-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: openstack-octavia security update Advisory ID: RHSA-2019:3743-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2019:3743 Issue date: 2019-11-06 CVE Names: CVE-2019-17134 ===================================================================== 1. Summary: An update for openstack-octavia is now available for Red Hat OpenStack Platform 14.0 (Rocky). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 14.0 - noarch, ppc64le, x86_64 3. Description: The OpenStack Load Balancing service (openstack-octavia) provides a Load Balancing-as-a-Service (LBaaS) version 2 implementation for Red Hat OpenStack platform director based installations. Security Fix(es): * openstack-octavia: amphora-agent not requiring client certificate (CVE-2019-17134) For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1761307 - CVE-2019-17134 openstack-octavia: amphora-agent not requiring client certificate 1762807 - Rebase openstack-octavia to 3.2.0 6. Package List: Red Hat OpenStack Platform 14.0: Source: openstack-octavia-3.1.0-3.el7ost.src.rpm noarch: openstack-octavia-amphora-agent-3.1.0-3.el7ost.noarch.rpm openstack-octavia-api-3.1.0-3.el7ost.noarch.rpm openstack-octavia-common-3.1.0-3.el7ost.noarch.rpm openstack-octavia-diskimage-create-3.1.0-3.el7ost.noarch.rpm openstack-octavia-health-manager-3.1.0-3.el7ost.noarch.rpm openstack-octavia-housekeeping-3.1.0-3.el7ost.noarch.rpm openstack-octavia-worker-3.1.0-3.el7ost.noarch.rpm python-octavia-3.1.0-3.el7ost.noarch.rpm ppc64le: openstack-octavia-debuginfo-3.1.0-3.el7ost.ppc64le.rpm python-octavia-tests-golang-3.1.0-3.el7ost.ppc64le.rpm x86_64: openstack-octavia-debuginfo-3.1.0-3.el7ost.x86_64.rpm python-octavia-tests-golang-3.1.0-3.el7ost.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-17134 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXcLk49zjgjWX9erEAQhOrBAAoxHewFVjcgKP7LWN2K8LPqrEbdwpPZ5f IHTSAtpHC8JeFN3RzCpxBR1j9kbEoormIAGKl+2axIPb57giAt5AuZ5pVFuazJpQ XU+0SzJRKs23sQbAtzXLcicGRnM1398VO4/gfy4FdBChcNOLlU0y8WPHKgWd+LmQ cIs7PA/H/8P9l+eH0AYHg0xqvNLumGKPkgVBGmA4s8NIzjCZTAUjXvJW0NS+JBAC 9A8yyDmE7pvlvRAzmZ0qWYnLHFHdDq4DF8Ydmg2tigf1SaDZAF9csh83M2vqXv9d ZoWfSs4AZhFy2SJNeXfpOT77tz0oQk8SSpHNA+ErnPfnVi1aDXeQze2ivSUeaVVQ C2jXyBc83ByKQGf84qdR1ZpgGtw0YjR75D4xISQlQsE7NiFnMT0n/SEChhFWJrEN yBR/Hp8I1iq5QOTatOHA5/6CGJav+WoIQdeYcUgOfTryHzv5+kbwtD9WsTWxiwfz jmtJ4KaRcVaVmyzYnctQwFioz+gwlgWbmWjzV+gQ98CpxlmPlVJW3OGY42vnNRvt yNonifiAxkcP25bsacZ9lA2uNQW5ni9ee9JcmNivgbqz8qdPi82OgzByqzrzjbS7 Gq7yPlybq6n54JGr5bSBrBr7/Rl/svHASYO98VKG/C5fReBuySABPblIWcAWmFjO TBi+VhrB2RM= =jEXf -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce