- Issued:
- 2014-05-29
- Updated:
- 2014-05-29
RHSA-2014:0517 - Security Advisory
Synopsis
Moderate: openstack-foreman-installer security, bug fix, and enhancement update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated openstack-foreman-installer package that fixes one security
issue, several bugs, and adds various enhancements is now available for Red
Hat Enterprise Linux OpenStack Platform 4.0.
The Red Hat Security Response Team has rated this update as having Moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Description
The openstack-foreman-installer package provides facilities for rapidly
deploying Red Hat Enterprise Linux OpenStack Platform 4.
It was discovered that the Qpid configuration created by
openstack-foreman-installer did not have authentication enabled when run
with default settings in standalone mode. An attacker able to establish a
TCP connection to Qpid could access any OpenStack back end using Qpid (for
example, nova) without any authentication. (CVE-2013-6470)
This update also fixes several bugs and adds enhancements. Documentation
for these changes is available in the Technical Notes document linked to
in the References section.
All openstack-foreman-installer users are advised to upgrade to this
updated package, which corrects these issues and adds these enhancements.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat OpenStack 4.0 x86_64
Fixes
- BZ - 1033247 - [RFE] Global Parameter Boolean for Specifying Service Deployment
- BZ - 1049122 - Install a Highly Available OpenStack deployment using Foreman (qpid)
- BZ - 1051994 - CVE-2013-6470 openstack foreman-installer: insecure defaults
- BZ - 1053623 - openstack-foreman-installer: openstack-selinux package is not installed on the foreman_clients (it cause: multiple AVCs in messages).
- BZ - 1062699 - [RFE] foreman should allow for cinder share mount options on HA Controller
- BZ - 1064050 - [RFE] foreman should allow the configuraiton of glance using RHS/NFS and direct file access
- BZ - 1064056 - Foreman Heat ports not opened in a foreman based Nova network install
- BZ - 1068885 - Foreman-installer doesn't create keystonerc_admin file on controller
- BZ - 1073087 - [RFE] Use subscription-manager in kickstart template, not rhnreg_ks
- BZ - 1073550 - Change foreman-installer to use openstack-puppet-modules
- BZ - 1077818 - Modify installer to accept environment variable for Foreman provisioning interface
- BZ - 1078279 - Pull latest Cisco Nexus updates
- BZ - 1080638 - openshift-enterprise HA template egress rules block cloud-init metadata
- BZ - 1084534 - Add Nova Service to HA hostgroup
- BZ - 1085547 - Keystone role is created as _member_ instead of Member
- BZ - 1087713 - Add Swift Proxy service to HA hostgroup
- BZ - 1088608 - Add Neutron Service to HA hostgroup
- BZ - 1088611 - Add Heat Service to HA hostgroup
- BZ - 1095853 - [Rubygem-Staypuft]:When attempting to browse : Infrastructure --> Compute Resources' getting "Not Implemented" page (as well to other pages) .
- BZ - 1099661 - OpenStack-Foreman-Installer: Failed to deploy Neutron-Compute using O-F-I due to 'Invalid parameter ceilometer_host'.
- BZ - 1100411 - ceilometer attempts to start before mongo service is ready
CVEs
Red Hat OpenStack 4.0
SRPM | |
---|---|
openstack-foreman-installer-1.0.12-1.el6ost.src.rpm | SHA-256: 4dead3643aa8ddc905432e040c1e7842e7bcaa4c0d70f37057d582d72693e538 |
x86_64 | |
openstack-foreman-installer-1.0.12-1.el6ost.noarch.rpm | SHA-256: bd252a1b84794efe22db26f0f5ed4b5e2b91997f4b3ff520b20648e4f4ed75f6 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.