-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat OpenStack Platform 16.2.4 (puppet) security update Advisory ID: RHSA-2022:8846-01 Product: Red Hat OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2022:8846 Issue date: 2022-12-07 CVE Names: CVE-2021-27025 ==================================================================== 1. Summary: An update for puppet is now available for Red Hat OpenStack Platform 16.2.4 (Train). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 16.2 - noarch 3. Description: Puppet lets you centrally manage every important aspect of your system using a cross-platform specification language that manages all the separate elements normally aggregated in different files, like users, cron jobs, and hosts, along with obviously discrete elements like packages, services, and files. Provides the central puppet server daemon which provides manifests to clients. The server can also function as a certificate authority and file server. This puppet headless subpackage may be used when there is no need to have puppet agent running as a service, for example, in a container image. Security fix(es): puppet: silent configuration failure in agent: (CVE-2021-27025) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2023853 - CVE-2021-27025 puppet: silent configuration failure in agent 6. Package List: Red Hat OpenStack Platform 16.2: Source: puppet-5.5.10-14.el8ost.src.rpm noarch: puppet-5.5.10-14.el8ost.noarch.rpm puppet-headless-5.5.10-14.el8ost.noarch.rpm puppet-server-5.5.10-14.el8ost.noarch.rpm Red Hat OpenStack Platform 16.2: Source: puppet-5.5.10-14.el8ost.src.rpm noarch: puppet-5.5.10-14.el8ost.noarch.rpm puppet-headless-5.5.10-14.el8ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-27025 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY5FpS9zjgjWX9erEAQgn4Q/+J+wJJneM+6Sru2J9+5e5cUumm5yIi+5R HosD5+OWjNu2SC78L/crwuHbSPCCOtkGNBZ0ce9qs5ICrcgVK+WOTYzKpgVvufwi WYLeCrAyRi+KYPCo+yeGvwMB4zKC/GMyxkY2e8nQnqEGhWvrVilZ4BhROdVc5/Ko 0j5+ZvaQu6xYJJ7c5s/Ih2QbDAFvPISlwIHPHz5G4v4VjBu/UbuhUm2K9XW8SnBk +IRT9f9QsSLGBwKRdGeLxSqKaPoJapjzw0jAx5djd/eROyEdMx3tfjNR4kvZsANc FKqSLoFXQ3pkzjmFjiRa/b1ZWb0YnytpwBdxevD0Uh1uvPSxLz9Qhx6UJQPQjOsm 9twevRxEIR8womf59F3VEIWT0MzbPIL0+cWL/RUjuPJCbafgaN5VmTWzSJhu4DO5 UG4ERlIF65VOj6zp2NK9qaHt5eAnewDOBu7dpnjUD7pZLaXwlKzlzeoElccmq6f6 nbQ5LZ5fwYK1pXYXDnW0WnVg1Necam6FxdKSAUIm3f6ODew4yliP7VwcOW3a/Bhp 5dzd1B+eHm7Fkxo/YfKLV3sWNbGKGt5cf/WSc7ojrsqbd55zzioqoBvX5868T5wK dwHxhumcBzQ3/QP4Fw1hwkD68HzMaRTifmfXDdIPtOhInAcVEJIWjf5YbW1iW9Ml gbFIhJs6YDo=8NYh -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce