OpenStack Image Service (glance) provides discovery, registration, and
delivery services for disk and server images. The service provides the
ability to copy or snapshot a server image, and immediately store it away.
Stored images can be used as a template to get new servers up and running
quickly and more consistently than installing a server operating system
and individually configuring additional services.
An authorization vulnerability in OpenStack Image service was discovered,
which allowed image-status manipulation using locations. By removing the
last location of an image, an authenticated user could change the status
from ‘active’ to ‘queue’. A malicious tenant could exploit this flaw to
silently replace owned image data, regardless of its original creator or
visibility settings. Only environments with show_multiple_locations set
to true (not default) were affected. (CVE-2016-0757)
Red Hat would like to thank the OpenStack project for reporting this issue.
Upstream acknowledges Erno Kuvaja of HPE as the original reporter.
All openstack-glance users are advised to upgrade to these updated
packages, which address this vulnerability.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 7 | noarch | openstack-glance | < 2015.1.2-2.el7ost | openstack-glance-2015.1.2-2.el7ost.noarch.rpm |
RedHat | 7 | noarch | python-glance | < 2015.1.2-2.el7ost | python-glance-2015.1.2-2.el7ost.noarch.rpm |
RedHat | 7 | src | openstack-glance | < 2015.1.2-2.el7ost | openstack-glance-2015.1.2-2.el7ost.src.rpm |
RedHat | 7 | noarch | openstack-glance-doc | < 2015.1.2-2.el7ost | openstack-glance-doc-2015.1.2-2.el7ost.noarch.rpm |