-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: openstack-octavia security update Advisory ID: RHSA-2020:0721-01 Product: Red Hat OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2020:0721 Issue date: 2020-03-05 CVE Names: CVE-2019-17134 ==================================================================== 1. Summary: An update for openstack-octavia is now available for Red Hat OpenStack Platform 15 (Stein). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 15.0 - noarch 3. Description: The OpenStack Load Balancing service (openstack-octavia) provides a Load Balancing-as-a-Service (LBaaS) version 2 implementation for Red Hat OpenStack platform director based installations. Security Fix(es): * amphora-agent not requiring client certificate (CVE-2019-17134) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1749344 - [OSP15][Octavia]- house keeper is not deleting DB entries for deleted LBs according to the configured times. 1761307 - CVE-2019-17134 openstack-octavia: amphora-agent not requiring client certificate 1772209 - Unable to filter load balancers by Tag attribute 6. Package List: Red Hat OpenStack Platform 15.0: Source: openstack-octavia-4.1.2-0.20200114080449.5a71643.el8ost.src.rpm noarch: openstack-octavia-amphora-agent-4.1.2-0.20200114080449.5a71643.el8ost.noarch.rpm openstack-octavia-api-4.1.2-0.20200114080449.5a71643.el8ost.noarch.rpm openstack-octavia-common-4.1.2-0.20200114080449.5a71643.el8ost.noarch.rpm openstack-octavia-diskimage-create-4.1.2-0.20200114080449.5a71643.el8ost.noarch.rpm openstack-octavia-health-manager-4.1.2-0.20200114080449.5a71643.el8ost.noarch.rpm openstack-octavia-housekeeping-4.1.2-0.20200114080449.5a71643.el8ost.noarch.rpm openstack-octavia-worker-4.1.2-0.20200114080449.5a71643.el8ost.noarch.rpm python3-octavia-4.1.2-0.20200114080449.5a71643.el8ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-17134 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXmDpTtzjgjWX9erEAQiCxQ/9HuvqIa3nGznIh36xbeoZfc1p7JW1IZTU sFg/xjoi/5+J4YeznMYGKN2FYCed6MwwfTGuFo2K1aqtCQPRBqWfpDJk3C0lHtK+ tCKso2VEtK7ioLKTuZP21M7u0re+ubVHiysjGQHjXGst1NW0WzNjqR7a78q8T2Ae 05TdCfoT2u1BY1T7UrWi/00UfYQjGq/lGkiOqRIBGW1mp8sqcamBiO62onKpQbe7 7iMbGTShT9SzUbnOM31lifhy9hhWlhwnBHivI7OmGSektyTY59c5hNcy7QSN9Ot0 w26FucIXcml3E7WwI4WW+OUkzwbXi/Pi0oafC2HrZ8JQRvLjrck5Ec4o9VsxxptK gYgFYdAXaqEUwZf+aFazuEZvXB2wClbmwYp8d0Vu5ZjNQDBtXJmvle70nGjh54q0 MT3NilIbGgYez2ki+K3i41WzbzbZQE8KKIWLaSd+RVmLmO083od5Y9nqAHZmy5qT t0nR4t+HD2E5CBuYAB94cbTei/SswwWGCIomiu/L92O1g2n+oUS8e1G8jFmBe4tH 2ZiPSGBrrfs8xXINqZupsdyD41ejStkcRvclAaKYDjKbWLP7C7J+teNUd4hY7m6K QLvRwOnWVu9MCzXmFYbcyQdYPwIA5eXeXIT5aUfc+gQ8LUTOu7k8hLJY9OBFCx5e HYam93cg5e8=IY9v -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce