Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2015-1881 (GCVE-0-2015-1881)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:54:16.396Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[openstack-announce] 20150223 [OSSA 2015-004] Glance import task leaks image in backend (CVE-2014-9684, CVE-2015-1881)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-February/000336.html" }, { "name": "RHSA-2015:0938", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0938.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/glance/+bug/1420696" }, { "name": "72694", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/72694" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-02-23T00:00:00", "descriptions": [ { "lang": "en", "value": "OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them, a different vulnerability than CVE-2014-9684." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-30T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[openstack-announce] 20150223 [OSSA 2015-004] Glance import task leaks image in backend (CVE-2014-9684, CVE-2015-1881)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-February/000336.html" }, { "name": "RHSA-2015:0938", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0938.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/glance/+bug/1420696" }, { "name": "72694", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/72694" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-1881", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them, a different vulnerability than CVE-2014-9684." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[openstack-announce] 20150223 [OSSA 2015-004] Glance import task leaks image in backend (CVE-2014-9684, CVE-2015-1881)", "refsource": "MLIST", "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-February/000336.html" }, { "name": "RHSA-2015:0938", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0938.html" }, { "name": "https://bugs.launchpad.net/glance/+bug/1420696", "refsource": "CONFIRM", "url": "https://bugs.launchpad.net/glance/+bug/1420696" }, { "name": "72694", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72694" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-1881", "datePublished": "2015-02-24T15:00:00", "dateReserved": "2015-02-19T00:00:00", "dateUpdated": "2024-08-06T04:54:16.396Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-1881\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-02-24T15:59:08.567\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them, a different vulnerability than CVE-2014-9684.\"},{\"lang\":\"es\",\"value\":\"OpenStack Image Registry and Delivery Service (Glance) 2014.2 hasta 2014.2.2 no elimina correctamente las im\u00e1genes, lo que permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (consumo de disco) mediante la creaci\u00f3n de un n\u00famero grande de im\u00e1genes al utilizar la API v2 de tareas y posteriormente elimin\u00e1ndolas, una vulnerabilidad diferente a CVE-2014-9684.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:P\",\"baseScore\":4.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\\\(glance\\\\):2014.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"072E34B9-5979-4291-B1D2-762A7C515641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\\\(glance\\\\):2014.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEAB5B21-2F3D-4A5D-9554-B7F984FF5D48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openstack:image_registry_and_delivery_service_\\\\(glance\\\\):2014.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"071E2B7B-5E6B-4108-8E46-5E72AC22B168\"}]}]}],\"references\":[{\"url\":\"http://lists.openstack.org/pipermail/openstack-announce/2015-February/000336.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0938.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/72694\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugs.launchpad.net/glance/+bug/1420696\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lists.openstack.org/pipermail/openstack-announce/2015-February/000336.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-0938.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/72694\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugs.launchpad.net/glance/+bug/1420696\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]}]}}" } }
cnvd-2015-01203
Vulnerability from cnvd
Title: OpenStack Glance拒绝服务漏洞(CNVD-2015-01203)
Description:
Glance提供restful API可以查询虚拟机镜像的metadata,并且可以获得镜像。
OpenStack Glance存在拒绝服务漏洞,由于OpenStack Glance导入任务未能更新映像,允许攻击者利用漏洞利用漏洞可使应用程序崩溃。
Severity: 中
Patch Name: OpenStack Glance拒绝服务漏洞(CNVD-2015-01203)的补丁
Patch Description:
Glance提供restful API可以查询虚拟机镜像的metadata,并且可以获得镜像。
OpenStack Glance存在拒绝服务漏洞,由于OpenStack Glance导入任务未能更新映像,允许攻击者利用漏洞利用漏洞可使应用程序崩溃。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
用户可参考如下厂商提供的安全补丁以修复该漏洞: https://review.openstack.org/#/c/156553
Reference: http://www.openwall.com/lists/oss-security/2015/02/19/8 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1881 http://www.securityfocus.com/bid/72694
Name | OpenStack Image Registry and Delivery Service (Glance) 2014.2 - 2014.2.2 |
---|
