First published: Mon Feb 12 2024(Updated: )
It was discovered that Glance_store incorrectly handled logging when the DEBUG log level is enabled. A local attacker could use this issue to obtain access_key values.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/python3-glance-store | <4.6.1-0ubuntu1.1 | 4.6.1-0ubuntu1.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/python3-glance-store | <3.0.0-0ubuntu1.4 | 3.0.0-0ubuntu1.4 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/python3-glance-store | <2.0.0-0ubuntu4.3 | 2.0.0-0ubuntu4.3 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6630-1 is considered high due to the potential for local attackers to access sensitive access_key values.
To fix USN-6630-1, upgrade to the patched versions of python3-glance-store: 4.6.1-0ubuntu1.1 for Ubuntu 23.10, 3.0.0-0ubuntu1.4 for Ubuntu 22.04, or 2.0.0-0ubuntu4.3 for Ubuntu 20.04.
Users running specific versions of python3-glance-store on Ubuntu 23.10, 22.04, and 20.04 are affected by the USN-6630-1 vulnerability.
The USN-6630-1 vulnerability is caused by improper handling of logging in Glance_store when the DEBUG log level is enabled.
No, USN-6630-1 can only be exploited by a local attacker with access to the system.