Red Hat Customer Portal

Skip to main content

Security Advisory Moderate: openstack-glance security update

Advisory: RHSA-2015:1897-2
Type: Security Advisory
Severity: Moderate
Issued on: 2015-10-15
Last updated on: 2015-10-15
Affected Products: Red Hat OpenStack 5.0 for RHEL 6
Red Hat OpenStack 5.0 for RHEL 7
Red Hat OpenStack 6.0 for RHEL 7
CVEs (cve.mitre.org): CVE-2015-5251
CVE-2015-5286

Details

Updated openstack-glance packages that fix two security issues are now
available for Red Hat Enterprise Linux OpenStack Platform 5.0, 6.0, and 7.0.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

OpenStack Image service (glance) provides discovery, registration, and
delivery services for disk and server images. It provides the ability to
copy or snapshot a server image, and immediately store it away. Stored
images can be used as a template to get new servers up and running quickly
and more consistently than installing a server operating system and
individually configuring additional services.

A flaw was discovered in the OpenStack Image service where a
tenant could manipulate the status of their images by submitting an
HTTP PUT request together with an 'x-image-meta-status' header. A
malicious tenant could exploit this flaw to reactivate disabled images,
bypass storage quotas, and in some cases replace image contents (where
they have owner access). Setups using the Image service's v1 API could
allow the illegal modification of image status. Additionally, setups
which also use the v2 API could allow a subsequent re-upload of image
contents. (CVE-2015-5251)

A race-condition flaw was discovered in the OpenStack Image service.
When images in the upload state were deleted using a token close to
expiration, untracked image data could accumulate in the back end.
Because untracked data does not count towards the storage quota, an
attacker could use this flaw to cause a denial of service through
resource exhaustion. (CVE-2015-5286)

Red Hat would like to thank the OpenStack project for reporting these
issues. Upstream acknowledges Hemanth Makkapati of Rackspace as the
original reporter of CVE-2015-5251, and Mike Fedosin and Alexei Galkin of
Mirantis as the original reporters of CVE-2015-5286.

All openstack-glance users are advised to upgrade to these updated
packages, which correct these issues. After installing the updated
packages, running Image service services will be restarted
automatically.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Updated packages

Red Hat OpenStack 5.0 for RHEL 6

SRPMS:
openstack-glance-2014.1.5-3.el6ost.src.rpm
File outdated by:  RHSA-2016:0358
    MD5: 077cf767ed1b20426deaceec781438e5
SHA-256: 1e3737844bc7eb053f5ecbebb7e82ead09936c9f9eedf809da2257d92563c519
 
x86_64:
openstack-glance-2014.1.5-3.el6ost.noarch.rpm
File outdated by:  RHSA-2016:0358
    MD5: 5e06b3070bbd380791f1125aba8e0d1a
SHA-256: 52a676fad199a55d09f733ca1a069510460b3ba3d9717f9222091381b37d2e7d
openstack-glance-doc-2014.1.5-3.el6ost.noarch.rpm
File outdated by:  RHSA-2016:0358
    MD5: b42d3d7074d0a692d817348a0e3cce3d
SHA-256: c61cafdda744b871bb4a6112894306052b5bb19a791d92a509f38748e63e0215
python-glance-2014.1.5-3.el6ost.noarch.rpm
File outdated by:  RHSA-2016:0358
    MD5: c0ca33c0e42a7327e9c63581e4369338
SHA-256: 031a1f9e8942b0eb7d5f4bf31e29355a20d70f6e6493d828111359f6c09d7977
 
Red Hat OpenStack 5.0 for RHEL 7

SRPMS:
openstack-glance-2014.1.5-3.el7ost.src.rpm
File outdated by:  RHSA-2016:0354
    MD5: 3e9077429061f866c19af89f4599c4c2
SHA-256: e5d1522c72d832c90b0b9084d74d19eab67a6c7c38933f5822cb6daec11d3ba0
 
x86_64:
openstack-glance-2014.1.5-3.el7ost.noarch.rpm
File outdated by:  RHSA-2016:0354
    MD5: ebc23bd0a39c8de7773ca98944b2b6d2
SHA-256: 8b7c588484d94db2c8d684f9ff719e6506727a7e4c994ebfbe5f856ccf4debc8
openstack-glance-doc-2014.1.5-3.el7ost.noarch.rpm
File outdated by:  RHSA-2016:0354
    MD5: bbf401983472139d222d5df0c3162168
SHA-256: 4d4c64d8e19278c00f4936c51cd738b81ce72d37e7269109eeeae0b954bf2f15
python-glance-2014.1.5-3.el7ost.noarch.rpm
File outdated by:  RHSA-2016:0354
    MD5: 8acd461d73cb93882e72dc6bd103ad0c
SHA-256: 65db5b17dc2deedc68c98de56bcc12487fa0e94faed73d5736559fbb13a7b12c
 
Red Hat OpenStack 6.0 for RHEL 7

SRPMS:
openstack-glance-2014.2.3-3.el7ost.src.rpm
File outdated by:  RHSA-2016:0309
    MD5: e6aef3d7f77a1e48aa40fc5e1e59f4c4
SHA-256: bad5578cab3078047f17ddde0c5d18bd58d935682fd2dcff766f1b020da5ca35
 
x86_64:
openstack-glance-2014.2.3-3.el7ost.noarch.rpm
File outdated by:  RHSA-2016:0309
    MD5: 01712a5b3f666e847e2017095fdf0cdd
SHA-256: 37691f51b4fddf4ee5dfba43b45375a9fe56382fbcd82e2ebdcd176d1af481dd
openstack-glance-doc-2014.2.3-3.el7ost.noarch.rpm
File outdated by:  RHSA-2016:0309
    MD5: f64e17687b08c868e5bc8d6a71e0a2fe
SHA-256: f93b0c0a210acd41afce1f9f8f866bbc9f2db94c9b8d14f0b19da0fc8fdc81fd
python-glance-2014.2.3-3.el7ost.noarch.rpm
File outdated by:  RHSA-2016:0309
    MD5: ccdfe29821392aa807374227fae830a5
SHA-256: 21fb29d61ef8314d98a8aca1744e793cd8f4680f04cc70aa70565d48b9f5e71d
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1263511 - CVE-2015-5251 openstack-glance allows illegal modification of image status
1267516 - CVE-2015-5286 openstack-glance: Storage overrun by deleting images


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/