Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.0123 SUSE-SU-2020:0081-1 Multiple security updates for SUSE OpenStack Cloud 7 14 January 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: crowbar-core crowbar-openstack openstack-horizon-plugin-monasca-ui openstack-monasca-api openstack-monasca-log-api openstack-neutron rubygem-pu Publisher: SUSE Operating System: SUSE Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Denial of Service -- Existing Account Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-16770 CVE-2019-13117 CVE-2015-3448 Reference: ESB-2019.3244 ESB-2019.2660 Original Bulletin: https://www.suse.com/support/update/announcement/2020/suse-su-20200081-1.html Comment: This advisory references vulnerabilities in products which run on platforms other than SUSE. It is recommended that administrators running crowbar-core, crowbar-openstack, openstack-horizon-plugin-monasca-ui, openstack-monasca-api, openstack-monasca-log-api, openstack-neutron or rubygem-pu check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for crowbar-core, crowbar-openstack, openstack-horizon-plugin-monasca-ui, openstack-monasca-api, openstack-monasca-log-api, openstack-neutron, rubygem-pu ______________________________________________________________________________ Announcement ID: SUSE-SU-2020:0081-1 Rating: moderate References: #1157028 #1157482 #1158675 #917802 Cross-References: CVE-2015-3448 CVE-2019-13117 CVE-2019-16770 Affected Products: SUSE OpenStack Cloud 7 ______________________________________________________________________________ ma, rubygem-rest-client An update that solves three vulnerabilities and has one errata is now available. Description: This update for crowbar-core, crowbar-openstack, openstack-horizon-plugin-monasca-ui, openstack-monasca-api, openstack-monasca-log-api, openstack-neutron, rubygem-puma, rubygem-rest-client contains the following fixes: Security issue fixed for rubygem-puma: o CVE-2019-16770: Fixed a potential denial of service in Puma's reactor (bsc# 1158675, jsc#SOC-10999) Security issue fixed for rubygem-rest-client: o CVE-2015-3448: Fixed a plain text local password disclosure. (bsc#917802) Updates for crowbar-core: o Update to version 4.0+git.1574788924.e4a6aeb0c: * Allow pacemaker remotes for upgrade (SOC-10133) o Update to version 4.0+git.1574713660.972029d1a: * Ignore CVE-2019-13117 in CI builds (bsc#1157028) Updates for crowbar-openstack: o Update to version 4.0+git.1574869671.9c7bade2d: * tempest: configure Kibana version (SOC-10131) o Update to version 4.0+git.1574764112.c260c70e5: * horizon: install lbaas horizon dashboard (SOC-10883) Updates for openstack-horizon-plugin-monasca-ui: o Refresh allow-raw-grafana-links.patch o update to version 1.5.5~dev3 * Replace openstack.org git:// URLs with https:// * Fix the partial missing metrics in Create Alarm Definition flow * import zuul job settings from project-config * Fix incorrect splitting of dimension in ProxyView * Fix Alarm status Panel on Overview page * Change IntegerField to ChoiceField for notification period * Imported Translations from Zanata * Display unique metric names for alarm * Fix Alarm Details section in Alarm History view * Fix validators for creating and editing notifications * Center the text for the button Deterministic * Adding title to Filter Alarms pop-up * Fix misleading validation error * Fix nit found in monasca-ui * Fix Breadcrumbs * Fix description for name field * Fixing 'Create Alarm Definition' for IE11 * Imported Translations from Zanata Updates to openstack-monasca-api: o added fix-metric-name-offset.patch (SOC-10131) o removed 0001-Fix-InfluxDB-repository-list_dimension_values-to-sup.patch (merged upstream) o update to version 1.7.1~dev18 * Replace openstack.org git:// URLs with https:// * import zuul job settings from project-config * Upgrade Apache Storm to 1.0.6 * Zuul: Remove project name Updates to openstack-monasca-log-api: o added fix-tempest-region.patch (SOC-10131) o update to version 1.4.3~dev3 * Replace openstack.org git:// URLs with https:// * import zuul job settings from project-config * Avoid tox\ _install.sh for constraints support Updates to openstack-neutron: o neutron: Remove stop action from ovs-cleanup (bsc#1157482) backport of https://review.opendev.org/#/c/695867/ Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE OpenStack Cloud 7: zypper in -t patch SUSE-OpenStack-Cloud-7-2020-81=1 Package List: o SUSE OpenStack Cloud 7 (aarch64 s390x x86_64): crowbar-core-4.0+git.1574788924.e4a6aeb0c-9.60.2 crowbar-core-branding-upstream-4.0+git.1574788924.e4a6aeb0c-9.60.2 ruby2.1-rubygem-puma-2.16.0-4.3.1 ruby2.1-rubygem-puma-debuginfo-2.16.0-4.3.1 rubygem-puma-debugsource-2.16.0-4.3.1 o SUSE OpenStack Cloud 7 (noarch): crowbar-openstack-4.0+git.1574869671.9c7bade2d-9.65.1 grafana-monasca-ui-drilldown-1.5.5~dev3-8.1 openstack-horizon-plugin-monasca-ui-1.5.5~dev3-8.1 openstack-monasca-api-1.7.1~dev18-12.1 openstack-monasca-log-api-1.4.3~dev3-5.1 openstack-neutron-9.4.2~dev21-7.38.1 openstack-neutron-dhcp-agent-9.4.2~dev21-7.38.1 openstack-neutron-doc-9.4.2~dev21-7.38.1 openstack-neutron-ha-tool-9.4.2~dev21-7.38.1 openstack-neutron-l3-agent-9.4.2~dev21-7.38.1 openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.38.1 openstack-neutron-macvtap-agent-9.4.2~dev21-7.38.1 openstack-neutron-metadata-agent-9.4.2~dev21-7.38.1 openstack-neutron-metering-agent-9.4.2~dev21-7.38.1 openstack-neutron-openvswitch-agent-9.4.2~dev21-7.38.1 openstack-neutron-server-9.4.2~dev21-7.38.1 python-horizon-plugin-monasca-ui-1.5.5~dev3-8.1 python-monasca-api-1.7.1~dev18-12.1 python-monasca-log-api-1.4.3~dev3-5.1 python-neutron-9.4.2~dev21-7.38.1 References: o https://www.suse.com/security/cve/CVE-2015-3448.html o https://www.suse.com/security/cve/CVE-2019-13117.html o https://www.suse.com/security/cve/CVE-2019-16770.html o https://bugzilla.suse.com/1157028 o https://bugzilla.suse.com/1157482 o https://bugzilla.suse.com/1158675 o https://bugzilla.suse.com/917802 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXh0K7WaOgq3Tt24GAQjwDRAAuLdASAh5OAMFK171y/ut0c5C/AZZnqek jxrXkoZsJf8IDMRqGaNphjemLvaMMCZXe9rLiBvgyNUlBBDxFMQk/gmE3X4hJyok fiKDoA2VLbwVhAFcdYer5Lx8S0YMFvTyV3SeSS1dEdNhOw287M782oywE+cnQghV gH9lQLaPK2m56PcMF1pXilzqwfkseLeeGNLxUCrqmwUeC2ZEnz+S+ASXQlKng+mh wA6OKLa129Z77gdZ7++ltw/P8CbAIz6KGzFp02WThiioWoSDbktig0by2P25jQu8 hdfflhuFN6y7sgTWJlkd7w3trhHg41Ui3Kdi8sOJnbVtLx30Id8kWpDZs4yPws7i DdzvBoyE5mm2hpUF8xA2YWbp/RmzV3WG0KvKghwR0HgyynemKqZ2ovKBubCRpKIf PQvR9zZ76riYq0+0q/cHcX1YMm6PQGcuCcFAGJFyTl2Pu+Ama5t0DKCuNSVYHjyN aN7yaiWh+/7gxBJEB3e3MCdClf22O+bnmqKbMrzvdRJMz1OUOiupR2hREGLXTcMS LCKSBqdkkwm6g+I9XafsPPcK17zq6Ku83sBRHz1tY8xd1AE9zoKKeOR51122FffW oD1cwXUpVI5QtymaSLK50t8PGmXG2VevbA9Be5+I1rh0P6WUHkBqyu4WyvHhJtNp Im9wvUXkpYY= =N6q8 -----END PGP SIGNATURE-----