yahoo-eng-team team mailing list archive
-
yahoo-eng-team team
-
Mailing list archive
-
Message #03210
[Bug 1076506] Re: [OSSA-2012-017] Non-admin users can cause public glance images to be deleted from the backend storage repository in the v2 api
** Summary changed:
- Non-admin users can cause public glance images to be deleted from the backend storage repository in the v2 api
+ [OSSA-2012-017] Non-admin users can cause public glance images to be deleted from the backend storage repository in the v2 api
** Also affects: ossa
Importance: Undecided
Status: New
** Changed in: ossa
Status: New => Fix Released
** Changed in: ossa
Assignee: (unassigned) => Russell Bryant (russellb)
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-4573
** Summary changed:
- [OSSA-2012-017] Non-admin users can cause public glance images to be deleted from the backend storage repository in the v2 api
+ [OSSA-2012-017.1] Non-admin users can cause public glance images to be deleted from the backend storage repository in the v2 api
** Summary changed:
- [OSSA-2012-017.1] Non-admin users can cause public glance images to be deleted from the backend storage repository in the v2 api
+ [OSSA-2012-017.1] Non-admin users can cause public glance images to be deleted in the v2 api
--
You received this bug notification because you are a member of Yahoo!
Engineering Team, which is subscribed to Glance.
https://bugs.launchpad.net/bugs/1076506
Title:
[OSSA-2012-017.1] Non-admin users can cause public glance images to be
deleted in the v2 api
Status in OpenStack Image Registry and Delivery Service (Glance):
Fix Released
Status in Glance folsom series:
Fix Released
Status in Glance grizzly series:
Fix Released
Status in OpenStack Security Advisories:
Fix Released
Status in “glance” package in Ubuntu:
Fix Released
Status in “glance” source package in Quantal:
Fix Released
Bug description:
It appears that bug #1065187 also affects the v2 api. From the
previous description:
Given a public, non-protected image, a non-admin user can issue a
delete against that image which may delete the image from the backend
storage repository. The client will get a 403 unauthorized response,
but the backend delete method is called prior to checking for those
permissions on the glance registry.
To manage notifications about this bug go to:
https://bugs.launchpad.net/glance/+bug/1076506/+subscriptions