Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2015:1897 - Security Advisory
Issued:
2015-10-15
Updated:
2015-10-15

RHSA-2015:1897 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: openstack-glance security update

Type/Severity

Security Advisory: Moderate

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated openstack-glance packages that fix two security issues are now
available for Red Hat Enterprise Linux OpenStack Platform 5.0, 6.0, and 7.0.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

Description

OpenStack Image service (glance) provides discovery, registration, and
delivery services for disk and server images. It provides the ability to
copy or snapshot a server image, and immediately store it away. Stored
images can be used as a template to get new servers up and running quickly
and more consistently than installing a server operating system and
individually configuring additional services.

A flaw was discovered in the OpenStack Image service where a
tenant could manipulate the status of their images by submitting an
HTTP PUT request together with an 'x-image-meta-status' header. A
malicious tenant could exploit this flaw to reactivate disabled images,
bypass storage quotas, and in some cases replace image contents (where
they have owner access). Setups using the Image service's v1 API could
allow the illegal modification of image status. Additionally, setups
which also use the v2 API could allow a subsequent re-upload of image
contents. (CVE-2015-5251)

A race-condition flaw was discovered in the OpenStack Image service.
When images in the upload state were deleted using a token close to
expiration, untracked image data could accumulate in the back end.
Because untracked data does not count towards the storage quota, an
attacker could use this flaw to cause a denial of service through
resource exhaustion. (CVE-2015-5286)

Red Hat would like to thank the OpenStack project for reporting these
issues. Upstream acknowledges Hemanth Makkapati of Rackspace as the
original reporter of CVE-2015-5251, and Mike Fedosin and Alexei Galkin of
Mirantis as the original reporters of CVE-2015-5286.

All openstack-glance users are advised to upgrade to these updated
packages, which correct these issues. After installing the updated
packages, running Image service services will be restarted
automatically.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258

Affected Products

  • Red Hat OpenStack 7 x86_64
  • Red Hat OpenStack 6.0 x86_64
  • Red Hat OpenStack 5.0 for RHEL 7 x86_64
  • Red Hat OpenStack 5.0 for RHEL 6 x86_64

Fixes

  • BZ - 1263511 - CVE-2015-5251 openstack-glance allows illegal modification of image status
  • BZ - 1267516 - CVE-2015-5286 openstack-glance: Storage overrun by deleting images

CVEs

  • CVE-2015-5251
  • CVE-2015-5286

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat OpenStack 7

SRPM
openstack-glance-2015.1.1-3.el7ost.src.rpm SHA-256: fbdc8b9430004b9b474b805e2cc4adfe02c75be236d768478d519bf3e5377160
x86_64
openstack-glance-2015.1.1-3.el7ost.noarch.rpm SHA-256: ca7d776ac9ad7e49b4d3b1485e917e6b19e586a7db01dbf720eb18d27c245a66
openstack-glance-doc-2015.1.1-3.el7ost.noarch.rpm SHA-256: 308ebf5291eaf041b262be9adbde6dbf25b92aaaf6cc184fc339e73a83832439
python-glance-2015.1.1-3.el7ost.noarch.rpm SHA-256: ee2d11bb300092ce27e3894a34e24ce66f2b1698dc5e1e5c75834430c00b6cf6

Red Hat OpenStack 6.0

SRPM
openstack-glance-2014.2.3-3.el7ost.src.rpm SHA-256: bad5578cab3078047f17ddde0c5d18bd58d935682fd2dcff766f1b020da5ca35
x86_64
openstack-glance-2014.2.3-3.el7ost.noarch.rpm SHA-256: 37691f51b4fddf4ee5dfba43b45375a9fe56382fbcd82e2ebdcd176d1af481dd
openstack-glance-doc-2014.2.3-3.el7ost.noarch.rpm SHA-256: f93b0c0a210acd41afce1f9f8f866bbc9f2db94c9b8d14f0b19da0fc8fdc81fd
python-glance-2014.2.3-3.el7ost.noarch.rpm SHA-256: 21fb29d61ef8314d98a8aca1744e793cd8f4680f04cc70aa70565d48b9f5e71d

Red Hat OpenStack 5.0 for RHEL 7

SRPM
openstack-glance-2014.1.5-3.el7ost.src.rpm SHA-256: e5d1522c72d832c90b0b9084d74d19eab67a6c7c38933f5822cb6daec11d3ba0
x86_64
openstack-glance-2014.1.5-3.el7ost.noarch.rpm SHA-256: 8b7c588484d94db2c8d684f9ff719e6506727a7e4c994ebfbe5f856ccf4debc8
openstack-glance-doc-2014.1.5-3.el7ost.noarch.rpm SHA-256: 4d4c64d8e19278c00f4936c51cd738b81ce72d37e7269109eeeae0b954bf2f15
python-glance-2014.1.5-3.el7ost.noarch.rpm SHA-256: 65db5b17dc2deedc68c98de56bcc12487fa0e94faed73d5736559fbb13a7b12c

Red Hat OpenStack 5.0 for RHEL 6

SRPM
openstack-glance-2014.1.5-3.el6ost.src.rpm SHA-256: 1e3737844bc7eb053f5ecbebb7e82ead09936c9f9eedf809da2257d92563c519
x86_64
openstack-glance-2014.1.5-3.el6ost.noarch.rpm SHA-256: 52a676fad199a55d09f733ca1a069510460b3ba3d9717f9222091381b37d2e7d
openstack-glance-doc-2014.1.5-3.el6ost.noarch.rpm SHA-256: c61cafdda744b871bb4a6112894306052b5bb19a791d92a509f38748e63e0215
python-glance-2014.1.5-3.el6ost.noarch.rpm SHA-256: 031a1f9e8942b0eb7d5f4bf31e29355a20d70f6e6493d828111359f6c09d7977

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility