Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/glance@2014.1.3-12%2Bdeb8u1
purl pkg:deb/debian/glance@2014.1.3-12%2Bdeb8u1
Next non-vulnerable version 2:32.0.0-2
Latest non-vulnerable version 2:32.0.0-2
Risk 4.0
Vulnerabilities affecting this package (9)
Vulnerability Summary Fixed by
VCID-9sg5-tbvn-syba
Aliases:
CVE-2015-5286
GHSA-gvjg-r9fv-7qx9
OpenStack Image Service (Glance) allows remote authenticated users to bypass storage quota, cause denial of service OpenStack Image Service (Glance) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) allows remote authenticated users to bypass the storage quota and cause a denial of service (disk consumption) by deleting images that are being uploaded using a token that expires during the process. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-9623.
2:12.0.0-3~bpo8+1
Affected by 3 other vulnerabilities.
VCID-br4q-499g-vqhg
Aliases:
CVE-2022-47951
GHSA-7h75-hwxx-qpgc
OpenStack Cinder, glance, and Nova vulnerable to Path Traversal An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data.
2:21.0.0-2+deb11u1
Affected by 2 other vulnerabilities.
VCID-g1mf-hrds-bubz
Aliases:
CVE-2016-0757
GHSA-5xrj-ghhp-hx7p
OpenStack Image Service (Glance) vulnerable to Improper Access Control OpenStack Image Service (Glance) before 2015.1.3 (kilo) and 11.0.x before 11.0.2 (liberty), when show_multiple_locations is enabled, allow remote authenticated users to change image status and upload new image data by removing the last location of an image.
2:12.0.0-3~bpo8+1
Affected by 3 other vulnerabilities.
VCID-h6rd-5p7q-s3gq
Aliases:
CVE-2024-32498
GHSA-r4v4-w9pv-6fph
OpenStack Cinder, Glance, and Nova vulnerable to arbitrary file access An issue was discovered in OpenStack Cinder through 24.0.0, Glance before 28.0.2, and Nova before 29.0.3. Arbitrary file access can occur via custom QCOW2 external data. By supplying a crafted QCOW2 image that references a specific data file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data. All Cinder and Nova deployments are affected; only Glance deployments with image conversion enabled are affected.
2:25.1.0-2+deb12u1
Affected by 1 other vulnerability.
VCID-hbpu-kpak-2uer
Aliases:
CVE-2015-5163
GHSA-q73f-vjc2-3gqf
PYSEC-2015-39
The import task action in OpenStack Image Service (Glance) 2015.1.x before 2015.1.2 (kilo), when using the V2 API, allows remote authenticated users to read arbitrary files via a crafted backing file for a qcow2 image.
2:12.0.0-3~bpo8+1
Affected by 3 other vulnerabilities.
VCID-k2u9-5g8v-bucz
Aliases:
CVE-2015-5251
GHSA-q748-mcwg-xmqv
OpenStack Image Service (Glance) allows remote authenticated users to bypass access restrictions OpenStack Image Service (Glance) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) allow remote authenticated users to change the status of their images and bypass access restrictions via the HTTP x-image-meta-status header to images/*.
2:12.0.0-3~bpo8+1
Affected by 3 other vulnerabilities.
VCID-ruvh-knrw-pygu
Aliases:
CVE-2017-7200
GHSA-j6mr-cm6x-h6jg
OpenStack Glance Server-Side Request Forgery (SSRF) An SSRF issue was discovered in OpenStack Glance before Newton. The 'copy_from' feature in the Image Service API v1 allowed an attacker to perform masked network port scans. With v1, it is possible to create images with a URL such as 'http://localhost:22'. This could then allow an attacker to enumerate internal network details while appearing masked, since the scan would appear to originate from the Glance Image service.
2:13.0.0-4
Affected by 2 other vulnerabilities.
