- Issued:
- 2019-07-10
- Updated:
- 2019-07-10
RHSA-2019:1742 - Security Advisory
Synopsis
Moderate: openstack-tripleo-common security and bug fix update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for openstack-tripleo-common is now available for Red Hat OpenStack Platform 13.0 (Queens).
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
openstack-tripleo-common contains the python library for code common to the Red Hat OpenStack Platform director CLI and GUI (codename tripleo).
Security Fix(es):
- openstack-tripleo-common: Allows running new amphorae based on arbitrary images (CVE-2019-3895)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Introspection of baremetal nodes fail with 'No hypervisor matching' problem when node name used instead of uuid (BZ#1677016)
- config-download backports from RHOSP 14 to RHOSP 13 (openstack-tripleo-common) (BZ#1688461)
- RHOSP-13 Connection reset by peer: libvirtError: operation failed: Failed to connect to remote libvirt URI # Live Migration failure: operation failed: Failed to connect to remote libvirt URI (BZ#1712410)
- There are two new CLI arguments you can use with `config-download`:
- Monitor the deployment in a separate CLI session or with the API with `openstack overcloud status`.
- Log and save Ansible errors for future analysis with `openstack overcloud failures`. (BZ#1688461)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
Affected Products
- Red Hat OpenStack for IBM Power 13 ppc64le
- Red Hat OpenStack 13 x86_64
Fixes
- BZ - 1677016 - Introspection of baremetal nodes fail with 'No hypervisor matching' problem when node name used instead of uuid
- BZ - 1688461 - config-download backports from RHOSP 14 to RHOSP 13 (openstack-tripleo-common)
- BZ - 1694608 - CVE-2019-3895 openstack-tripleo-common: Allows running new amphorae based on arbitrary images
- BZ - 1717060 - Rebase openstack-tripleo-common to c42c360
- BZ - 1722738 - OSP12 to 13 upgrade - fail to upgrade controllers.
CVEs
Red Hat OpenStack for IBM Power 13
SRPM | |
---|---|
openstack-tripleo-common-8.6.8-11.el7ost.src.rpm | SHA-256: b7a119739b6c72b09ccbb33339a0cf4dbd85e4c1d9897c7f2412209db8bc1abb |
ppc64le | |
openstack-tripleo-common-8.6.8-11.el7ost.noarch.rpm | SHA-256: a51d6e0675fa5d86796c5c55effd77a86e2844fb518057674506c0a41931aa68 |
openstack-tripleo-common-container-base-8.6.8-11.el7ost.noarch.rpm | SHA-256: 0f6fdd8a855af66e37b2a0680f82706eeb833b0f3784e1dfd4fb15998d20f7d2 |
openstack-tripleo-common-containers-8.6.8-11.el7ost.noarch.rpm | SHA-256: 5a557fe07f8201716f09dde4634a4f4acc9655b4f791f8d8d30be5146dcf38f5 |
openstack-tripleo-common-devtools-8.6.8-11.el7ost.noarch.rpm | SHA-256: 17c8e7feb56f1e077702dc3c51fd42ee4c97907da4f3cb9bf118d5a0adb484bb |
Red Hat OpenStack 13
SRPM | |
---|---|
openstack-tripleo-common-8.6.8-11.el7ost.src.rpm | SHA-256: b7a119739b6c72b09ccbb33339a0cf4dbd85e4c1d9897c7f2412209db8bc1abb |
x86_64 | |
openstack-tripleo-common-8.6.8-11.el7ost.noarch.rpm | SHA-256: a51d6e0675fa5d86796c5c55effd77a86e2844fb518057674506c0a41931aa68 |
openstack-tripleo-common-container-base-8.6.8-11.el7ost.noarch.rpm | SHA-256: 0f6fdd8a855af66e37b2a0680f82706eeb833b0f3784e1dfd4fb15998d20f7d2 |
openstack-tripleo-common-containers-8.6.8-11.el7ost.noarch.rpm | SHA-256: 5a557fe07f8201716f09dde4634a4f4acc9655b4f791f8d8d30be5146dcf38f5 |
openstack-tripleo-common-devtools-8.6.8-11.el7ost.noarch.rpm | SHA-256: 17c8e7feb56f1e077702dc3c51fd42ee4c97907da4f3cb9bf118d5a0adb484bb |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.