- Issued:
- 2015-11-19
- Updated:
- 2015-11-19
RHBA-2015:2496 - Bug Fix Advisory
Synopsis
Red Hat Enterprise Linux OpenStack Platform 7 Bug Fix and Enhancement Advisory
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated packages that resolve various issues are now available for Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7.
Description
Red Hat Enterprise Linux OpenStack Platform provides the facilities for
building a private or public infrastructure-as-a-service (IaaS) cloud
running on commonly available physical hardware.
This erratum provides several updated packages in order for OpenStack users
to run on Red Hat Enterprise Linux 7.2.
IMPORTANT: Red Hat Enterprise Linux OpenStack Platform deployments that are
configured using the director should NOT directly update this software. Red
Hat Enterprise Linux OpenStack Platform director deploys those OpenStack
components that have been validated with specific Red Hat Enterprise Linux
components. This ensures that major RHEL updates are applied in such a way
to ensure no or minimal downtime. It is critical that you perform major RHEL
updates using the appropriate corresponding version of RHEL OpenStack
Platform director. These updates will be made available in an upcoming
update to RHEL-OSP and RHEL-OSP director, which can then be automatically
applied to the system.
Red Hat Enterprise Linux OpenStack Platform deployments that are manually
configured (i.e., without the use of RHEL-OSP director) may apply this
software update directly. However, appropriate precautions must be taken if
this environment is configured for a high availability. In this scenario,
ensure that the controller nodes are offline prior to applying the software
updates. Otherwise, the environment runs the risk of crashing the entire
cluster, resulting in a production outage.
This update addresses the following issues:
- Previously, the Swift sos plug-in used an incorrect regular expression
for the location of the Swift configuration files. Consequently, irrelevant
files matched the regular expression, and the plug-in encountered an error.
This update fixes the regular expression. As a result, only the intended
files match, and the error no longer occurs. (BZ#1260592)
- The shell of the rabbitmq user has been set to /sbin/nologin, as is usual
with system users. (BZ#1270219)
- Previously, the rabbitmq-server service was stopped when the
rabbitmq-server package was updated. Now, the service is conditionally
restarted after an update is applied and before the traces of the previous
version are removed. As a result, updating to this version does not yet
restart the service because the previous package does not yet contain the
necessary command; however, with future updates, the service will
(conditionally) restart automatically. (BZ#1264083)
- Prior to this update, the Horizon sos plug-in used regular expressions
for all files in the /etc/openstack-dashboard/ directory. This directory,
however, also contains compiled Python files (.pyc and .pyo), which could
not be processed correctly, and as a consequence, multiple error messages
were generated. These files are now excluded from processing. As a result,
the Horizon sos plug-in no longer produces such error messages.
(BZ#1266567)
- Previously, the Sahara sos plug-in only worked with files used with the
"unified" deployment of OpenStack. With this update, the plug-in also
supports the "split" mode. Specifically, the plug-in now also captures
messages from the openstack-sahara-api and -engine systemd units, and
checks for the openstack-sahara-api and openstack-sahara-engine packages.
(BZ#1269565)
- Prior to this update, Ironic generated an iSCSI target name that violated
RFC 3720 and 3721, and was therefore incompatible with tools that expect a
properly constructed name. With this update, Ironic generates a name that
complies with these RFCs. (BZ#1272553)
- The sos package has been upgraded to version 3.2-35 from Red Hat
Enterprise Linux 7.2, which provides a number of bug fixes and enhancements
over the previous version. (BZ#1277908)
Solution
Before applying this update, ensure all previously released errata relevant to your system have been applied.
Red Hat Enterprise Linux OpenStack Platform 7 runs on Red Hat Enterprise Linux 7.2.
The Red Hat Enterprise Linux OpenStack Platform 7 Release Notes contain the following:
- An explanation of the way in which the provided components interact to form a working cloud computing environment.
- Technology Previews, Recommended Practices, and Known Issues.
- The channels required for Red Hat Enterprise Linux OpenStack Platform 7, including which channels need to be enabled and disabled.
The Release Notes are available at:
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/7/html/Release_Notes/index.html
This update is available through 'yum update' on systems registered through Red Hat Subscription Manager. For more information about Red Hat Subscription Manager, see:
https://access.redhat.com/documentation/en-US/Red_Hat_Subscription_Management/1/html/RHSM/index.html
Affected Products
- Red Hat OpenStack 7 x86_64
Fixes
- BZ - 1260592 - [7.2] sosreport encounters regex error while running openstack swift plugin.
- BZ - 1264083 - rabbitmq-server stops (instead of restart) during update
- BZ - 1266567 - [7.2 ] openstack_horizon attempts to apply regex to plugin py{c,o} files.
- BZ - 1269565 - [ 7.2 ] Sahara plugin captures details only for "unified" deployment
- BZ - 1270219 - rabbitmq shell should be /sbin/nologin
- BZ - 1272553 - rhel-osp-director: The deployed nodes are dropped into dracut shell on VM setup installed with export TESTENV_ARGS="--baremetal-bridge-names 'brbm brbm1 brbm2 brbm3 brbm4 brbm5'" , eth0 and eth1 both get 192.0.2.X IP.
