Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 26 Jan 2015 11:24:03 -0500
From: Tristan Cacqueray <tristan.cacqueray@...vance.com>
To: oss-security@...ts.openwall.com
Subject: [OSSA 2015-003] Glance user storage quota bypass (CVE-2014-9623)

===============================================
OSSA-2015-003: Glance user storage quota bypass
===============================================

:Date: January 26, 2015
:CVE: CVE-2014-9623


Affects
~~~~~~~
- Glance: up to 2014.1.3 and 2014.2 versions up to 2014.2.1


Description
~~~~~~~~~~~
Tushar Patil from NTT reported a vulnerability in Glance. By deleting
images that are being uploaded, a malicious user can overcome the
storage quota and thus may overrun the backend. Images in deleted
state are not taken into account by quota and won't be effectively
deleted until the upload is completed. Only Glance setups configured
with user_storage_quota are affected.


Patches
~~~~~~~
- https://review.openstack.org/149646 (Icehouse)
- https://review.openstack.org/149387 (Juno)
- https://review.openstack.org/144464 (Kilo)


Credits
~~~~~~~
- Tushar Patil from NTT (CVE-2014-9623)


References
~~~~~~~~~~
- https://launchpad.net/bugs/1398830
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9623


Notes
~~~~~
- This fix will be included in the kilo-2 development milestone and in future
  2014.2.2 (juno) and 2014.1.4 (icehouse) releases.

--
Tristan Cacqueray
OpenStack Vulnerability Management Team


Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.