exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2018-0602-01

Red Hat Security Advisory 2018-0602-01
Posted Mar 29, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-0602-01 - openstack-tripleo-common contains the python library for code common to the Red Hat OpenStack Platform director CLI and GUI. openstack-tripleo-heat-templates is a collection of OpenStack Orchestration templates and tools, which can be used to help deploy OpenStack. Issues addressed include a backup related vulnerability.

tags | advisory, python
systems | linux, redhat
advisories | CVE-2017-12155
SHA-256 | dbd287f3ef15def62f3afd5d2043a86cef8e18fc105323919ade8b07e43cbbf2

Red Hat Security Advisory 2018-0602-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: openstack-tripleo-common and openstack-tripleo-heat-templates update
Advisory ID: RHSA-2018:0602-01
Product: Red Hat Enterprise Linux OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2018:0602
Issue date: 2018-03-28
CVE Names: CVE-2017-12155
=====================================================================

1. Summary:

An update for openstack-tripleo-common and openstack-tripleo-heat-templates
is now available for Red Hat OpenStack Platform 12.0 (Pike).

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenStack Platform 12.0 - noarch

3. Description:

openstack-tripleo-common contains the python library for code common to the
Red Hat OpenStack Platform director CLI and GUI (codename tripleo).

openstack-tripleo-heat-templates is a collection of OpenStack Orchestration
templates and tools (codename heat), which can be used to help deploy
OpenStack.

Security Fix(es):

* openstack-tripleo-heat-templates: Ceph client keyring is world-readable
when deployed by director (CVE-2017-12155)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Red Hat would like to thank Katuya Kawakami (NEC) for reporting this issue.

Bug Fix(es):

* All Compute and Controller nodes have bridge-mappings configured and
therefore are eligible to schedule routers. However, if you scheduled a
router on a Compute node that doesn't have a connection to an external
network, connectivity with the external network fails. This fix adds the
ability to configure bridge-mappings in TripleO and in the director
according to roles so that you can now exclude Compute nodes from router
scheduling and maintain external network connectivity. (BZ#1510879)

* Previously, the CephPools parameter value was incorrectly consumed as a
string list instead of as a JSON object. This prevented creating additional
Ceph pools during the overcloud deployment, because attempting to pass a
JSON object failed. This fix updates the CephPools parameter so that it now
accepts any JSON object that describes additional pools to create in the
Ceph cluster. Note: The JSON object structure must conform to ceph-ansible
conventions. (BZ#1516389)

* There is currently a known issue with LDAP integration for Red Hat
OpenStack Platform. The `keystone_domain_confg` tag is missing currently
from `keystone.yaml`, preventing Puppet from properly applying the required
configuration files. Consequently, LDAP integration with Red Hat OpenStack
Platform will not be properly configured. As a workaround, you must
manually edit `keystone.yaml` and add the missing tag. There are two ways
to do this:

1. Edit the file directly:
a. Log into the undercloud as the stack user.
b. Open the keystone.yaml in the editor of your choice. For example:
`sudo vi
/usr/share/openstack-tripleo-heat-templates/docker/services/keystone.yaml`
c. Append the missing puppet tag, `keystone_domain_confg`, to line 94.
For example:
`puppet_tags: keystone_config`
Changes to:
`puppet_tags: keystone_config,keystone_domain_confg`
d. Save and close `keystone.yaml`.
e. Verify you see the missing tag in the `keystone.yaml` file. The
following command should return '1':
`cat
/usr/share/openstack-tripleo-heat-templates/docker/sercies/keystone.yaml |
grep 'puppet_tags: keystone_config,keystone_domain_config' | wc -l`

2. Or, use sed to edit the file inline:
a. Login to the undercloud as the stack user.
b. Run the following command to add the missing puppet tag:
`sed -i 's/puppet_tags\: keystone_config/puppet_tags\:
keystone_config,keystone_domain_config/'
/usr/share/openstack-tripleo-heat-templates/docker/services/keystone.yaml`
c. Verify you see the missing tag in the keystone.yaml file The following
command should return '1':
`cat
/usr/share/openstack-tripleo-heat-templates/docker/sercies/keystone.yaml |
grep 'puppet_tags: keystone_config,keystone_domain_config' | wc -l`
(BZ#1519057)

* It is only possible to deploy Ceph storage servers if their disk devices
are homogeneous. (BZ#1520004)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1301534 - The gateway_ip attribute for the isolated networks are not accurate
1433534 - [RFE] [OVN] HA support for OVN ovn-northd
1489360 - CVE-2017-12155 openstack-tripleo-heat-templates: Ceph client keyring is world-readable when deployed by director
1507888 - Deployment with ceph and TLS everywhere fails with: "WorkflowTasks_Step2_Execution: ERROR "cannot stat '/var/run/ceph/ceph-mon.overcloud-controller-2.asok': No such file or directory""
1508601 - Add NetIpMap to hieradata for *ExtraConfig overrides (Composable Networks)
1519765 - containerized HA rabbitmq stops on re-deploy if lsns fails
1523272 - OSP10->11->12 upgrade: major-upgrade-composable-steps-docker.yaml fails with Error: Evaluation Error: Error while evaluating a Function Call, Could not find class ::panko
1523707 - [UPDATES] PCS managed containers ain't restarted with latest images
1528755 - ConfigDebug setting does not work for docker init bundles
1533097 - CephPools parameter does not add CephX permission for openstack user
1533468 - capabilities-map.yaml references wrong environment files for ceph services
1533875 - Using the Telmetry Role with Ceph/RBD as gnocchi backend Fails in step 4 of the Deployment
1537725 - Deployment templates for unsupported components causing some confusion
1538828 - standalone Telemetry.yaml role has wrong services and typo
1538875 - mysql_init_bundle container doesn't fail deployment if puppet fails
1539090 - Cinder backups fail when running in a container (non-HA)
1542537 - tox -epep8 fails with ERROR: Generated roles file not match
1543641 - Cinder HA and non-HA containers are not configured the same
1546234 - Rebase openstack-tripleo-heat-templates to 7.0.9
1546807 - [OSP12] After a minor update the swift_rsync container was in restarting state
1547955 - Undercloud / Overcloud Heat stack fails on: YAQL list index out of range (includes upgrades cases)
1551137 - Queue versioned_notifications.info not found
1551461 - [UPDATES] Failed to setup heat-output: refusing to convert between directory and link for /var/log/containers/swift
1552466 - docker_puppet_apply.sh has a fatal typo
1558639 - Collectd not re-using /var/run directory from overcloud node therefor ovs plugin fails to connect to db.sock of openswitch.

6. Package List:

Red Hat OpenStack Platform 12.0:

Source:
openstack-tripleo-heat-templates-7.0.9-8.el7ost.src.rpm

noarch:
openstack-tripleo-heat-templates-7.0.9-8.el7ost.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2017-12155
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFau84VXlSAg2UNWIIRAk5OAJ912PmETLFITLgnM/OniepSERyWvACfWCmj
hsFDLkLErcQNYFMUT80VIqc=
=a7WB
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close