{ "bids": { "bid": { "bidNumber": "72694" } }, "cves": { "cve": { "cveNumber": "CVE-2015-1881" } }, "description": "Glance\u63d0\u4f9brestful API\u53ef\u4ee5\u67e5\u8be2\u865a\u62df\u673a\u955c\u50cf\u7684metadata,\u5e76\u4e14\u53ef\u4ee5\u83b7\u5f97\u955c\u50cf\u3002\r\n\r\nOpenStack Glance\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u7531\u4e8eOpenStack Glance\u5bfc\u5165\u4efb\u52a1\u672a\u80fd\u66f4\u65b0\u6620\u50cf\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u5229\u7528\u6f0f\u6d1e\u53ef\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u3002", "discovererName": "Abhishek Kekane", "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttps://review.openstack.org/#/c/156553", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2015-01203", "openTime": "2015-02-27", "patchDescription": "Glance\u63d0\u4f9brestful API\u53ef\u4ee5\u67e5\u8be2\u865a\u62df\u673a\u955c\u50cf\u7684metadata,\u5e76\u4e14\u53ef\u4ee5\u83b7\u5f97\u955c\u50cf\u3002\r\n\r\nOpenStack Glance\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u7531\u4e8eOpenStack Glance\u5bfc\u5165\u4efb\u52a1\u672a\u80fd\u66f4\u65b0\u6620\u50cf\uff0c\u5141\u8bb8\u653b\u51fb\u8005\u5229\u7528\u6f0f\u6d1e\u5229\u7528\u6f0f\u6d1e\u53ef\u4f7f\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "OpenStack Glance\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2015-01203\uff09\u7684\u8865\u4e01", "products": { "product": "OpenStack Image Registry and Delivery Service (Glance) 2014.2 - 2014.2.2" }, "referenceLink": "http://www.openwall.com/lists/oss-security/2015/02/19/8\r\nhttp://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1881\r\nhttp://www.securityfocus.com/bid/72694", "serverity": "\u4e2d", "submitTime": "2015-02-21", "title": "OpenStack Glance\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2015-01203\uff09" }
rhsa-2015:0938
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openstack-glance packages that fix two security issues and several\nbugs are now available for Red Hat Enterprise Linux OpenStack Platform 6.0.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Image Service (glance) provides discovery, registration, and\ndelivery services for disk and server images. It provides the ability to\ncopy or snapshot a server image, and immediately store it away. Stored\nimages can be used as a template to get new servers up and running quickly\nand more consistently than installing a server operating system and\nindividually configuring additional services.\n\nMultiple flaws were found in the glance task API that could cause untracked\nimage data to be left in the back end. A malicious user could use these\nflaws to deliberately accumulate untracked image data, and cause a denial\nof service via resource exhaustion. (CVE-2014-9684, CVE-2015-1881)\n\nThe openstack-glance packages have been upgraded to upstream version\n2014.2.3, which provides a number of bug fixes over the previous version.\n(BZ#1210457)\n\nAll openstack-glance users are advised to upgrade to these updated\npackages, which correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:0938", "url": "https://access.redhat.com/errata/RHSA-2015:0938" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/6/html/Release_Notes/index.html", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/6/html/Release_Notes/index.html" }, { "category": "external", "summary": "1194697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194697" }, { "category": "external", "summary": "1210457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210457" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_0938.json" } ], "title": "Red Hat Security Advisory: openstack-glance security and bug fix update", "tracking": { "current_release_date": "2025-09-25T11:53:32+00:00", "generator": { "date": "2025-09-25T11:53:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2015:0938", "initial_release_date": "2015-05-05T13:08:26+00:00", "revision_history": [ { "date": "2015-05-05T13:08:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-05-05T13:08:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-25T11:53:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:6::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-glance-0:2014.2.3-1.el7ost.src", "product": { "name": "openstack-glance-0:2014.2.3-1.el7ost.src", "product_id": "openstack-glance-0:2014.2.3-1.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance@2014.2.3-1.el7ost?arch=src" } } }, { "category": "product_version", "name": "python-glance-store-0:0.1.10-3.el7ost.src", "product": { "name": "python-glance-store-0:0.1.10-3.el7ost.src", "product_id": "python-glance-store-0:0.1.10-3.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-glance-store@0.1.10-3.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openstack-glance-0:2014.2.3-1.el7ost.noarch", "product": { "name": "openstack-glance-0:2014.2.3-1.el7ost.noarch", "product_id": "openstack-glance-0:2014.2.3-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance@2014.2.3-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "product": { "name": "openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "product_id": "openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance-doc@2014.2.3-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-glance-0:2014.2.3-1.el7ost.noarch", "product": { "name": "python-glance-0:2014.2.3-1.el7ost.noarch", "product_id": "python-glance-0:2014.2.3-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-glance@2014.2.3-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-glance-store-0:0.1.10-3.el7ost.noarch", "product": { "name": "python-glance-store-0:0.1.10-3.el7ost.noarch", "product_id": "python-glance-store-0:0.1.10-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-glance-store@0.1.10-3.el7ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-0:2014.2.3-1.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch" }, "product_reference": "openstack-glance-0:2014.2.3-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-0:2014.2.3-1.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src" }, "product_reference": "openstack-glance-0:2014.2.3-1.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-doc-0:2014.2.3-1.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch" }, "product_reference": "openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-glance-0:2014.2.3-1.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch" }, "product_reference": "python-glance-0:2014.2.3-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-glance-store-0:0.1.10-3.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch" }, "product_reference": "python-glance-store-0:0.1.10-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-glance-store-0:0.1.10-3.