- Issued:
- 2013-05-09
- Updated:
- 2013-05-09
RHBA-2013:0798 - Bug Fix Advisory
Synopsis
openstack-nova bug fix advisory
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated openstack-nova package that fixes several bugs is now available for
Red Hat OpenStack 2.1 (Folsom).
Description
OpenStack Compute (Nova) is open source software designed to
provision and manage large networks of virtual machines, creating a
redundant and scalable cloud computing platform. It provides the
software, control panels, and APIs required to orchestrate a cloud,
including running instances, managing networks, and controlling access
through users and projects.
These updated packages include an update to the latest stable release of
OpenStack Folsom, version 2012.2.4. These packages address the following issues:
- Previous releases of openstack-nova would produce a stack trace that would get
sent back to the client, and consequently displayed to the user, when attempting
to migrate a virtual machine to an invalid host. Now, a more descriptive error
message is displayed to the user. (BZ#927167)
- Previous releases disabled APIC support in guests. As a result, certain guest
operating system images would not operate correctly. Now, Nova enables APIC
support by default in instances, which resolves the issue. (BZ#921517)
- Previous releases of Nova did not support the 'network-create' command. When
an administrator issued this command from the Nova client, the command would
fail and a stack trace would be produced. This has been resolved. (BZ#948938)
- Prior to this update, the /var/log/nova directory was world-readable. With
this update, world read permissions have been removed from the directory.
(BZ#956818)
- If an administrator typed in the wrong netmask size (for example /2 instead of
/24), nova-manage would try to allocate 2^31 floating IPs, potentially causing a
machine to run out of memory. Nova-manage no longer allows sizes over 1 million
floating IP addresses, which resolves the issue (BZ#918761)
- The resume_guests_state_on_host_boot option in /etc/nova/nova.conf
incorrectly implied that the default was value 'True', when it is, in fact,
'False'. (BZ#923086)
- Previous releases of Nova would fail to restart if a virtual machine had a
CD-ROM device and had also not previously been started by Nova. (BZ#950323)
- Previous releases of openstack-nova would produce a stack trace that would get
sent back to the client, and consequently displayed to the user when running
'nova get-vnc-console' to an instance in the 'BUILD' state. Now, a more
descriptive error message is displayed to the user. (BZ#919868)
All users of Red Hat OpenStack 2.1 (Folsom) are advised to install these updated
packages.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat OpenStack folsom x86_64
Fixes
- BZ - 918761 - nova-manage causes machine to OOM
- BZ - 919868 - "nova get-vnc-console" command to instance in BUILD mode ends with an exception to the stdout
- BZ - 921517 - Libvirt APIC support disabled
- BZ - 923086 - nova conf file option resume_guests_state_on_host_boot=True should be updated
- BZ - 927167 - [nova] live-migration to an invalid host should exist gracefully. Currently, it throws a stack trace
- BZ - 948938 - 'nova network-create' command fails.
- BZ - 950323 - Service openstack-nova-compute fails to start after yum update.
- BZ - 951505 - 2012.2.4 Rebase issues with the fix for 884595
- BZ - 951510 - 2012.2.4 Rebase issues with the fix for 914759
CVEs
(none)
References
(none)
Red Hat OpenStack folsom
SRPM | |
---|---|
openstack-nova-2012.2.4-4.el6ost.src.rpm | SHA-256: 060a06f96f959ba0c12b2c51b077ddc9d34f91557e86bf106ac06ff56eca6769 |
x86_64 | |
openstack-nova-2012.2.4-4.el6ost.noarch.rpm | SHA-256: 93d53d57aabdaa44af2d537b88ef02323d83475757276ecb0245c751d6ba08f2 |
openstack-nova-api-2012.2.4-4.el6ost.noarch.rpm | SHA-256: ce413cae6aacbedcad7ec9d64623ffc07e545afbfef8ae3aa35ef48f73a215a0 |
openstack-nova-cert-2012.2.4-4.el6ost.noarch.rpm | SHA-256: 7ddf032aa8295e7e5c34109270dc6948edc485cdadf91ad89cabb356520d590d |
openstack-nova-common-2012.2.4-4.el6ost.noarch.rpm | SHA-256: 2162e0e1f74288e8666d276c5417e6ed3ddf2e57f6b3d1f6df742d3fc7c92666 |
openstack-nova-compute-2012.2.4-4.el6ost.noarch.rpm | SHA-256: 293b03f53e6765e499375bb8534711864a860c3398918eb9a459cac2706586fa |
openstack-nova-console-2012.2.4-4.el6ost.noarch.rpm | SHA-256: d6d50f0471cb17383f4a9209416a766bad3ab695bcb4f96424dfbc6bec0d20fd |
openstack-nova-doc-2012.2.4-4.el6ost.noarch.rpm | SHA-256: f508d55f4517c1a2d2682724972622f31f18a95394da50ba8468f5190e305ca6 |
openstack-nova-network-2012.2.4-4.el6ost.noarch.rpm | SHA-256: e1ab738e840aa8b37905078cfdf84d447451d252feece7a4ad12ef0d253359b5 |
openstack-nova-objectstore-2012.2.4-4.el6ost.noarch.rpm | SHA-256: 61ff210afb00e2b5aaa9afe2e59136443a3714c64c068ee0dde29c2a451beeec |
openstack-nova-scheduler-2012.2.4-4.el6ost.noarch.rpm | SHA-256: 2feaf7bbcd25ea2a60eb6eb6bde1501f3a2489bdf1ca4a9e23a17b1dacb17a09 |
openstack-nova-volume-2012.2.4-4.el6ost.noarch.rpm | SHA-256: e26cba7a022e3ad2e956cd72b64a3d3593e1ee12dc481f84d1d7ac94473753fc |
python-nova-2012.2.4-4.el6ost.noarch.rpm | SHA-256: 16995a133315da6e76ddc7b56eed6ed41332ecf1ca0380d54338e148750435cb |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.