Summary: | <sys-cluster/swift-2.5.0-r2 - Swift proxy-server DoS through Large Object (CVE-2016-{0737,0738}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Matthew Thode ( prometheanfire ) <prometheanfire> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://review.openstack.org/#/c/217750/ | ||
Whiteboard: | B3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Matthew Thode ( prometheanfire )
![]() ![]() ![]() ![]() amd64 stable allarches stable (should have put that in before), cleaned up CVE-2016-0738 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0738): OpenStack Object Storage (Swift) before 2.3.1 (Kilo), 2.4.x, and 2.5.x before 2.5.1 (Liberty) do not properly close server connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL. CVE-2016-0737 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0737): OpenStack Object Storage (Swift) before 2.4.0 does not properly close client connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL. GLSA Vote: No |