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" }, "product_reference": "python-glance-store-0:0.1.10-3.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9684", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2015-02-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1194697" } ], "notes": [ { "category": "description", "text": "Multiple flaws were found in the glance task API that could cause untracked image data to be left in the back end. A malicious user could use these flaws to deliberately accumulate untracked image data, and cause a denial of service via resource exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-glance: potential resource exhaustion and denial of service using images manipulation API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9684" }, { "category": "external", "summary": "RHBZ#1194697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9684", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9684" } ], "release_date": "2015-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-05-05T13:08:26+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 6 runs on Red Hat Enterprise\nLinux 7.1.\n\nThe Red Hat Enterprise Linux OpenStack Platform 6 Release Notes (see\nReferences section) contain the following:\n* An explanation of the way in which the provided components interact to\nform a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 6,\nincluding which channels need to be enabled and disabled.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0938" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-glance: potential resource exhaustion and denial of service using images manipulation API" }, { "cve": "CVE-2015-1881", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2015-02-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1194697" } ], "notes": [ { "category": "description", "text": "Multiple flaws were found in the glance task API that could cause untracked image data to be left in the back end. A malicious user could use these flaws to deliberately accumulate untracked image data, and cause a denial of service via resource exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-glance: potential resource exhaustion and denial of service using images manipulation API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1881" }, { "category": "external", "summary": "RHBZ#1194697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1881", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1881" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1881", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1881" } ], "release_date": "2015-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-05-05T13:08:26+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 6 runs on Red Hat Enterprise\nLinux 7.1.\n\nThe Red Hat Enterprise Linux OpenStack Platform 6 Release Notes (see\nReferences section) contain the following:\n* An explanation of the way in which the provided components interact to\nform a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 6,\nincluding which channels need to be enabled and disabled.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0938" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-glance: potential resource exhaustion and denial of service using images manipulation API" } ] }
RHSA-2015:0938
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openstack-glance packages that fix two security issues and several\nbugs are now available for Red Hat Enterprise Linux OpenStack Platform 6.0.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Image Service (glance) provides discovery, registration, and\ndelivery services for disk and server images. It provides the ability to\ncopy or snapshot a server image, and immediately store it away. Stored\nimages can be used as a template to get new servers up and running quickly\nand more consistently than installing a server operating system and\nindividually configuring additional services.\n\nMultiple flaws were found in the glance task API that could cause untracked\nimage data to be left in the back end. A malicious user could use these\nflaws to deliberately accumulate untracked image data, and cause a denial\nof service via resource exhaustion. (CVE-2014-9684, CVE-2015-1881)\n\nThe openstack-glance packages have been upgraded to upstream version\n2014.2.3, which provides a number of bug fixes over the previous version.\n(BZ#1210457)\n\nAll openstack-glance users are advised to upgrade to these updated\npackages, which correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:0938", "url": "https://access.redhat.com/errata/RHSA-2015:0938" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/6/html/Release_Notes/index.html", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/6/html/Release_Notes/index.html" }, { "category": "external", "summary": "1194697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194697" }, { "category": "external", "summary": "1210457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210457" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_0938.json" } ], "title": "Red Hat Security Advisory: openstack-glance security and bug fix update", "tracking": { "current_release_date": "2025-09-25T11:53:32+00:00", "generator": { "date": "2025-09-25T11:53:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2015:0938", "initial_release_date": "2015-05-05T13:08:26+00:00", "revision_history": [ { "date": "2015-05-05T13:08:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-05-05T13:08:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-25T11:53:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:6::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-glance-0:2014.2.3-1.el7ost.src", "product": { "name": "openstack-glance-0:2014.2.3-1.el7ost.src", "product_id": "openstack-glance-0:2014.2.3-1.