glance@21.1.0 vulnerabilities

OpenStack Image Service

Direct Vulnerabilities

Known vulnerabilities in the glance package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Improper Input Validation

Affected versions of this package are vulnerable to Improper Input Validation in QCOW2 image processing. An authenticated user may convince systems to return a copy of that file's contents from the server resulting in unauthorized access to potentially sensitive data and unbounded memory/CPU consumption.

Note: All Cinder deployments are affected; only Glance deployments with image conversion enabled are affected; all Nova deployments are affected.

How to fix Improper Input Validation?

Upgrade glance to version 26.1.0, 27.1.0, 28.1.0 or higher.

[,26.1.0) [27.0.0,27.1.0) [28.0.0,28.1.0)
  • M
Unsafe Dependency Resolution

[0,)
  • M
Information Exposure

Affected versions of this package are vulnerable to Information Exposure when supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data.

How to fix Information Exposure?

Upgrade glance to version 26.0.0 or higher.

[,26.0.0)