Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2014-8124

Published: 12 December 2014

OpenStack Dashboard (Horizon) before 2014.1.3 and 2014.2.x before 2014.2.1 does not properly handle session records when using a db or memcached session engine, which allows remote attackers to cause a denial of service via a large number of requests to the login page.

Notes

AuthorNote
mdeslaur
the fix for CVE-2014-8124 introduced a regression, which is
fixed here:
https://review.openstack.org/#/c/142737/
seth-arnold
The python-django-openstack-auth regression fix is currently only
included in the wily package (2015-5-14) -- however, no one has complained
and testing hasn't demonstrated any problems.
horizon in precise does not appear to take the operations that auto-
instantiated django sessions in the newer releases; it looks safe.

Priority

Medium

Status

Package Release Status
horizon
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Not vulnerable
(see notes)
trusty
Released (1:2014.1.4-0ubuntu2)
upstream
Released (2014.1.3-6)
utopic Not vulnerable
(1:2014.2.1-0ubuntu2)
vivid Not vulnerable
(1:2015.1~b1-0ubuntu1)
Patches:
upstream: https://review.openstack.org/140353
upstream: https://review.openstack.org/140358
upstream: https://review.openstack.org/140356

python-django-openstack-auth
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

trusty Does not exist
(trusty was not-affected [see notes])
upstream
Released (1.1.6-5)
utopic Not vulnerable
(see notes)
vivid Not vulnerable
(see notes)
Patches:



upstream: https://review.openstack.org/140352