Note: Keystone Request / Header Size Limits Required to Avoid DoS
Bug #1155566 reported by
Robert Clark
This bug affects 2 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
OpenStack Security Notes |
Fix Released
|
High
|
Robert Clark |
Bug Description
Requests with large POST body can crash Keystone or underlying services.
-----
### Summary ###
Concurrent Keystone POST requests with large body messages are held in memory without filtering or rate limiting, this can lead to resource exhaustion on the Keystone server.
### Affected Services / Software ###
Keystone, Databases
### Discussion ###
### Recommended Actions ###
### Contacts / References ###
CVE References
To post a comment you must log in.
https:/ /bugs.launchpad .net/keystone/ +bug/1098177