- Issued:
- 2016-08-24
- Updated:
- 2016-08-24
RHBA-2016:1758 - Bug Fix Advisory
Synopsis
openstack-nova bug fix advisory
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated OpenStack Compute packages that resolve various issues are now
available for Red Hat OpenStack Platform 9.0 (Mitaka) for RHEL 7.
Description
Red Hat OpenStack Platform provides the facilities for building a private
or public infrastructure-as-a-service (IaaS) cloud running on commonly
available physical hardware. This advisory includes packages for:
- OpenStack Compute service
OpenStack Compute (nova) launches and schedules large networks of virtual
machines, creating a redundant and scalable cloud computing platform.
Compute provides the software, control panels, and APIs required to
orchestrate a cloud, including running virtual machine instances and
controlling access through users and projects.
Changes to the openstack-nova component:
- Previously, the cryptsetup tool would attempt to reuse multi-path device names when creating a dm-crypt device. This would cause the tool to fail because the device would already exist in the host, which would cause the attachment of a multi-path backed encrypted volume to also fail. With this update, the cryptsetup tool now uses a unique device name, allowing it to create the dm-crypt device successfully, and the attachment of multi-path backed encrypted volumes to succeed. (BZ#1362512)
- This rebase package includes a number of notable fixes under version: 13.1.1
- 82190bd Fix failure of multipath iSCSI encrypted volume attach
- 53314c4 Do not raise error when filtering on custom metadata
- 0b4e6ac Imported translations from Zanata
- 011b8fd Updated from global requirements
- 32a9d01 Fix NoSuchOptError when referring to conf.neutron.auth_plugin
- 418559e Use constraints for coverage job
- cf94540 pci: add safe-guard to __eq__ of PciDevice
- 63473a3 Imported translations from Zanata
- 9228bb5 Handle keypair not found from metadata server
- 57638a8 virt/hardware: Fix 'isolate' case on non-SMT hosts
- 26364b2 libvirt: release serial console ports when destroying guests
- 9f1bc4c network: Fix nova boot with multiple security-groups
- 6fce7d3 Properly clean up BDMs when _provision_instances fails
- 84d5697 network: make nova to handle port_security_enabled=False
- 0c4fc78 Live migration failure in API leaves VM in MIGRATING state (BZ#1365950)
Solution
Before applying this update, ensure all previously released errata relevant
to your system have been applied.
Red Hat OpenStack Platform 9 runs on Red Hat Enterprise Linux 7.2.
The Red Hat OpenStack Platform 9 Release Notes contain the following:
- An explanation of the way in which the provided components interact to
form a working cloud computing environment.
- Technology Previews, Recommended Practices, and Known Issues.
- The channels required for Red Hat OpenStack Platform 9, including which
channels need to be enabled and disabled.
The Release Notes are available at:
https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux_OpenStack_Platform/9/html/Release_Notes/index.html
This update is available through 'yum update' on systems registered through
Red Hat Subscription Manager. For more information about Red Hat
Subscription Manager, see:
https://access.redhat.com/documentation/en-US/Red_Hat_Subscription_Management/1/html/RHSM/index.html
Affected Products
- Red Hat OpenStack 9 x86_64
Fixes
- BZ - 1281572 - [RFE][nova]: Deprecate service management in nova-manage
- BZ - 1362512 - [9.0.z] Unable to attach multipath backed encrypted volumes to instances
- BZ - 1365950 - rebase to 13.1.1
CVEs
(none)
Red Hat OpenStack 9
SRPM | |
---|---|
openstack-nova-13.1.1-2.el7ost.src.rpm | SHA-256: 5f49db565a87478249b958f0a5d52822d0c6105118a9e96dfefc137cf0bfc613 |
x86_64 | |
openstack-nova-13.1.1-2.el7ost.noarch.rpm | SHA-256: 930cb3374fcbba36bbd59a51c9fd889bfe4498c073500e2b53605d9d29c52cb9 |
openstack-nova-api-13.1.1-2.el7ost.noarch.rpm | SHA-256: 06384b41a61aab2f96c68a7a1fbedc8ca8c85fb4501dc371d595c1d800f354aa |
openstack-nova-cells-13.1.1-2.el7ost.noarch.rpm | SHA-256: 4cbc5608d9824e1fd91afd96d9ebaf40e8226699513d8fceb471ede55e8ec8e7 |
openstack-nova-cert-13.1.1-2.el7ost.noarch.rpm | SHA-256: 240d88096df55e3729ddad036c86e07733946aef190d49c5ac622b06297abc2f |
openstack-nova-common-13.1.1-2.el7ost.noarch.rpm | SHA-256: 74735df6fd08d6146c0d9d87b069191372baaedc22f54763a504be18f6e851b9 |
openstack-nova-compute-13.1.1-2.el7ost.noarch.rpm | SHA-256: 86ba766a40d7237baede5cd1ea585b81b15d4460bb53441900b4ebced293beed |
openstack-nova-conductor-13.1.1-2.el7ost.noarch.rpm | SHA-256: 50bdfdc2f8bcc671fc08262c62d441d6f3816893539688ec44b86926c3280539 |
openstack-nova-console-13.1.1-2.el7ost.noarch.rpm | SHA-256: 60fdcc6a077b6ef215ba25f33cc652554c755acf109e5eaa3784f782dbf8e034 |
openstack-nova-network-13.1.1-2.el7ost.noarch.rpm | SHA-256: bcb6c132a5c50d8efe3043716fcdebd819143b1d82c259b6631f2485f7bdafac |
openstack-nova-novncproxy-13.1.1-2.el7ost.noarch.rpm | SHA-256: 040e9ffea85f193cc4bbd029a3dfe97b2e5070263ea807b862363f24f49ccd4c |
openstack-nova-scheduler-13.1.1-2.el7ost.noarch.rpm | SHA-256: d6fa272cccc32e25795b4668875344c68b4bcb8686adeb912f7b1a4648e70b6a |
openstack-nova-serialproxy-13.1.1-2.el7ost.noarch.rpm | SHA-256: 29710bf054e6ac792d5ac5d8d629c2440f6d556d91571e1f030f02767a6dac3a |
openstack-nova-spicehtml5proxy-13.1.1-2.el7ost.noarch.rpm | SHA-256: d9091a01f38a84cf48ff50bf4f558eba0311dfaa4fd2947780e1b67019be44d5 |
python-nova-13.1.1-2.el7ost.noarch.rpm | SHA-256: 5b923dee895efed8a9e3363bfbcd8088a1e14bd3788d09e9a4dbf6fbe3156706 |
python-nova-tests-13.1.1-2.el7ost.noarch.rpm | SHA-256: 24b0c26bcf2322dbd5d92c85f8b95c4cda9e92147eecd93cd5231affa7c6eb5d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.