- Issued:
- 2013-07-16
- Updated:
- 2013-07-16
RHBA-2013:1082 - Bug Fix Advisory
Synopsis
Red Hat OpenStack 2.1 Preview bug fix advisory
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated openstack-packstack and openstack-cinder packages that fix various bugs
are now available for Red Hat OpenStack 2.1 Preview.
Description
Red Hat OpenStack provides the facilities for building a private or public
infrastructure-as-a-service (IaaS) cloud running on commonly available physical
hardware. Services provided by these packages include:
- OpenStack Compute service ("Nova").
- OpenStack Image service ("Glance").
- OpenStack Identity ("Keystone").
- OpenStack Networking service.
- OpenStack Object Storage service ("Swift").
- OpenStack Volume service ("Cinder").
- OpenStack Dashboard ("Horizon").
Red Hat OpenStack also includes:
- PackStack, a utility for rapidly deploying proof of concept OpenStack clouds.
To learn about each of the components provided and the way they interact to form
a working cloud computing environment refer to the Release Notes document:
https://access.redhat.com/site/documentation/en-US/Red_Hat_OpenStack/2/html/Release_Notes/index.html
These updated packages fix these bugs:
- Previously the volume deletion logic in the Block Storage service (Cinder)
called dm_setup(remove) before initiating the removal of the logical volume
using LVM. As a result buffer I/O errors were being generated and saved to the
kernel log. Volume deletion was also found to timeout more frequently.
The Block Storage service has been updated, removing the dm_setup(remove) call
from the volume deletion logic. (BZ#960182)
- It was discovered that a race condition existed when rebooting Compute (Nova)
nodes. The libvirt-guests script would sometimes start before the Compute
service (Nova) itself. As a result both services would attempt to restart
virtual machine instances that were running on the host prior to shutdown. The
instances would ultimately terminate in error.
PackStack has been updated to ensure that the libvirt-guests script is disabled
on Compute nodes, ensuring that the Computer service has full control of
restarting virtual machine instances. (BZ#920704)
- When creating backing storage for the Block Storage service (Cinder) using a
loopback device PackStack did not modify startup scripts to mount the device on
reboot.
As a result when a node deployed with PackStack was rebooted the Block Storage
service configuration was lost and had to be manually restored. PackStack has
been updated, commands to mount the loopback device when the system starts are
now added to the rc.local script. (BZ#947624)
- The default permissions defined in the Puppet modules used by PackStack was
previously 0644. This resulted in the permissions of the directories created for
the Block Storage (Cinder), Compute (Nova), and Identity (Keystone) services to
be set incorrectly.
In particular this applied to the service specific paths created in the
/var/lib/ and /var/log/ directories. The Puppet modules PackStack uses to deploy
OpenStack have been updated to ensure the correct permissions are defined for
each directory. (BZ#958900)
All users of Red Hat OpenStack 2.1 (Folsom) Preview must install these updated
packages that fix these bugs.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat OpenStack folsom x86_64
Fixes
- BZ - 920704 - Guests fail to resume after host reboots
- BZ - 947624 - loopback setup (losetup) for cinder doesn't survive reboot
- BZ - 958900 - packstack sets wrong permission bits on log dirs for cinder, nova, keystone, quantum
- BZ - 960182 - Backport volume_delete device-mapper fix
CVEs
(none)
Red Hat OpenStack folsom
SRPM | |
---|---|
openstack-cinder-2012.2.4-4.el6ost.src.rpm | SHA-256: b41b799a2e74ab27aed76b0b20d14f4a9858e863d344cd801f1a36579d902f96 |
openstack-packstack-2012.2.3-0.12.dev495.el6ost.src.rpm | SHA-256: 889aed571228734dcedbf32493d2bf2ebf7f75cf98956cba71b41c767bdec9ac |
x86_64 | |
openstack-cinder-2012.2.4-4.el6ost.noarch.rpm | SHA-256: 133fbff28ac7f31fde30dbf0262cd3d2cc7589f05664d69f0e5c47edc74107ac |
openstack-cinder-doc-2012.2.4-4.el6ost.noarch.rpm | SHA-256: 83466aebac8284f3b928440d3b120d913242a6e7ebd85aa0766f03501f4f9d2a |
openstack-packstack-2012.2.3-0.12.dev495.el6ost.noarch.rpm | SHA-256: e70e0d48ea84a2ee194d5295cbe2c9389bd93f1858b15a4214fcf9444d2f66a6 |
packstack-modules-puppet-2012.2.3-0.12.dev495.el6ost.noarch.rpm | SHA-256: a5805f35ff8cb3be7f73dfed2e9d54d91bd34f23fbf469d7b8185a97cf4e7c8c |
python-cinder-2012.2.4-4.el6ost.noarch.rpm | SHA-256: d039aabb4993c66b08d191d8a8987b475cb3315385d574f9485387b5d1b0c7c7 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.