|
Message-ID: <56B34796.7080408@redhat.com>
Date: Thu, 4 Feb 2016 12:44:06 +0000
From: Tristan Cacqueray <tdecacqu@...hat.com>
To: oss-security@...ts.openwall.com
Subject: [OSSA 2016-006] Glance image status manipulation through locations
removal (CVE-2016-0757)
=================================================================
OSSA-2016-006: Glance image status manipulation through locations
removal
=================================================================
:Date: February 03, 2016
:CVE: CVE-2016-0757
Affects
~~~~~~~
- Glance: <=2015.1.2, >=11.0.0 <= 11.0.1
Description
~~~~~~~~~~~
Erno Kuvaja from HPE reported a vulnerability in Glance. By removing
the last location of an image, an authenticated user may change the
image status back to queued and may be able to upload new image data
resulting in a broken Glance's immutability promise. A malicious
tenant may exploit this flaw to silently replace image data it owns,
regardless of the original creator or the visibility settings. Only
setups with show_multiple_locations enabled (not default) are
affected.
Patches
~~~~~~~
- https://review.openstack.org/275735 (Kilo)
- https://review.openstack.org/275736 (Liberty)
- https://review.openstack.org/275737 (Mitaka)
Credits
~~~~~~~
- Erno Kuvaja from HPE (CVE-2016-0757)
References
~~~~~~~~~~
- https://bugs.launchpad.net/bugs/1525915
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0757
Notes
~~~~~
- This fix will be included in future 2015.1.3 (kilo) and 11.0.2
(liberty) releases.
- The proposed fix prevents the removal of the last location of an
image so that an active image is always available. This action was
previously incorrectly allowed and the fix might break some users who
are relying on the false assumption that it would be ok to replace
the data of existing image in the special case that the multiple
locations has been configured.
--
Tristan Cacqueray
OpenStack Vulnerability Management Team
Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.