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance@2014.2.3-1.el7ost?arch=src" } } }, { "category": "product_version", "name": "python-glance-store-0:0.1.10-3.el7ost.src", "product": { "name": "python-glance-store-0:0.1.10-3.el7ost.src", "product_id": "python-glance-store-0:0.1.10-3.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-glance-store@0.1.10-3.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openstack-glance-0:2014.2.3-1.el7ost.noarch", "product": { "name": "openstack-glance-0:2014.2.3-1.el7ost.noarch", "product_id": "openstack-glance-0:2014.2.3-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance@2014.2.3-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "product": { "name": "openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "product_id": "openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance-doc@2014.2.3-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-glance-0:2014.2.3-1.el7ost.noarch", "product": { "name": "python-glance-0:2014.2.3-1.el7ost.noarch", "product_id": "python-glance-0:2014.2.3-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-glance@2014.2.3-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-glance-store-0:0.1.10-3.el7ost.noarch", "product": { "name": "python-glance-store-0:0.1.10-3.el7ost.noarch", "product_id": "python-glance-store-0:0.1.10-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-glance-store@0.1.10-3.el7ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-0:2014.2.3-1.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch" }, "product_reference": "openstack-glance-0:2014.2.3-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-0:2014.2.3-1.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src" }, "product_reference": "openstack-glance-0:2014.2.3-1.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-doc-0:2014.2.3-1.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch" }, "product_reference": "openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-glance-0:2014.2.3-1.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch" }, "product_reference": "python-glance-0:2014.2.3-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-glance-store-0:0.1.10-3.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch" }, "product_reference": "python-glance-store-0:0.1.10-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-glance-store-0:0.1.10-3.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" }, "product_reference": "python-glance-store-0:0.1.10-3.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9684", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2015-02-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1194697" } ], "notes": [ { "category": "description", "text": "Multiple flaws were found in the glance task API that could cause untracked image data to be left in the back end. A malicious user could use these flaws to deliberately accumulate untracked image data, and cause a denial of service via resource exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-glance: potential resource exhaustion and denial of service using images manipulation API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9684" }, { "category": "external", "summary": "RHBZ#1194697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9684", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9684" } ], "release_date": "2015-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-05-05T13:08:26+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 6 runs on Red Hat Enterprise\nLinux 7.1.\n\nThe Red Hat Enterprise Linux OpenStack Platform 6 Release Notes (see\nReferences section) contain the following:\n* An explanation of the way in which the provided components interact to\nform a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 6,\nincluding which channels need to be enabled and disabled.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0938" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-glance: potential resource exhaustion and denial of service using images manipulation API" }, { "cve": "CVE-2015-1881", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2015-02-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1194697" } ], "notes": [ { "category": "description", "text": "Multiple flaws were found in the glance task API that could cause untracked image data to be left in the back end. A malicious user could use these flaws to deliberately accumulate untracked image data, and cause a denial of service via resource exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-glance: potential resource exhaustion and denial of service using images manipulation API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1881" }, { "category": "external", "summary": "RHBZ#1194697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1881", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1881" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1881", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1881" } ], "release_date": "2015-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-05-05T13:08:26+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 6 runs on Red Hat Enterprise\nLinux 7.1.\n\nThe Red Hat Enterprise Linux OpenStack Platform 6 Release Notes (see\nReferences section) contain the following:\n* An explanation of the way in which the provided components interact to\nform a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 6,\nincluding which channels need to be enabled and disabled.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0938" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-glance: potential resource exhaustion and denial of service using images manipulation API" } ] }
rhsa-2015_0938
