Bugzilla – Bug 873234
VUL-0: CVE-2014-0162: openstack-glance: remote code execution in Glance Sheepdog backend
Last modified: 2015-07-23 09:30:47 UTC
A flaw was found in the Glance Sheepdog backend. A user who is able to insert or modify Glance image metadata could use this flaw to execute arbitrary commands with the privileges of the user who is running the Glance service.
Versions 2013.2 up to 2013.2.3 are affected.
Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Paul McMillan (Nebula) as the original reporter.
CVE-2014-0162 was assigned to this issue.
Juno (development branch) fix:
Icehouse (milestone-proposed branch) fix:
I can see in our
# ============ Sheepdog Store Options =============================
sheepdog_store_address = localhost
sheepdog_store_port = 7000
# Images will be chunked into objects of this size (in megabytes).
# For best performance, this should be a power of two
sheepdog_store_chunk_size = 64
but does this mean, it is active?
bugbot adjusting priority
it is configured to be active, but since the probe fails, the backend is disabled on start. The probe fails because we don't package sheepdog and we don't ship it.
We're not affected by the security bug.
The SWAMPID for this issue is 57063.
This issue was rated as moderate.
Please submit fixed packages until 2014-05-01.
When done, please reassign the bug to email@example.com.
Patchinfo will be handled by security team.
Update released for: openstack-glance, openstack-glance-doc, openstack-glance-test, python-glance
SUSE-CLOUD 3.0 (x86_64)
SUSE-SU-2014:0567-1: An update that solves one vulnerability and has one errata is now available.
Category: security (moderate)
Bug References: 872331,873234
CVE References: CVE-2014-0162
SUSE Cloud 3 (src): openstack-glance-2013.2.3.dev1.g13069a4-0.7.1, openstack-glance-doc-2013.2.3.dev1.g13069a4-0.7.1
all packages fixed
resolved, fixed and released.