You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa Red Hat OpenStack Platform 8

Sigurnosni nedostaci programskog paketa Red Hat OpenStack Platform 8

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LRH

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat OpenStack Platform 8 director security and bug fix update
Advisory ID: RHSA-2018:2857-01
Product: Red Hat Enterprise Linux OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2018:2857
Issue date: 2018-10-02
CVE Names: CVE-2018-1000115
=====================================================================

1. Summary:

An update for instack-undercloud and openstack-tripleo-heat-templates is
now available for Red Hat OpenStack Platform 8.0 (Liberty) director.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

OpenStack 8.0 Director for RHEL 7 – noarch

3. Description:

memcached is a high-performance, distributed memory object caching system,
generic in nature, but intended for use in speeding up dynamic web
applications by alleviating database load.

instack-undercloud provides a collection of scripts and elements that can
be used to install an OpenStack undercloud (using python-instack).

openstack-tripleo-heat-templates is a collection of OpenStack Orchestration
templates and tools (codename heat), which can be used to help deploy
OpenStack.

Security Fix(es):

* memcached: UDP server support allows spoofed traffic amplification DoS
(CVE-2018-1000115)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Bug Fix(es):

* This update fixes a race condition that could cause pacemaker-managed
glance-fs deployments to fail.

Now the glance-fs resource is created from a single node of the overcloud
in a way that eliminates the race condition and the resultant deployment
failures. (BZ#1418617)

* Prior to this update, the source IP address for cold migration and resize
was determined by the default gateway configured on the source compute
node.

Now the my_ip option is explicitly set to the internal_api network IP in
nova.conf, ensuring the correct network is used for this traffic.
(BZ#1552855)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1418617 – OSP8 – Pacemaker-related race condition observed during controller deployment
1517269 – openstack-nova-migration is potentially missing after a minor update
1551182 – CVE-2018-1000115 memcached: UDP server support allows spoofed traffic amplification DoS
1552855 – [Deployment][OSP8] Cold-migration should use the internal_api network
1568469 – [Deployment][OSP8] nova-api not properly configure secure_proxy_ssl_header option in nova.conf when using HAProxy and SSL
1590376 – [osp8] Creation of “/etc/ssh/ssh_known_hosts” silently fails in scale deplyoments
1598927 – ceilometer-expirer cron job does not run correctly [osp8]
1630968 – openstack-puppet-modules-7.1.5-9.el7ost introduces duplicate puppet declaration in instack-undercloud

6. Package List:

OpenStack 8.0 Director for RHEL 7:

Source:
instack-undercloud-2.2.7-13.el7ost.src.rpm
openstack-tripleo-heat-templates-0.8.14-42.el7ost.src.rpm

noarch:
instack-undercloud-2.2.7-13.el7ost.noarch.rpm
openstack-tripleo-heat-templates-0.8.14-42.el7ost.noarch.rpm
openstack-tripleo-heat-templates-kilo-0.8.14-42.el7ost.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-1000115
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIVAwUBW7O9LdzjgjWX9erEAQgDEQ//eAcR8qCw34AKy0m42fGuK6IHOYpZg3Ig
SkvyNQUWaoL7c8aj1ND2HdrvXVx/y1U2jlIYgOxYF4IaV2HQZvCgbHIYO+Ll4oWY
VRuCUD4tvhS4jVZslzOyQL/dbXjo8gbs6Gf0yOCQyn86ewsdTiYfOVq6ZdgMQxGr
9bqqXLSl2yaxfkxfUzO4qa/tzwS7nsEeo7u+5PPn2TG3NiuFtgmF3dsULnPXCkNM
8I/jwhwJMVagvLdea07aTA9kpnvIyRiVz11s19USGRK8djkRkllibxEXvEt83rPN
Vohav+bgI5b8bhGn6EgSjWAwvazuWevPXkLOB3PoH/PE6nvowhXQ6Vak1zfXugOD
YjLTElpZJ41V95eKfhyiLMwVSqGirM2bYRdw5Zn0pCxCF827EQMwg7R+dFcVr6pb
tPVfe1wVZTreW86yyqhycFbIjIa2X0Q03iJcQ6skN0ZMczxgG4TQvbE+Se68toxl
sysJ6jf9lun7vkPAbFTdtAhXFt0ob8eyoLzEk/aJMclYwNMGaUvUr0aqg4jy0G6q
dKiHoKuFFoCDUGvin+vp01E983jofbOiOrnjCI1rLcegp+TqjgSx4DBAsGw6KVGi
t+PYb/lfG150O2ZhI/Gg4bOfTqdkSYkwlkxMO+CPkwT/N5YN4oy0wLeFwORQUzaz
XSrKNPUfdoc=
=lBMi
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

AutorToni Vugdelija
Cert idNCERT-REF-2018-10-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa elfutils

Otkriveni su sigurnosni nedostaci u programskom paketu elfutils za operacijski sustav Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju rušenje servisa. Savjetuje...

Close