cinder@11.2.0 vulnerabilities

OpenStack Block Storage

Direct Vulnerabilities

Known vulnerabilities in the cinder package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Improper Input Validation

cinder is a storage service for an open cloud computing service

Affected versions of this package are vulnerable to Improper Input Validation in QCOW2 image processing. An authenticated user may convince systems to return a copy of that file's contents from the server resulting in unauthorized access to potentially sensitive data and unbounded memory/CPU consumption.

Note: All Cinder deployments are affected; only Glance deployments with image conversion enabled are affected; all Nova deployments are affected.

How to fix Improper Input Validation?

Upgrade cinder to version 22.2.0, 23.2.0, 24.1.0 or higher.

[,22.2.0) [23.0.0,23.2.0) [24.0.0,24.1.0)
  • M
Expected Behavior Violation

cinder is a storage service for an open cloud computing service

Affected versions of this package are vulnerable to Expected Behavior Violation. A remote, authenticated attacker can exploit this vulnerability by detaching one of their volumes from Cinder.

How to fix Expected Behavior Violation?

Upgrade cinder to version 23.0.0.0rc1 or higher.

[,23.0.0.0rc1)
  • M
Information Exposure

cinder is a storage service for an open cloud computing service

Affected versions of this package are vulnerable to Information Exposure when supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data.

How to fix Information Exposure?

Upgrade cinder to version 21.1.0 or higher.

[0,21.1.0)
  • M
Insufficiently Protected Credentials

cinder is a storage service for an open cloud computing service

Affected versions of this package are vulnerable to Insufficiently Protected Credentials. When using Cinder with the Dell EMC ScaleIO or VxFlex OS backend storage driver, credentials for the entire backend are exposed in the connection_info element in all Block Storage v3 Attachments API calls containing that element. This enables an end user to create a volume, make an API call to show the attachment detail information, and retrieve a username and password that may be used to connect to another user's volume. Additionally, these credentials are valid for the ScaleIO or VxFlex OS Management API, should an attacker discover the Management API endpoint.

How to fix Insufficiently Protected Credentials?

Upgrade cinder to version 14.2.0, 15.3.0, 16.1.0 or higher.

[0,14.2.0) [15.0.0,15.3.0) [16.0.0,16.1.0)