First published: Fri Jan 23 2015(Updated: )
OpenStack Glance 2014.2.x through 2014.2.1, 2014.1.3, and earlier allows remote authenticated users to bypass the storage quota and cause a denial of service (disk consumption) by deleting an image in the saving state.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/glance | <11.0.0a0 | 11.0.0a0 |
redhat openstack | =5.0 | |
OpenStack Glance | <=2014.1.3 | |
OpenStack Glance | =2014.2 | |
OpenStack Glance | =2014.2-rc1 | |
OpenStack Glance | =2014.2-rc2 | |
OpenStack Glance | =2014.2-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9623 is considered to have a moderate severity level due to its potential to cause denial of service through disk consumption.
To fix CVE-2014-9623, upgrade OpenStack Glance to version 11.0.0a0 or later, or apply relevant patches provided by your distribution.
CVE-2014-9623 affects OpenStack Glance versions from 2014.2.x to 2014.2.1, as well as 2014.1.3 and earlier.
No, CVE-2014-9623 requires remote authenticated users to exploit the vulnerability.
The impact of CVE-2014-9623 could lead to denial of service due to excessive disk usage by bypassing storage quotas.