Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1131770 - (CVE-2014-5356) CVE-2014-5356 openstack-glance: Glance store disk space exhaustion
CVE-2014-5356 openstack-glance: Glance store disk space exhaustion
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20140502,repor...
: Security
Depends On: 1131771 1131772 1131773 1131774 1132310 1132311 1132312
Blocks: 1131776 1147810
  Show dependency treegraph
 
Reported: 2014-08-20 00:13 EDT by Murray McAllister
Modified: 2016-04-26 10:21 EDT (History)
33 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was discovered that the image_size_cap configuration option in glance was not honored. An authenticated user could use this flaw to upload an image to glance and consume all available storage space, resulting in a denial of service.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-10-22 16:08:57 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:1337 normal SHIPPED_LIVE Moderate: openstack-glance security and bug fix update 2014-09-30 17:13:47 EDT
Red Hat Product Errata RHSA-2014:1338 normal SHIPPED_LIVE Moderate: openstack-glance security and bug fix update 2014-09-30 17:13:42 EDT
Red Hat Product Errata RHSA-2014:1685 normal SHIPPED_LIVE Moderate: openstack-glance security and bug fix update 2014-10-22 17:21:25 EDT

  None (edit)
Description Murray McAllister 2014-08-20 00:13:40 EDT
The OpenStack project reports:

""
Thomas Leaman and Stuart McLaren from Hewlett Packard reported a
vulnerability in Glance. By uploading a large enough image to a Glance
store, an authenticated user may fill the store space because the
image_size_cap configuration option is not honored. This may prevent
further image upload and/or cause service disruption. Note that the
import method is not affected. All Glance setups using API v2 are
affected (unless you use a policy to restrict/disable image upload).
""

This affects versions up to 2013.2.3 and 2014.1 to 2014.1.2.

References:

http://seclists.org/oss-sec/2014/q3/410
https://bugs.launchpad.net/glance/+bug/1315321
https://review.openstack.org/#/c/91764/
Comment 2 Murray McAllister 2014-08-20 00:15:10 EDT
Created openstack-glance tracking bugs for this issue:

Affects: epel-6 [bug 1131771]
Comment 3 Murray McAllister 2014-08-20 00:16:00 EDT
Created openstack-glance tracking bugs for this issue:

Affects: fedora-19 [bug 1131773]
Affects: fedora-20 [bug 1131774]
Comment 6 errata-xmlrpc 2014-09-30 13:15:27 EDT
This issue has been addressed in the following products:

  OpenStack 5 for RHEL 6

Via RHSA-2014:1338 https://rhn.redhat.com/errata/RHSA-2014-1338.html
Comment 7 errata-xmlrpc 2014-09-30 13:16:24 EDT
This issue has been addressed in the following products:

  OpenStack 5 for RHEL 7

Via RHSA-2014:1337 https://rhn.redhat.com/errata/RHSA-2014-1337.html
Comment 8 Fedora Update System 2014-10-18 12:59:05 EDT
openstack-glance-2013.2.4-1.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 9 Martin Prpič 2014-10-20 07:46:47 EDT
IssueDescription:

It was discovered that the image_size_cap configuration option in glance was not honored. An authenticated user could use this flaw to upload an image to glance and consume all available storage space, resulting in a denial of service.
Comment 10 errata-xmlrpc 2014-10-22 13:23:39 EDT
This issue has been addressed in the following products:

  OpenStack 4 for RHEL 6

Via RHSA-2014:1685 https://rhn.redhat.com/errata/RHSA-2014-1685.html

Note You need to log in before you can comment on or make changes to this bug.