- Issued:
- 2021-09-15
- Updated:
- 2021-09-15
RHEA-2021:3489 - Product Enhancement Advisory
Synopsis
Red Hat OpenStack Platform 16.2 containers bug fix advisory
Type/Severity
Product Enhancement Advisory
Topic
Container updates are available for Red Hat OpenStack Platform 16.2 for Red Hat Enterprise Linux (RHEL) 8.4.
Description
Red Hat OpenStack Platform provides the facilities for building, deploying and monitoring a private or public infrastructure-as-a-service (IaaS) cloud running on commonly available physical hardware.
Solution
Before applying this update, ensure all previously released errata relevant
to your system have been applied.
Red Hat OpenStack Platform 16.2 runs on RHEL 8.4.
The Red Hat OpenStack Platform 16.2 Release Notes contain the following:
An explanation of the way in which the provided components interact to
form a working cloud computing environment.
Technology Previews, Recommended Practices, and Known Issues.
The channels required for Red Hat OpenStack Platform 16.2, including
which channels need to be enabled and disabled.
The Release Notes are available at:
https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/16.2/html/release_notes/index
The container images provided by this update can be downloaded from the Red
Hat Container Registry at registry.redhat.io using the "podman pull"
command.
Affected Products
- Red Hat OpenStack for IBM Power 16.2 ppc64le
- Red Hat OpenStack 16.2 x86_64
Fixes
- BZ - 1885520 - [OSP16.2] healthchecks failing due to missing 'ss' binary (iproute rpm)
- BZ - 1886730 - [16.2] Composable HA deployment fails with missing sahara container images
- BZ - 1898467 - [OSP16.2] qemu user id is different as in previous releases
- BZ - 1898468 - [OSP16.2] ndctl is missing in nova-compute tbic container package definition
- BZ - 1905154 - [OSP 16.2] Install 'daxio' for virtual persistent memory (PMEM) support
- BZ - 1990484 - 2 container images are missing full version
CVEs
- CVE-2016-10228
- CVE-2017-14502
- CVE-2018-20843
- CVE-2018-1000858
- CVE-2019-2708
- CVE-2019-8625
- CVE-2019-8710
- CVE-2019-8720
- CVE-2019-8743
- CVE-2019-8764
- CVE-2019-8766
- CVE-2019-8769
- CVE-2019-8771
- CVE-2019-8782
- CVE-2019-8783
- CVE-2019-8808
- CVE-2019-8811
- CVE-2019-8812
- CVE-2019-8813
- CVE-2019-8814
- CVE-2019-8815
- CVE-2019-8816
- CVE-2019-8819
- CVE-2019-8820
- CVE-2019-8823
- CVE-2019-8835
- CVE-2019-8844
- CVE-2019-8846
- CVE-2019-9169
- CVE-2019-13050
- CVE-2019-13225
- CVE-2019-13627
- CVE-2019-14889
- CVE-2019-15903
- CVE-2019-19906
- CVE-2019-20454
- CVE-2019-20807
- CVE-2019-25013
- CVE-2019-25032
- CVE-2019-25034
- CVE-2019-25035
- CVE-2019-25036
- CVE-2019-25037
- CVE-2019-25038
- CVE-2019-25039
- CVE-2019-25040
- CVE-2019-25041
- CVE-2019-25042
- CVE-2020-1730
- CVE-2020-2574
- CVE-2020-2752
- CVE-2020-2922
- CVE-2020-3862
- CVE-2020-3864
- CVE-2020-3865
- CVE-2020-3867
- CVE-2020-3868
- CVE-2020-3885
- CVE-2020-3894
- CVE-2020-3895
- CVE-2020-3897
- CVE-2020-3898
- CVE-2020-3899
- CVE-2020-3900
- CVE-2020-3901
- CVE-2020-3902
- CVE-2020-6829
- CVE-2020-8231
- CVE-2020-8284
- CVE-2020-8285
- CVE-2020-8286
- CVE-2020-8927
- CVE-2020-9802
- CVE-2020-9803
- CVE-2020-9805
- CVE-2020-9806
- CVE-2020-9807
- CVE-2020-9843
- CVE-2020-9850
- CVE-2020-9862
- CVE-2020-9893
- CVE-2020-9894
- CVE-2020-9895
- CVE-2020-9915
- CVE-2020-9925
- CVE-2020-9952
- CVE-2020-10018
- CVE-2020-11793
- CVE-2020-12400
- CVE-2020-12403
- CVE-2020-13249
- CVE-2020-13434
- CVE-2020-14391
- CVE-2020-15358
- CVE-2020-15503
- CVE-2020-25659
- CVE-2020-26116
- CVE-2020-26137
- CVE-2020-27618
- CVE-2020-27619
- CVE-2020-27783
- CVE-2020-28196
- CVE-2020-28935
- CVE-2020-29361
- CVE-2020-29362
- CVE-2020-29363
- CVE-2020-36242
- CVE-2021-2007
- CVE-2021-3177
- CVE-2021-3281
- CVE-2021-3326
- CVE-2021-3421
- CVE-2021-3449
- CVE-2021-3450
- CVE-2021-3516
- CVE-2021-3517
- CVE-2021-3518
- CVE-2021-3520
- CVE-2021-3537
- CVE-2021-3541
- CVE-2021-20271
- CVE-2021-20305
- CVE-2021-23239
- CVE-2021-23240
- CVE-2021-23336
- CVE-2021-25215
- CVE-2021-27218
- CVE-2021-30666
- CVE-2021-30761
- CVE-2021-30762
- CVE-2021-31525
- CVE-2021-33195
- CVE-2021-33197
- CVE-2021-33198
- CVE-2021-33203
- CVE-2021-33571
References
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.