CVE-2015-5162

NameCVE-2015-5162
DescriptionThe image parser in OpenStack Cinder 7.0.2 and 8.0.0 through 8.1.1; Glance before 11.0.1 and 12.0.0; and Nova before 12.0.4 and 13.0.0 does not properly limit qemu-img calls, which might allow attackers to cause a denial of service (memory and disk consumption) via a crafted disk image.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
cinder (PTS)jessie, jessie (lts)2014.1.3-11+deb8u1vulnerable
stretch2:9.0.0-4fixed
buster (security), buster, buster (lts)2:13.0.7-1+deb10u2fixed
bullseye2:17.0.1-1+deb11u1fixed
bullseye (security)2:17.4.0-1~deb11u2fixed
bookworm (security), bookworm2:21.3.1-1~deb12u1fixed
trixie2:25.0.0-1fixed
sid2:25.0.0-2fixed
glance (PTS)jessie2014.1.3-12+deb8u1vulnerable
stretch2:13.0.0-4fixed
buster (security), buster, buster (lts)2:17.0.0-5+deb10u1fixed
bullseye2:21.0.0-2+deb11u1fixed
bullseye (security)2:21.1.0-1+deb11u2fixed
bookworm (security), bookworm2:25.1.0-2+deb12u1fixed
sid, trixie2:29.0.0-1fixed
nova (PTS)jessie2014.1.3-11vulnerable
stretch (security), stretch (lts), stretch2:14.0.0-4+deb9u1fixed
buster (security), buster, buster (lts)2:18.1.0-6+deb10u2fixed
bullseye2:22.0.1-2+deb11u1fixed
bullseye (security)2:22.4.0-1~deb11u5fixed
bookworm (security), bookworm2:26.2.2-1~deb12u3fixed
trixie2:30.0.0-1fixed
sid2:30.0.0-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
cindersource(unstable)2:8.0.0-1
glancesourcewheezy(unfixed)end-of-life
glancesource(unstable)2:12.0.0-1low
novasource(unstable)2:13.0.0-1low

Notes

[jessie] - cinder <no-dsa> (Minor issue)
[jessie] - glance <no-dsa> (Minor issue)
[wheezy] - glance <end-of-life> (not supported in Wheezy)
[jessie] - nova <no-dsa> (Minor issue)
[wheezy] - nova <no-dsa> (Minor issue)
Patches: https://www.openwall.com/lists/oss-security/2016/10/06/8

Search for package or bug name: Reporting problems