Security update for openstack-keystone, openstack-nova, and openstack-swift
Announcement ID: | SUSE-SU-2016:2325-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves two vulnerabilities and has two security fixes can now be installed.
Description:
This update for openstack-keystone, openstack-nova, and openstack-swift fixes the following issues:
- Fix hybrid backend from keystone v3 (bsc#967356)
- Fix cleanup when block migration fails (bsc#960015)
- Avoid host data leak (bsc#960601, CVE-2015-7548)
- Fix init script for openstack-swift-object-expirer
- Mark backend_argument as secret (bsc#929628, CVE-2015-3646)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Cloud 5
zypper in -t patch sleclo50sp3-openstack-keystone-12748=1
Package List:
-
SUSE Cloud 5 (x86_64)
- python-swift-2.1.0-14.1
- openstack-nova-serialproxy-2014.2.4.juno-29.1
- openstack-nova-console-2014.2.4.juno-29.1
- openstack-nova-consoleauth-2014.2.4.juno-29.1
- openstack-nova-objectstore-2014.2.4.juno-29.1
- openstack-nova-conductor-2014.2.4.juno-29.1
- openstack-swift-2.1.0-14.1
- openstack-nova-2014.2.4.juno-29.1
- openstack-keystone-2014.2.4.juno-17.1
- openstack-nova-compute-2014.2.4.juno-29.1
- openstack-nova-vncproxy-2014.2.4.juno-29.1
- openstack-swift-object-2.1.0-14.1
- python-nova-2014.2.4.juno-29.1
- openstack-nova-scheduler-2014.2.4.juno-29.1
- openstack-nova-api-2014.2.4.juno-29.1
- openstack-swift-proxy-2.1.0-14.1
- python-keystone-2014.2.4.juno-17.1
- openstack-swift-container-2.1.0-14.1
- openstack-nova-novncproxy-2014.2.4.juno-29.1
- openstack-nova-cells-2014.2.4.juno-29.1
- openstack-nova-cert-2014.2.4.juno-29.1
- openstack-swift-account-2.1.0-14.1
-
SUSE Cloud 5 (noarch)
- openstack-nova-doc-2014.2.4.juno-29.1
- openstack-swift-doc-2.1.0-14.1
- openstack-keystone-doc-2014.2.4.juno-17.2
References:
- https://www.suse.com/security/cve/CVE-2015-3646.html
- https://www.suse.com/security/cve/CVE-2015-7548.html
- https://bugzilla.suse.com/show_bug.cgi?id=929628
- https://bugzilla.suse.com/show_bug.cgi?id=960015
- https://bugzilla.suse.com/show_bug.cgi?id=960601
- https://bugzilla.suse.com/show_bug.cgi?id=967356