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated openstack-glance packages that fix two security issues and several\nbugs are now available for Red Hat Enterprise Linux OpenStack Platform 6.0.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenStack Image Service (glance) provides discovery, registration, and\ndelivery services for disk and server images. It provides the ability to\ncopy or snapshot a server image, and immediately store it away. Stored\nimages can be used as a template to get new servers up and running quickly\nand more consistently than installing a server operating system and\nindividually configuring additional services.\n\nMultiple flaws were found in the glance task API that could cause untracked\nimage data to be left in the back end. A malicious user could use these\nflaws to deliberately accumulate untracked image data, and cause a denial\nof service via resource exhaustion. (CVE-2014-9684, CVE-2015-1881)\n\nThe openstack-glance packages have been upgraded to upstream version\n2014.2.3, which provides a number of bug fixes over the previous version.\n(BZ#1210457)\n\nAll openstack-glance users are advised to upgrade to these updated\npackages, which correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:0938", "url": "https://access.redhat.com/errata/RHSA-2015:0938" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/6/html/Release_Notes/index.html", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/6/html/Release_Notes/index.html" }, { "category": "external", "summary": "1194697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194697" }, { "category": "external", "summary": "1210457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1210457" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_0938.json" } ], "title": "Red Hat Security Advisory: openstack-glance security and bug fix update", "tracking": { "current_release_date": "2024-11-22T09:06:23+00:00", "generator": { "date": "2024-11-22T09:06:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:0938", "initial_release_date": "2015-05-05T13:08:26+00:00", "revision_history": [ { "date": "2015-05-05T13:08:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-05-05T13:08:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T09:06:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product": { "name": "Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openstack:6::el7" } } } ], "category": "product_family", "name": "Red Hat OpenStack Platform" }, { "branches": [ { "category": "product_version", "name": "openstack-glance-0:2014.2.3-1.el7ost.src", "product": { "name": "openstack-glance-0:2014.2.3-1.el7ost.src", "product_id": "openstack-glance-0:2014.2.3-1.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance@2014.2.3-1.el7ost?arch=src" } } }, { "category": "product_version", "name": "python-glance-store-0:0.1.10-3.el7ost.src", "product": { "name": "python-glance-store-0:0.1.10-3.el7ost.src", "product_id": "python-glance-store-0:0.1.10-3.el7ost.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-glance-store@0.1.10-3.el7ost?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "openstack-glance-0:2014.2.3-1.el7ost.noarch", "product": { "name": "openstack-glance-0:2014.2.3-1.el7ost.noarch", "product_id": "openstack-glance-0:2014.2.3-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance@2014.2.3-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "product": { "name": "openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "product_id": "openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openstack-glance-doc@2014.2.3-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-glance-0:2014.2.3-1.el7ost.noarch", "product": { "name": "python-glance-0:2014.2.3-1.el7ost.noarch", "product_id": "python-glance-0:2014.2.3-1.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-glance@2014.2.3-1.el7ost?arch=noarch" } } }, { "category": "product_version", "name": "python-glance-store-0:0.1.10-3.el7ost.noarch", "product": { "name": "python-glance-store-0:0.1.10-3.el7ost.noarch", "product_id": "python-glance-store-0:0.1.10-3.el7ost.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-glance-store@0.1.10-3.el7ost?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-0:2014.2.3-1.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch" }, "product_reference": "openstack-glance-0:2014.2.3-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-0:2014.2.3-1.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src" }, "product_reference": "openstack-glance-0:2014.2.3-1.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "openstack-glance-doc-0:2014.2.3-1.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch" }, "product_reference": "openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-glance-0:2014.2.3-1.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch" }, "product_reference": "python-glance-0:2014.2.3-1.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-glance-store-0:0.1.10-3.el7ost.noarch as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch" }, "product_reference": "python-glance-store-0:0.1.10-3.el7ost.noarch", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" }, { "category": "default_component_of", "full_product_name": { "name": "python-glance-store-0:0.1.10-3.el7ost.src as a component of Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7", "product_id": "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" }, "product_reference": "python-glance-store-0:0.1.10-3.el7ost.src", "relates_to_product_reference": "7Server-RH7-RHOS-6.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9684", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2015-02-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1194697" } ], "notes": [ { "category": "description", "text": "Multiple flaws were found in the glance task API that could cause untracked image data to be left in the back end. A malicious user could use these flaws to deliberately accumulate untracked image data, and cause a denial of service via resource exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-glance: potential resource exhaustion and denial of service using images manipulation API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-9684" }, { "category": "external", "summary": "RHBZ#1194697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-9684", "url": "https://www.cve.org/CVERecord?id=CVE-2014-9684" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-9684", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9684" } ], "release_date": "2015-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-05-05T13:08:26+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 6 runs on Red Hat Enterprise\nLinux 7.1.