Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 13 Aug 2015 21:11:30 +0000
From: Tristan Cacqueray <>
Subject: [OSSA 2015-014] Glance v2 API host file disclosure through qcow2
 backing file (CVE-2015-5163)

OSSA-2015-014: Glance v2 API host file disclosure through qcow2 backing file

:Date: August 13, 2015
:CVE: CVE-2015-5163

- Glance: 2015.1 versions through 2015.1.1

Eric Harney from Red Hat reported a vulnerability in Glance. By
importing a qcow2 image with a malicious backing file, an
authenticated user may mislead Glance import task action, resulting in
the disclosure of any file on the Glance server for which the Glance
process user has access to. Only setups using the Glance V2 API are
affected by this flaw.

- (Kilo)
- (Liberty)

- Eric Harney from Red Hat (CVE-2015-5163)


- This fix will be included in the future 2015.1.2 (kilo) release.

Tristan Cacqueray
OpenStack Vulnerability Management Team

Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.