- 发布:
- 2018-09-19
- 已更新:
- 2018-09-19
RHSA-2018:2729 - Security Advisory
概述
Moderate: Red Hat Enterprise Linux OpenStack Platform security update
类型/严重性
Security Advisory: Moderate
标题
An update is now available for Red Hat OpenStack Platform 12.0 (Pike).
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
描述
Red Hat OpenStack Platform provides the facilities for building, deploying and monitoring a private or public infrastructure-as-a-service (IaaS) cloud running on commonly available physical hardware.
Security Fix(es):
- openstack-rabbitmq-container: Insecure download of rabbitmq_clusterer during docker build (CVE-2018-14620)
For more details about the security issue, including the impact, a CVSS score, and other related information, refer to the CVE page listed in the References section.
The Red Hat OpenStack Platform container images have been updated to address security advisory/ies: RHSA-2018:2439, RHSA-2018:2482, RHSA-2018:2557.
解决方案
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the MariaDB server daemon (mysqld) will be restarted automatically.
受影响的产品
- Red Hat OpenStack 12 x86_64
修复
- BZ - 1626953 - CVE-2018-14620 openstack-rabbitmq-container: Insecure download of rabbitmq_clusterer during docker build
CVE
- CVE-2017-3636
- CVE-2017-3641
- CVE-2017-3651
- CVE-2017-3653
- CVE-2017-10268
- CVE-2017-10378
- CVE-2017-10379
- CVE-2017-10384
- CVE-2018-2562
- CVE-2018-2622
- CVE-2018-2640
- CVE-2018-2665
- CVE-2018-2668
- CVE-2018-2755
- CVE-2018-2761
- CVE-2018-2767
- CVE-2018-2771
- CVE-2018-2781
- CVE-2018-2813
- CVE-2018-2817
- CVE-2018-2819
- CVE-2018-10892
- CVE-2018-10915
- CVE-2018-14620
Red Hat 安全团队联络方式为 secalert@redhat.com。 更多联络细节请参考 https://access.redhat.com/security/team/contact/。