First published: Mon Aug 25 2014(Updated: )
OpenStack Image Registry and Delivery Service (Glance) before 2013.2.4, 2014.x before 2014.1.3, and Juno before Juno-3, when using the V2 API, does not properly enforce the image_size_cap configuration option, which allows remote authenticated users to cause a denial of service (disk consumption) by uploading a large image.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/glance | <11.0.0a0 | 11.0.0a0 |
OpenStack Glance | <=2013.2.3 | |
OpenStack Glance | =2013.2 | |
OpenStack Glance | =2013.2.1 | |
OpenStack Glance | =2013.2.2 | |
OpenStack Glance | =2014.1 | |
OpenStack Glance | =2014.1.1 | |
OpenStack Glance | =2014.1.2 | |
OpenStack Glance | =juno-1 | |
OpenStack Glance | =juno-2 | |
Ubuntu Linux | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5356 has a medium severity level as it can lead to denial of service due to disk consumption.
To fix CVE-2014-5356, upgrade to OpenStack Glance version 2013.2.4, 2014.1.3, or Juno-3 or later.
OpenStack Glance versions before 2013.2.4, 2014.x before 2014.1.3, and Juno before Juno-3 are affected by CVE-2014-5356.
CVE-2014-5356 exploits a failure to enforce the image_size_cap configuration option in the V2 API.
Yes, CVE-2014-5356 can be exploited by remote authenticated users causing denial of service.