Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20150922191904.GA63354@hpe.com>
Date: Tue, 22 Sep 2015 12:19:04 -0700
From: Grant Murphy <grant.murphy@....com>
To: oss-security@...ts.openwall.com
Subject: [OSSA-2015-019] Glance image status manipulation (CVE-2015-5251)

===============================================
OSSA-2015-019: Glance image status manipulation
===============================================

:Date: September 22, 2015
:CVE: CVE-2015-5251


Affects
~~~~~~~
- Glance: <=2014.2.3, >=2015.1.0, <=2015.1.1


Description
~~~~~~~~~~~
Hemanth Makkapati of Rackspace reported a vulnerability in Glance. By
submitting a HTTP PUT request with a "x-image-meta-status" header, a
tenant can manipulate the status of their images. A malicious tenant
may exploit this flaw to reactivate disabled images, bypass storage
quotas and in some cases replace image contents. Setups using the
Glance v1 API allow the illegal modification of image status. Setups
which also use the v2 API may allow a subsequent re-upload of image
contents.


Patches
~~~~~~~
- https://review.openstack.org/226338 (Juno)
- https://review.openstack.org/226337 (Kilo)
- https://review.openstack.org/226336 (Liberty)


Credits
~~~~~~~
- Hemanth Makkapati from Rackspace (CVE-2015-5251)


References
~~~~~~~~~~
- https://bugs.launchpad.net/bugs/1482371
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5251


Notes
~~~~~
- This fix will be included in future 2014.2.4 (juno) and 2015.1.2 (kilo)
  releases.


Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.