Updated openstack-cinder packages that fix one security issue and multiplebugs are now available for Red Hat Enterprise Linux OpenStack Platform 5.0and 6.0.Red Hat Product Security has rated this update as having Important securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section.

OpenStack Block Storage (cinder) manages block storage mounting and thepresentation of such mounted block storage to instances. The backendphysical storage can consist of local disks, or Fiber Channel, iSCSI, andNFS mounts attached to Compute nodes. In addition, Block Storage supportsvolume backups, and snapshots for temporary save and restore operations.Programatic management is available via Block Storage’s API.A flaw was found in the cinder upload-to-image functionality. Whenprocessing a malicious qcow2 header cinder could be tricked into readingan arbitrary file from the cinder host. (CVE-2015-1851)All users of openstack-cinder are advised to upgrade to these updatedpackages, which correct these issues. After installing the updatedpackages, the cinder running services will be restarted automatically.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat OpenStack 5.0 for RHEL 6

SRPMS:
openstack-cinder-2014.1.4-1.1.el6ost.src.rpm
    MD5: c8c043bfa2ebc1e1c7cdbb72ca603a36SHA-256: 3e6e6a56c37effebe484f947d2eb34089be1c84b0dbf93d3e118b701d408ccff
 
x86_64:
openstack-cinder-2014.1.4-1.1.el6ost.noarch.rpm
    MD5: c74d07d88ee7b4fdb74df65da8e33760SHA-256: 12ba52e4da1256d3a68be6899fe7a3bf6b05b6d4e7fdd7c0e57c413976ebd9fe
openstack-cinder-doc-2014.1.4-1.1.el6ost.noarch.rpm
    MD5: 0585b633f6ab59a18b8ecd93040eb81eSHA-256: 07ffe6ab90d8172dc048eca628d2547831569f3d8a0e3f8c1fed351bd2c2a56f
python-cinder-2014.1.4-1.1.el6ost.noarch.rpm
    MD5: a3f1c04d7c689b48963498de62b061d2SHA-256: a43b526dbfdebd5985f5a6a3bb6df79c18484d0b973011200c7fe9411742486a
 
Red Hat OpenStack 5.0 for RHEL 7

SRPMS:
openstack-cinder-2014.1.4-1.1.el7ost.src.rpm
    MD5: 0f9cce2ec85b0795bb66e763033c8e80SHA-256: 80c1106fed6f27c3fee17bacaf3211f3e468ff73f5faebf9c1fa430262fb617f
 
x86_64:
openstack-cinder-2014.1.4-1.1.el7ost.noarch.rpm
    MD5: c7a48f55d74320876e3e02b5e216eb3fSHA-256: 57c8dc558d0882e83abbace31952d4b52628fa7a78a9a24d5c6d77a180ac39e3
openstack-cinder-doc-2014.1.4-1.1.el7ost.noarch.rpm
    MD5: 658c3cb97404edb59147ab342c862f75SHA-256: 93d93a5ec36a167b44a8cc322c51a2c5a9d1244c898007f3a62a63cb879ff9fa
python-cinder-2014.1.4-1.1.el7ost.noarch.rpm
    MD5: 258639595c7a3f36c02b54e17593ce7eSHA-256: 09d4c0b896639b07c4004d14aedf5cfdaf702ef59ccd6cef76257f2da92d134d
 
Red Hat OpenStack 6.0 for RHEL 7

SRPMS:
openstack-cinder-2014.2.3-3.1.el7ost.src.rpm
    MD5: 49ad6926638995042aef863444fe52edSHA-256: fd04f8e50e38e5126602e0079aac87b259195181f2fbe312c3bed47b1f17c1fd
 
x86_64:
openstack-cinder-2014.2.3-3.1.el7ost.noarch.rpm
    MD5: b46a0eb5778aa5253de76f638941a1ffSHA-256: 8898acd2a293c5debfe01b27c62772605070693d301f9a3a5e7eaa875e91b70f
openstack-cinder-doc-2014.2.3-3.1.el7ost.noarch.rpm
    MD5: 655709d11e41089afccbc402ac8e3e52SHA-256: 42d0d3070f75d48c784eb0f7f67cf12f7435319150a8cce9cd5f3519b7f1ba61
python-cinder-2014.2.3-3.1.el7ost.noarch.rpm
    MD5: 313062c75acc96f9ec38c8e2d054bffbSHA-256: 72acf09bd68595e9c3ae3ec91aa6e47cc72fdfddec84f54fb336aeeea34bc131
 
(The unlinked packages above are only available from the Red Hat Network)
1231817 – CVE-2015-1851 openstack-cinder: Host file disclosure through qcow2 backing file

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply