Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 2 Oct 2015 15:00:28 +0000
From: Tristan Cacqueray <tdecacqu@...hat.com>
To: oss-security@...ts.openwall.com
Subject: [OSSA 2015-020] Glance storage overrun (CVE-2015-5286)

=====================================
OSSA-2015-020: Glance storage overrun
=====================================

:Date: October 01, 2015
:CVE: CVE-2015-5286


Affects
~~~~~~~
- Glance: <=2014.2.3, >=2015.1.0, <=2015.1.1


Description
~~~~~~~~~~~
Mike Fedosin and Alexei Galkin from Mirantis reported a vulnerability
in Glance. By deleting images that are being uploaded using a token
that is about to expire, a malicious user can overcome the storage
quota and accumulate untracked image data in the backend resulting in
potential resource exhaustion and denial of service. All Glance setups
using the V1 API are affected and all setups using the V2 API with the
registry db_api enabled are affected.


Patches
~~~~~~~
- https://review.openstack.org/229946 (Juno)
- https://review.openstack.org/229975 (Juno)
- https://review.openstack.org/229945 (Kilo)
- https://review.openstack.org/229973 (Kilo)
- https://review.openstack.org/230056 (Liberty)
- https://review.openstack.org/229972 (Liberty)
- https://review.openstack.org/229943 (Mitaka)
- https://review.openstack.org/229971 (Mitaka)


Credits
~~~~~~~
- Mike Fedosin from Mirantis (CVE-2015-5286)
- Alexei Galkin from Mirantis (CVE-2015-5286)


References
~~~~~~~~~~
- https://bugs.launchpad.net/bugs/1498163
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5286


Notes
~~~~~
- This fix will be included in future 2014.2.4 (juno) and 2015.1.2
  (kilo) releases.

--
Tristan Cacqueray
OpenStack Vulnerability Management Team


Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