasn't fully addressed by the original patches, see: http://lists.openstack.org/pipermail/openstack-announce/2015-January/000323.html incomplete fix got CVE-2015-1195 |
Priority
Status
Package | Release | Status |
---|---|---|
glance Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Not vulnerable
(code not present)
|
|
trusty |
Released
(1:2014.1.4-0ubuntu1)
|
|
upstream |
Needs triage
|
|
utopic |
Not vulnerable
(1:2014.2.2-0ubuntu1)
|
|
vivid |
Not vulnerable
(1:2015.1~b1-0ubuntu3)
|
|
Patches: upstream: https://review.openstack.org/142788 upstream: https://review.openstack.org/142373 upstream: https://review.openstack.org/141706 |