Date: Fri, 2 Oct 2015 15:00:28 +0000 From: Tristan Cacqueray <tdecacqu@...hat.com> To: oss-security@...ts.openwall.com Subject: [OSSA 2015-020] Glance storage overrun (CVE-2015-5286) ===================================== OSSA-2015-020: Glance storage overrun ===================================== :Date: October 01, 2015 :CVE: CVE-2015-5286 Affects ~~~~~~~ - Glance: <=2014.2.3, >=2015.1.0, <=2015.1.1 Description ~~~~~~~~~~~ Mike Fedosin and Alexei Galkin from Mirantis reported a vulnerability in Glance. By deleting images that are being uploaded using a token that is about to expire, a malicious user can overcome the storage quota and accumulate untracked image data in the backend resulting in potential resource exhaustion and denial of service. All Glance setups using the V1 API are affected and all setups using the V2 API with the registry db_api enabled are affected. Patches ~~~~~~~ - https://review.openstack.org/229946 (Juno) - https://review.openstack.org/229975 (Juno) - https://review.openstack.org/229945 (Kilo) - https://review.openstack.org/229973 (Kilo) - https://review.openstack.org/230056 (Liberty) - https://review.openstack.org/229972 (Liberty) - https://review.openstack.org/229943 (Mitaka) - https://review.openstack.org/229971 (Mitaka) Credits ~~~~~~~ - Mike Fedosin from Mirantis (CVE-2015-5286) - Alexei Galkin from Mirantis (CVE-2015-5286) References ~~~~~~~~~~ - https://bugs.launchpad.net/bugs/1498163 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5286 Notes ~~~~~ - This fix will be included in future 2014.2.4 (juno) and 2015.1.2 (kilo) releases. -- Tristan Cacqueray OpenStack Vulnerability Management Team Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.