- BZ - 1277908 - [7.2] rebase sos to 3.2-35 for RHEL OSP 7.0
CVEs
(none)
Red Hat OpenStack 7
SRPM | |
---|---|
openstack-ironic-2015.1.1-6.el7ost.src.rpm | SHA-256: f48570d41714bb2583356d5b5ed71f7e7e212e65db858b22f9ace1c30bf9220d |
openstack-selinux-0.6.43-1.el7ost.src.rpm | SHA-256: 78d067a118b7ed64939e1788086e5fd7b135dea0a32f86ee5179b8360ccb80c1 |
openvswitch-2.4.0-1.el7.src.rpm | SHA-256: 14ecdd84679d07acc164685d91a3b9217a4ad0275688f7aec7fd7684100a600a |
qemu-kvm-rhev-2.3.0-31.el7.src.rpm | SHA-256: 03ac086ab5e2742937c556699acfe1ce6d9459da6db1b681b59545a47b9bb179 |
rabbitmq-server-3.3.5-7.el7ost.src.rpm | SHA-256: 3c0b9c3181f5010295194e24d40adcb510f780b04df1dd1c81983b38d76ca52b |
sos-3.2-36.el7ost.1.src.rpm | SHA-256: 0c9481042d176710097094aadec7bf79fd02f3d29924229974d652fd04add76e |
x86_64 | |
libcacard-rhev-2.3.0-31.el7.x86_64.rpm | SHA-256: 3a8cdbd1a135d37b0160c8d57dca427a3ad6df0084a5356790b3f8297582dcaf |
libcacard-tools-rhev-2.3.0-31.el7.x86_64.rpm | SHA-256: 4624293b5f84b44c738c5d56c8b091c615f7fb9e2d4662ac82339d8688eea5ee |
openstack-ironic-api-2015.1.1-6.el7ost.noarch.rpm | SHA-256: eff7a35eb3e0351556cd9eabb474d584f3a17d92b5a5912d3e24861ec49c7a18 |
openstack-ironic-common-2015.1.1-6.el7ost.noarch.rpm | SHA-256: bd0c0d162f9ea5b4ffccff5822c56b5d93ca15774d4103e6eac8d0140cbb2444 |
openstack-ironic-conductor-2015.1.1-6.el7ost.noarch.rpm | SHA-256: b07113eb717dfb55472270f86614d3cdf7de406ad718267c3b817e444a0069db |
openstack-selinux-0.6.43-1.el7ost.noarch.rpm | SHA-256: 1fa84ac0ca538fc440d01fe4a1e36ff8bae4934471dbb55efb76316ef935c3c5 |
openstack-selinux-test-0.6.43-1.el7ost.noarch.rpm | SHA-256: e6d2b542669a371a9753e57f51f9ddd06ce5bbcca0780e331bbd4e3ff3b0d43d |
openvswitch-2.4.0-1.el7.x86_64.rpm | SHA-256: 605fc1be8b0b2a7f516c4f5fdf4ed7060274bd26409a5a36be116832cbfa65c5 |
openvswitch-debuginfo-2.4.0-1.el7.x86_64.rpm | SHA-256: 9e9a4e5f5de254a4e00ba9ef056c0ee92858325a8213c0408f12527cf87b73c3 |
python-openvswitch-2.4.0-1.el7.noarch.rpm | SHA-256: 2df6b0518271fe7aaac4f2387beacf0e6d03b6f031beb975c23bd74824af0aa7 |
qemu-img-rhev-2.3.0-31.el7.x86_64.rpm | SHA-256: 5554a68c2201f13f595a802a6d1572493ce30c41854b0b91bb08d9094cd6e849 |
qemu-kvm-common-rhev-2.3.0-31.el7.x86_64.rpm | SHA-256: 034dbc92b24deed47e958ffe1dbd36e504058102a483af50c407b9cc64dfc2cd |
qemu-kvm-rhev-2.3.0-31.el7.x86_64.rpm | SHA-256: b90bf08e15b788997c7cd1f7368fbeb198bb48aa464fe0cea210814553173b09 |
qemu-kvm-rhev-debuginfo-2.3.0-31.el7.x86_64.rpm | SHA-256: d6b0447144e5922b7823849e75ba50e715fd5590e6f791ed0292cfb2fbcf9ee2 |
qemu-kvm-tools-rhev-2.3.0-31.el7.x86_64.rpm | SHA-256: 2231337e89dc46436b1e8216a5492136beeb3c2c4fbb5f85978827afcb56bf4f |
rabbitmq-server-3.3.5-7.el7ost.noarch.rpm | SHA-256: 491c802c4ee20f37561e4559d03e19eb75bca81b75a9550d082e0c283d8b12b2 |
sos-3.2-36.el7ost.1.noarch.rpm | SHA-256: 93149586e57da44392bd08ba26283bd6e802adf114761370ca93c6358d8906b6 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.