Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 19 Jan 2016 17:00:13 +0000
From: Tristan Cacqueray <tdecacqu@...hat.com>
To: oss-security@...ts.openwall.com
Subject: [OSSA 2016-003] Heat denial of service through template-validate
 (CVE-2015-5295)

===============================================================
OSSA-2016-003: Heat denial of service through template-validate
===============================================================

:Date: January 19, 2016
:CVE: CVE-2015-5295


Affects
~~~~~~~
- Heat: <=2015.1.2, ==5.0.0


Description
~~~~~~~~~~~
Steven Hardy from Red Hat reported a vulnerability in Heat template
validation. By referencing a local file like /dev/zero, an
authenticated user may trick the heat engine service to load arbitrary
local file content resulting in a Denial of Service attack through
memory exhaustion. Note that the file content is not written back to
the user, though the user can determine if a file exists and if it is
readable by heat-engine. All Heat setups are affected.


Patches
~~~~~~~
- https://review.openstack.org/269692 (Kilo)
- https://review.openstack.org/269691 (Liberty)
- https://review.openstack.org/269689 (Mitaka)


Credits
~~~~~~~
- Steven Hardy from Red Hat (CVE-2015-5295)


References
~~~~~~~~~~
- https://bugs.launchpad.net/bugs/1496277
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5295


Notes
~~~~~
- This fix will be included in future 2015.1.3 (kilo) and 5.0.1
  (liberty) releases.

--
Tristan Cacqueray
OpenStack Vulnerability Management Team


Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.