VCID-tafu-6gx3-n7bf
Aliases:
CVE-2015-3289
openstack-glance: potential resource exhaustion task flow API
2:12.0.0-3~bpo8+1
Affected by 3 other vulnerabilities.
VCID-zy9m-d25c-5uga
Aliases:
CVE-2015-5162
GHSA-g2j5-7vgx-6xrx
OpenStack Cinder, Glance, and Nova contain Uncontrolled Resource Consumption A resource vulnerability in the OpenStack Compute (nova), Block Storage (cinder), and Image (glance) services was found in their use of qemu-img. An unprivileged user could consume as much as 4 GB of RAM on the compute host by uploading a malicious image. This flaw could lead possibly to host out-of-memory errors and negatively affect other running tenant instances. oslo.concurrency has been updated to support process limits ('prlimit'), which is needed to fix this flaw.
2:12.0.0-3~bpo8+1
Affected by 3 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-15T23:59:21.143753+00:00 Debian Oval Importer Affected by VCID-hbpu-kpak-2uer https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:53:25.095673+00:00 Debian Oval Importer Affected by VCID-9sg5-tbvn-syba https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T20:48:57.210532+00:00 Debian Oval Importer Affected by VCID-zy9m-d25c-5uga https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T19:08:36.335577+00:00 Debian Oval Importer Affected by VCID-tafu-6gx3-n7bf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:23:52.484287+00:00 Debian Oval Importer Affected by VCID-g1mf-hrds-bubz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T17:12:36.597698+00:00 Debian Oval Importer Affected by VCID-br4q-499g-vqhg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:55:49.681894+00:00 Debian Oval Importer Affected by VCID-k2u9-5g8v-bucz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T16:01:36.737053+00:00 Debian Oval Importer Affected by VCID-ruvh-knrw-pygu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-15T15:28:02.162677+00:00 Debian Oval Importer Affected by VCID-h6rd-5p7q-s3gq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.4.0
2026-04-11T23:33:32.237823+00:00 Debian Oval Importer Affected by VCID-hbpu-kpak-2uer https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:33:59.422983+00:00 Debian Oval Importer Affected by VCID-9sg5-tbvn-syba https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T20:29:46.132165+00:00 Debian Oval Importer Affected by VCID-zy9m-d25c-5uga https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T18:52:21.000907+00:00 Debian Oval Importer Affected by VCID-tafu-6gx3-n7bf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T17:10:16.990623+00:00 Debian Oval Importer Affected by VCID-g1mf-hrds-bubz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:59:13.511231+00:00 Debian Oval Importer Affected by VCID-br4q-499g-vqhg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T16:42:30.859259+00:00 Debian Oval Importer Affected by VCID-k2u9-5g8v-bucz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:49:10.779209+00:00 Debian Oval Importer Affected by VCID-ruvh-knrw-pygu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-11T15:16:09.269371+00:00 Debian Oval Importer Affected by VCID-h6rd-5p7q-s3gq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.3.0
2026-04-08T23:06:15.834909+00:00 Debian Oval Importer Affected by VCID-hbpu-kpak-2uer https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:14:07.769044+00:00 Debian Oval Importer Affected by VCID-9sg5-tbvn-syba https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T20:10:05.597386+00:00 Debian Oval Importer Affected by VCID-zy9m-d25c-5uga https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T18:37:07.736875+00:00 Debian Oval Importer Affected by VCID-tafu-6gx3-n7bf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:59:20.179075+00:00 Debian Oval Importer Affected by VCID-g1mf-hrds-bubz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:48:44.934010+00:00 Debian Oval Importer Affected by VCID-br4q-499g-vqhg https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T16:32:59.506431+00:00 Debian Oval Importer Affected by VCID-k2u9-5g8v-bucz https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:42:39.199214+00:00 Debian Oval Importer Affected by VCID-ruvh-knrw-pygu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0
2026-04-08T15:10:57.466364+00:00 Debian Oval Importer Affected by VCID-h6rd-5p7q-s3gq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 38.1.0