\n\nThe Red Hat Enterprise Linux OpenStack Platform 6 Release Notes (see\nReferences section) contain the following:\n* An explanation of the way in which the provided components interact to\nform a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 6,\nincluding which channels need to be enabled and disabled.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0938" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-glance: potential resource exhaustion and denial of service using images manipulation API" }, { "cve": "CVE-2015-1881", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2015-02-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1194697" } ], "notes": [ { "category": "description", "text": "Multiple flaws were found in the glance task API that could cause untracked image data to be left in the back end. A malicious user could use these flaws to deliberately accumulate untracked image data, and cause a denial of service via resource exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "openstack-glance: potential resource exhaustion and denial of service using images manipulation API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1881" }, { "category": "external", "summary": "RHBZ#1194697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1194697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1881", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1881" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1881", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1881" } ], "release_date": "2015-02-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-05-05T13:08:26+00:00", "details": "Before applying this update, ensure all previously released errata relevant\nto your system have been applied.\n\nRed Hat Enterprise Linux OpenStack Platform 6 runs on Red Hat Enterprise\nLinux 7.1.\n\nThe Red Hat Enterprise Linux OpenStack Platform 6 Release Notes (see\nReferences section) contain the following:\n* An explanation of the way in which the provided components interact to\nform a working cloud computing environment.\n* Technology Previews, Recommended Practices, and Known Issues.\n* The channels required for Red Hat Enterprise Linux OpenStack Platform 6,\nincluding which channels need to be enabled and disabled.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:0938" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:openstack-glance-0:2014.2.3-1.el7ost.src", "7Server-RH7-RHOS-6.0:openstack-glance-doc-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-0:2014.2.3-1.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.noarch", "7Server-RH7-RHOS-6.0:python-glance-store-0:0.1.10-3.el7ost.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openstack-glance: potential resource exhaustion and denial of service using images manipulation API" } ] }
gsd-2015-1881
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2015-1881", "description": "OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them, a different vulnerability than CVE-2014-9684.", "id": "GSD-2015-1881", "references": [ "https://www.suse.com/security/cve/CVE-2015-1881.html", "https://access.redhat.com/errata/RHSA-2015:0938" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-1881" ], "details": "OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them, a different vulnerability than CVE-2014-9684.", "id": "GSD-2015-1881", "modified": "2023-12-13T01:20:05.097732Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-1881", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them, a different vulnerability than CVE-2014-9684." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[openstack-announce] 20150223 [OSSA 2015-004] Glance import task leaks image in backend (CVE-2014-9684, CVE-2015-1881)", "refsource": "MLIST", "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-February/000336.html" }, { "name": "RHSA-2015:0938", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-0938.html" }, { "name": "https://bugs.launchpad.net/glance/+bug/1420696", "refsource": "CONFIRM", "url": "https://bugs.launchpad.net/glance/+bug/1420696" }, { "name": "72694", "refsource": "BID", "url": "http://www.securityfocus.com/bid/72694" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2014.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2014.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2014.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-1881" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them, a different vulnerability than CVE-2014-9684." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.launchpad.net/glance/+bug/1420696", "refsource": "CONFIRM", "tags": [ "Exploit" ], "url": "https://bugs.launchpad.net/glance/+bug/1420696" }, { "name": "[openstack-announce] 20150223 [OSSA 2015-004] Glance import task leaks image in backend (CVE-2014-9684, CVE-2015-1881)", "refsource": "MLIST", "tags": [ "Vendor Advisory" ], "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-February/000336.html" }, { "name": "RHSA-2015:0938", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-0938.html" }, { "name": "72694", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/72694" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-01-03T02:59Z", "publishedDate": "2015-02-24T15:59Z" } } }
pysec-2015-38
Vulnerability from pysec
OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them, a different vulnerability than CVE-2014-9684.
