Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 23 Feb 2015 12:29:31 -0500
From: Tristan Cacqueray <tristan.cacqueray@...vance.com>
To: oss-security@...ts.openwall.com
Subject: [OSSA 2015-004] Glance import task leaks image in backend (CVE-2014-9684,
 CVE-2015-1881)

========================================================
OSSA-2015-004: Glance import task leaks image in backend
========================================================

:Date: February 23, 2015
:CVE: CVE-2014-9684, CVE-2015-1881


Affects
~~~~~~~
- Glance: 2014.2 versions through 2014.2.2


Description
~~~~~~~~~~~
Abhishek Kekane from NTT and Mike Fedosin from Mirantis reported a
vulnerability in the Glance import task. By creating numerous images
using the task API and deleting them, an authenticated attacker may
accumulate untracked image data in the backend resulting in potential
resource exhaustion and denial of service. All glance setups using API
v2 are affected.


Patches
~~~~~~~
- https://review.openstack.org/156553 (Juno)
- https://review.openstack.org/157067 (Juno)
- https://review.openstack.org/156493 (Kilo)
- https://review.openstack.org/122427 (Kilo)


Credits
~~~~~~~
- Abhishek Kekane from NTT (CVE-2015-1881)
- Mike Fedosin from Mirantis (CVE-2014-9684)


References
~~~~~~~~~~
- https://launchpad.net/bugs/1420696
- https://launchpad.net/bugs/1371118
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9684
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1881


Notes
~~~~~
- This fix will be included in the kilo-3 development milestone and in future
  2014.2.3 (juno) release.

--
Tristan Cacqueray
OpenStack Vulnerability Management Team


Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.