Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <56B34796.7080408@redhat.com>
Date: Thu, 4 Feb 2016 12:44:06 +0000
From: Tristan Cacqueray <tdecacqu@...hat.com>
To: oss-security@...ts.openwall.com
Subject: [OSSA 2016-006] Glance image status manipulation through locations
 removal (CVE-2016-0757)

=================================================================
OSSA-2016-006: Glance image status manipulation through locations
               removal
=================================================================

:Date: February 03, 2016
:CVE: CVE-2016-0757


Affects
~~~~~~~
- Glance: <=2015.1.2, >=11.0.0 <= 11.0.1


Description
~~~~~~~~~~~
Erno Kuvaja from HPE reported a vulnerability in Glance. By removing
the last location of an image, an authenticated user may change the
image status back to queued and may be able to upload new image data
resulting in a broken Glance's immutability promise. A malicious
tenant may exploit this flaw to silently replace image data it owns,
regardless of the original creator or the visibility settings. Only
setups with show_multiple_locations enabled (not default) are
affected.


Patches
~~~~~~~
- https://review.openstack.org/275735 (Kilo)
- https://review.openstack.org/275736 (Liberty)
- https://review.openstack.org/275737 (Mitaka)


Credits
~~~~~~~
- Erno Kuvaja from HPE (CVE-2016-0757)


References
~~~~~~~~~~
- https://bugs.launchpad.net/bugs/1525915
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0757


Notes
~~~~~
- This fix will be included in future 2015.1.3 (kilo) and 11.0.2
  (liberty) releases.
- The proposed fix prevents the removal of the last location of an
  image so that an active image is always available. This action was
  previously incorrectly allowed and the fix might break some users who
  are relying on the false assumption that it would be ok to replace
  the data of existing image in the special case that the multiple
  locations has been configured.

--
Tristan Cacqueray
OpenStack Vulnerability Management Team


Download attachment "signature.asc" of type "application/pgp-signature" (474 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.