Name | purl | glance | glance |
---|
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "glance" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "11.0.0a0" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "PyPI", "name": "glance" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "11.0.0a0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2015-1881" ], "details": "OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them, a different vulnerability than CVE-2014-9684.", "id": "PYSEC-2015-38", "modified": "2024-11-25T18:35:18.357593Z", "published": "2015-02-24T15:59:00Z", "references": [ { "type": "EVIDENCE", "url": "https://bugs.launchpad.net/glance/+bug/1420696" }, { "type": "ADVISORY", "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-February/000336.html" }, { "type": "ADVISORY", "url": "http://rhn.redhat.com/errata/RHSA-2015-0938.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/72694" } ] }
ghsa-4jp4-3c62-r8jv
Vulnerability from github
8.7 (High) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them, a different vulnerability than CVE-2014-9684.
{ "affected": [ { "package": { "ecosystem": "PyPI", "name": "glance" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "11.0.0a0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2015-1881" ], "database_specific": { "cwe_ids": [ "CWE-770" ], "github_reviewed": true, "github_reviewed_at": "2024-05-14T21:32:17Z", "nvd_published_at": "2015-02-24T15:59:00Z", "severity": "HIGH" }, "details": "OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them, a different vulnerability than CVE-2014-9684.", "id": "GHSA-4jp4-3c62-r8jv", "modified": "2024-11-26T18:24:36Z", "published": "2022-05-17T03:09:50Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1881" }, { "type": "WEB", "url": "https://github.com/openstack/glance/commit/25a722e614eacc47e4658f0bca6343fa52f7d03f" }, { "type": "WEB", "url": "https://github.com/openstack/glance/commit/78b5b0a9575cd5e9c4543ec0e8fd6072af1f0ebb" }, { "type": "WEB", "url": "https://bugs.launchpad.net/glance/+bug/1420696" }, { "type": "PACKAGE", "url": "https://github.com/openstack/glance" }, { "type": "WEB", "url": "https://github.com/pypa/advisory-database/tree/main/vulns/glance/PYSEC-2015-38.yaml" }, { "type": "WEB", "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-February/000336.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-0938.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "OpenStack Glance Denial of service by creating a large number of images " }
fkie_cve-2015-1881
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
openstack | image_registry_and_delivery_service_\(glance\) | 2014.2 | |
openstack | image_registry_and_delivery_service_\(glance\) | 2014.2.1 | |
openstack | image_registry_and_delivery_service_\(glance\) | 2014.2.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2014.2:*:*:*:*:*:*:*", "matchCriteriaId": "072E34B9-5979-4291-B1D2-762A7C515641", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2014.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "FEAB5B21-2F3D-4A5D-9554-B7F984FF5D48", "vulnerable": true }, { "criteria": "cpe:2.3:a:openstack:image_registry_and_delivery_service_\\(glance\\):2014.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "071E2B7B-5E6B-4108-8E46-5E72AC22B168", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenStack Image Registry and Delivery Service (Glance) 2014.2 through 2014.2.2 does not properly remove images, which allows remote authenticated users to cause a denial of service (disk consumption) by creating a large number of images using the task v2 API and then deleting them, a different vulnerability than CVE-2014-9684." }, { "lang": "es", "value": "OpenStack Image Registry and Delivery Service (Glance) 2014.2 hasta 2014.2.2 no elimina correctamente las im\u00e1genes, lo que permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (consumo de disco) mediante la creaci\u00f3n de un n\u00famero grande de im\u00e1genes al utilizar la API v2 de tareas y posteriormente elimin\u00e1ndolas, una vulnerabilidad diferente a CVE-2014-9684." } ], "id": "CVE-2015-1881", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-02-24T15:59:08.567", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-February/000336.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-0938.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/72694" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://bugs.launchpad.net/glance/+bug/1420696" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.openstack.org/pipermail/openstack-announce/2015-February/000336.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-0938.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/72694" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://bugs.launchpad.net/glance/+bug/1420696" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.