RedHat: RHSA-2019-3788:01 Moderate: openstack-octavia security and bug fix

    Date07 Nov 2019
    CategoryRed Hat
    306
    Posted ByLinuxSecurity Advisories
    Redhat Large
    An update for openstack-octavia is now available for Red Hat OpenStack Platform 13.0 (Queens). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Moderate: openstack-octavia security and bug fix update
    Advisory ID:       RHSA-2019:3788-01
    Product:           Red Hat Enterprise Linux OpenStack Platform
    Advisory URL:      https://access.redhat.com/errata/RHSA-2019:3788
    Issue date:        2019-11-07
    CVE Names:         CVE-2019-17134 
    =====================================================================
    
    1. Summary:
    
    An update for openstack-octavia is now available for Red Hat OpenStack
    Platform 13.0 (Queens).
    
    Red Hat Product Security has rated this update as having a security impact
    of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
    gives a detailed severity rating, is available for each vulnerability from
    the CVE link(s) in the References section.
    
    2. Relevant releases/architectures:
    
    Red Hat OpenStack Platform 13.0 - noarch, ppc64le, x86_64
    
    3. Description:
    
    The OpenStack Load Balancing service (openstack-octavia) provides a Load
    Balancing-as-a-Service (LBaaS) version 2 implementation for Red Hat
    OpenStack platform director based installations.  
    
    Security Fix(es):
    
    * openstack-octavia: amphora-agent not requiring client certificate
    (CVE-2019-17134)
    
    For more details about the security issue(s), including the impact, a CVSS
    score, acknowledgments, and other related information, refer to the CVE
    page(s) listed in the References section.
    
    Bug Fix(es):
    
    * [Backport request]Add failover logging to show the amphora details.
    (BZ#1743476)
    
    4. Solution:
    
    For details on how to apply this update, which includes the changes
    described in this advisory, refer to:
    
    https://access.redhat.com/articles/11258
    
    5. Bugs fixed (https://bugzilla.redhat.com/):
    
    1712448 - Cannot delete load balancer that is in PENDING_UPDATE with PENDING_CREATE LISTENER after running into BZ 1693808
    1760178 - Rebase openstack-octavia to 431d9c9
    1761307 - CVE-2019-17134 openstack-octavia: amphora-agent not requiring client certificate
    
    6. Package List:
    
    Red Hat OpenStack Platform 13.0:
    
    Source:
    openstack-octavia-2.1.2-1.el7ost.src.rpm
    
    noarch:
    openstack-octavia-amphora-agent-2.1.2-1.el7ost.noarch.rpm
    openstack-octavia-api-2.1.2-1.el7ost.noarch.rpm
    openstack-octavia-common-2.1.2-1.el7ost.noarch.rpm
    openstack-octavia-diskimage-create-2.1.2-1.el7ost.noarch.rpm
    openstack-octavia-health-manager-2.1.2-1.el7ost.noarch.rpm
    openstack-octavia-housekeeping-2.1.2-1.el7ost.noarch.rpm
    openstack-octavia-worker-2.1.2-1.el7ost.noarch.rpm
    python-octavia-2.1.2-1.el7ost.noarch.rpm
    
    ppc64le:
    openstack-octavia-debuginfo-2.1.2-1.el7ost.ppc64le.rpm
    python-octavia-tests-golang-2.1.2-1.el7ost.ppc64le.rpm
    
    x86_64:
    openstack-octavia-debuginfo-2.1.2-1.el7ost.x86_64.rpm
    python-octavia-tests-golang-2.1.2-1.el7ost.x86_64.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and
    details on how to verify the signature are available from
    https://access.redhat.com/security/team/key/
    
    7. References:
    
    https://access.redhat.com/security/cve/CVE-2019-17134
    https://access.redhat.com/security/updates/classification/#moderate
    
    8. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2019 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBXcQhwtzjgjWX9erEAQjfGxAAol41b9KONPNEuMe52B+qw6xHM9QjaF7J
    6lqAv6sWhvF/CsA5lVFJbjBmMkiTV5F/ZYx1FNB+RloBAO1TTi+fBngtAeiUK2J2
    lKAxa5Z8jiRUWTVi/nxTtszK8RQFpvjqTwr0hnsOXNnLWJs6zwK0dG9GhTnXQ1Af
    OP6eGze51dWTHLaQ3jvOAdTngZ5qZ1eyQt/fgIFY+VQxqB0wWgURC2n7uXS4WD3c
    I/HehOsTC4wRpnKqoNW/yenNTpywzzCbSdlljlE6JBlXhEdRRSipTaXLEyJpdFLn
    trS4Nf8LT1KC0pZblep5+JQhCAI4FNO5GOWKvzjMPTmUb1FWs1Ev9p7lTRpvQyMH
    zZ6WFErVWQ2s8vm9vkx4OZ5Kd7tiqUcz29W3rXpTNP+dkGYU8UOwWm10IjSU1Yg6
    vkX4kI6b9Tr4jjN5sg1gPXAHUZ5RbXpcpwSHv18OFEpBkfIJrGAq9C8GYl3ZeKva
    huqK2xA2H5qH/KtnGJehrFD6h2kR0Gh2zFPbl2a3Ac+s7Ibn/oEplwurOOrdeVne
    0NjdzSUjFLQ69Ap+DutbrP6yjnVW2JoS5zgYKKRIRe9HZ8wI7ckTT4KjBFpmcxJR
    q9ilUiWem7s9r7oufOZXYh+CaAl5yAdy7h6DMaFGPLqAkJ0Dhqmqy6s5IZSi1ILv
    Uz92zCz9uo4=
    =2ftV
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"39","type":"x","order":"1","pct":50.65,"resources":[]},{"id":"88","title":"Should be more technical","votes":"11","type":"x","order":"2","pct":14.29,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"27","type":"x","order":"3","pct":35.06,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.