- Issued:
- 2015-12-21
- Updated:
- 2015-12-21
RHBA-2015:2676 - Bug Fix Advisory
Synopsis
Red Hat Enterprise Linux OpenStack Platform 7 Bug Fix and Enhancement Advisory
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated packages that resolve various issues are now available for Red Hat
Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7.
Description
Red Hat Enterprise Linux OpenStack Platform provides the facilities for
building a private or public infrastructure-as-a-service (IaaS) cloud
running on commonly available physical hardware.
This update addresses the following issues:
- Previously, due to mishandling of the renamed executables in the
KillFilter, upgrading dnsmasq caused the neutron-dhcp-agent to break.
With this release, the upgraded executables are handled correctly. As a
result, the 'neutron-dhcp-agent' proceeds after the dnsmasq
upgrade. (BZ#1251211)
- Previously, the redis-server did not wait until the server was ready
after daemonizing. As a result, the redis resource-agent erroneously
failed in some cases, causing Pacemaker to recover the redis resource
unnecessarily.
With this update, the redis-server process waits for a signal from the
child process before exiting after daemonizing. As a result, the Pacemaker
does not recover the redis resource unnecessarily. (BZ#1283240)
- With this update, OpenvSwitch changed from using port 6633 to 6653.
SELinux expects OpenvSwitch to use port 6633 causing OVS to fail when
running. To fix the issue, you need to tell SELinux that OVS is running
on port 6653 instead of 6633. (BZ#1260202)
- Previously, the Rados Gateway did not implement the complete API that
Tempest and its configuration expect. If the Object Storage endpoint is
configured to point to Rados Gateway, the Tempest configuration resulted
in failure.
With this update, the Tempest configuration checks if the
object-storage-feature-enabled.discoverability is set to 'false' on the
command line or through the '--deployer-input' option. If the option is
set to false, the object-storage tests will be skipped. As a result,
the configuration succeeds, but without the object-storage-tests running,
if the Rados Gateway is used. (BZ#1251237)
Solution
Before applying this update, ensure all previously released errata relevant
to your system have been applied.
Red Hat Enterprise Linux OpenStack Platform 7 runs on Red Hat Enterprise
Linux 7.2.
The Red Hat Enterprise Linux OpenStack Platform 7 Release Notes contain the
following:
- An explanation of the way in which the provided components interact to
form a working cloud computing environment.
- Technology Previews, Recommended Practices, and Known Issues.
- The channels required for Red Hat Enterprise Linux OpenStack Platform 7,
including which channels need to be enabled and disabled.
The Release Notes are available at:
https://access.redhat.com/documentation/en/red-hat-enterprise-linux-openstack-platform/version-7/red-hat-enterprise-linux-openstack-platform-7-release-notes/release-notes
This update is available through 'yum update' on systems registered through
Red Hat Subscription Manager. For more information about Red Hat
Subscription Manager, see:
https://access.redhat.com/documentation/en-US/Red_Hat_Subscription_Management/1/html/RHSM/index.html
Affected Products
- Red Hat Enterprise Linux Server 7 x86_64
- Red Hat Enterprise Linux Workstation 7 x86_64
- Red Hat Enterprise Linux Desktop 7 x86_64
- Red Hat OpenStack 7 x86_64
Fixes
- BZ - 1251211 - upgrading dnsmasq breaks neutron-dhcp-agent
- BZ - 1251237 - config_tempest.py breaks if Rados Gateway is configured for object-store
- BZ - 1260202 - Update selinux policies to allow new openvswitch ports
- BZ - 1271678 - diskimage-builder should not install unit tests
- BZ - 1271693 - python-tuskarclient should not install unit tests
- BZ - 1283240 - Redis can't demote previous redis master after rebooting the node.
- BZ - 1284436 - Redis fails to restart in HA setup due to SELinux
CVEs
(none)
Red Hat Enterprise Linux Server 7
SRPM | |
---|---|
python-tuskarclient-0.1.18-5.el7ost.src.rpm | SHA-256: 2523ce98330679173601a85ec678eb961145a4f7061f2434cc0a35e2063d450b |
x86_64 | |
python-tuskarclient-0.1.18-5.el7ost.noarch.rpm | SHA-256: b412e9687b166b4a0f084597fd7a8d01185b4197e92a84e89240bf1e3d548daf |
Red Hat Enterprise Linux Workstation 7
SRPM | |
---|---|
python-tuskarclient-0.1.18-5.el7ost.src.rpm | SHA-256: 2523ce98330679173601a85ec678eb961145a4f7061f2434cc0a35e2063d450b |
x86_64 | |
python-tuskarclient-0.1.18-5.el7ost.noarch.rpm | SHA-256: b412e9687b166b4a0f084597fd7a8d01185b4197e92a84e89240bf1e3d548daf |
Red Hat Enterprise Linux Desktop 7
SRPM | |
---|---|
python-tuskarclient-0.1.18-5.el7ost.src.rpm | SHA-256: 2523ce98330679173601a85ec678eb961145a4f7061f2434cc0a35e2063d450b |
x86_64 | |
python-tuskarclient-0.1.18-5.el7ost.noarch.rpm | SHA-256: b412e9687b166b4a0f084597fd7a8d01185b4197e92a84e89240bf1e3d548daf |
Red Hat OpenStack 7
SRPM | |
---|---|
diskimage-builder-0.1.46-4.el7ost.src.rpm | SHA-256: e630920f386d12d5197d00fd0df7ff96fec25d99aaf909b8edacdaf3fea190d7 |
openstack-selinux-0.6.46-1.el7ost.src.rpm | SHA-256: 56d9ef2e4c8d844981098a338c08111fda1eaf4631af34085f3fa2f8b3c39e62 |
openstack-tempest-kilo-20151020.1.el7ost.src.rpm | SHA-256: e4d037110df8af2a24243dec8c99ff5cbb1da1d9d88b0301eda5e7159365f7da |
openvswitch-dpdk-2.4.0-0.10346.git97bab959.1.el7.src.rpm | SHA-256: 0a551ae5bf2ae5518098678abb25bd6f4e58682a6a78eebc0864972aa2d0403d |
python-oslo-rootwrap-1.6.0-2.el7ost.src.rpm | SHA-256: dde39b6884b9f16b8a78917db802e67d0628e89f7682905d1779e867e98b894e |
python-tuskarclient-0.1.18-5.el7ost.src.rpm | SHA-256: 2523ce98330679173601a85ec678eb961145a4f7061f2434cc0a35e2063d450b |
qemu-kvm-rhev-2.3.0-31.el7_2.4.src.rpm | SHA-256: 9db13f078ff26a1c0212e197686bde02647c8bc712736d245b468bc056dc2d08 |
redis-2.8.21-2.el7ost.src.rpm | SHA-256: 4c3f590e56b36c3b965e0488b2048d8efd70a8ae429204b03c6c9aaf7a56bc66 |
x86_64 | |
diskimage-builder-0.1.46-4.el7ost.noarch.rpm | SHA-256: 8d87949d5d662f104496bc32780c79e7cb6338ec520b7cc90a730a846ba3a338 |
libcacard-rhev-2.3.0-31.el7_2.4.x86_64.rpm | SHA-256: de78ce2b282329f742cec3a1ad2e7c5a24533fbcebc28caea7040c94b97b5705 |
libcacard-tools-rhev-2.3.0-31.el7_2.4.x86_64.rpm | SHA-256: f4e9e20edb82e3329142c6c9522fd707902cda792535e214d12583b484423947 |
openstack-selinux-0.6.46-1.el7ost.noarch.rpm | SHA-256: b0d6d67b7a5421eec3a37515c34136518b39f0933c029e9eb7f588f34826c0d7 |
openstack-selinux-test-0.6.46-1.el7ost.noarch.rpm | SHA-256: dccb153e02eb477824333c6a6e4076c4770bb13fe119e04e100055bced61cab2 |
openstack-tempest-kilo-20151020.1.el7ost.noarch.rpm | SHA-256: 12dcd90fc536ce1835b26ada507239e955bf4c0a17d77fff96456b6fd4f21dce |
openvswitch-dpdk-2.4.0-0.10346.git97bab959.1.el7.x86_64.rpm | SHA-256: 5fdc2cba2c685affccc919c43cf31cb772a935c645e80759a8f4b191ee6f9883 |
openvswitch-dpdk-debuginfo-2.4.0-0.10346.git97bab959.1.el7.x86_64.rpm | SHA-256: d0b2f2dbfddbdc3a8f6d00af372b618c3bddede6af5f5740d9e1e7a678f1b0b4 |
python-oslo-rootwrap-1.6.0-2.el7ost.noarch.rpm | SHA-256: 678fb63ce3ae794686ccad4d654c7fcbaeec02395d16ebf55c172ea615bdd078 |
python-tuskarclient-0.1.18-5.el7ost.noarch.rpm | SHA-256: b412e9687b166b4a0f084597fd7a8d01185b4197e92a84e89240bf1e3d548daf |
qemu-img-rhev-2.3.0-31.el7_2.4.x86_64.rpm | SHA-256: 0752a58b8f6a7cbe9bf3856c1fab1e6017a0fb8a32a5d60cf24c8dda1a15c1c6 |
qemu-kvm-common-rhev-2.3.0-31.el7_2.4.x86_64.rpm | SHA-256: 4c6954128d9a71ad41c60c91126878cf77a8fcf745286e76530c33b7d543659c |
qemu-kvm-rhev-2.3.0-31.el7_2.4.x86_64.rpm | SHA-256: 7dcc407d980644b5ec57cdf69bd3f292e3fd0a0cb1893f373cc88935e9229d04 |
qemu-kvm-rhev-debuginfo-2.3.0-31.el7_2.4.x86_64.rpm | SHA-256: 9e1572ce13003f3c3b92d00b12784c2334a2349481a636285cec80ea35534d9e |
qemu-kvm-tools-rhev-2.3.0-31.el7_2.4.x86_64.rpm | SHA-256: 7827f32f0a262e1148a8e656bf20f24b2a3e45fde0cf901a5dec80f304ae00a5 |
redis-2.8.21-2.el7ost.x86_64.rpm | SHA-256: 658cac10badfdf756a6c61f53c999871bdae5014e0b1111b41717ec257d6e7a4 |
redis-debuginfo-2.8.21-2.el7ost.x86_64.rpm | SHA-256: 25db13c5664cc3cb3c40340ac1db384376477cc32cb6f7d92c06aaad0150a0ba |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.