drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in memcached
Name: |
Denial of Service in memcached |
|
ID: |
RHSA-2018:2857-01 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Enterprise Linux OpenStack Platform |
|
Datum: |
Di, 2. Oktober 2018, 22:31 |
|
Referenzen: |
https://access.redhat.com/security/cve/CVE-2018-1000115 |
|
Applikationen: |
memcached |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: Red Hat OpenStack Platform 8 director security and bug fix update Advisory ID: RHSA-2018:2857-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2018:2857 Issue date: 2018-10-02 CVE Names: CVE-2018-1000115 =====================================================================
1. Summary:
An update for instack-undercloud and openstack-tripleo-heat-templates is now available for Red Hat OpenStack Platform 8.0 (Liberty) director.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
2. Relevant releases/architectures:
OpenStack 8.0 Director for RHEL 7 - noarch
3. Description:
memcached is a high-performance, distributed memory object caching system, generic in nature, but intended for use in speeding up dynamic web applications by alleviating database load.
instack-undercloud provides a collection of scripts and elements that can be used to install an OpenStack undercloud (using python-instack).
openstack-tripleo-heat-templates is a collection of OpenStack Orchestration templates and tools (codename heat), which can be used to help deploy OpenStack.
Security Fix(es):
* memcached: UDP server support allows spoofed traffic amplification DoS (CVE-2018-1000115)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* This update fixes a race condition that could cause pacemaker-managed glance-fs deployments to fail.
Now the glance-fs resource is created from a single node of the overcloud in a way that eliminates the race condition and the resultant deployment failures. (BZ#1418617)
* Prior to this update, the source IP address for cold migration and resize was determined by the default gateway configured on the source compute node.
Now the my_ip option is explicitly set to the internal_api network IP in nova.conf, ensuring the correct network is used for this traffic. (BZ#1552855)
4. Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1418617 - OSP8 - Pacemaker-related race condition observed during controller deployment 1517269 - openstack-nova-migration is potentially missing after a minor update 1551182 - CVE-2018-1000115 memcached: UDP server support allows spoofed traffic amplification DoS 1552855 - [Deployment][OSP8] Cold-migration should use the internal_api network 1568469 - [Deployment][OSP8] nova-api not properly configure secure_proxy_ssl_header option in nova.conf when using HAProxy and SSL 1590376 - [osp8] Creation of "/etc/ssh/ssh_known_hosts" silently fails in scale deplyoments 1598927 - ceilometer-expirer cron job does not run correctly [osp8] 1630968 - openstack-puppet-modules-7.1.5-9.el7ost introduces duplicate puppet declaration in instack-undercloud
6. Package List:
OpenStack 8.0 Director for RHEL 7:
Source: instack-undercloud-2.2.7-13.el7ost.src.rpm openstack-tripleo-heat-templates-0.8.14-42.el7ost.src.rpm
noarch: instack-undercloud-2.2.7-13.el7ost.noarch.rpm openstack-tripleo-heat-templates-0.8.14-42.el7ost.noarch.rpm openstack-tripleo-heat-templates-kilo-0.8.14-42.el7ost.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2018-1000115 https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBW7O9LdzjgjWX9erEAQgDEQ//eAcR8qCw34AKy0m42fGuK6IHOYpZg3Ig SkvyNQUWaoL7c8aj1ND2HdrvXVx/y1U2jlIYgOxYF4IaV2HQZvCgbHIYO+Ll4oWY VRuCUD4tvhS4jVZslzOyQL/dbXjo8gbs6Gf0yOCQyn86ewsdTiYfOVq6ZdgMQxGr 9bqqXLSl2yaxfkxfUzO4qa/tzwS7nsEeo7u+5PPn2TG3NiuFtgmF3dsULnPXCkNM 8I/jwhwJMVagvLdea07aTA9kpnvIyRiVz11s19USGRK8djkRkllibxEXvEt83rPN Vohav+bgI5b8bhGn6EgSjWAwvazuWevPXkLOB3PoH/PE6nvowhXQ6Vak1zfXugOD YjLTElpZJ41V95eKfhyiLMwVSqGirM2bYRdw5Zn0pCxCF827EQMwg7R+dFcVr6pb tPVfe1wVZTreW86yyqhycFbIjIa2X0Q03iJcQ6skN0ZMczxgG4TQvbE+Se68toxl sysJ6jf9lun7vkPAbFTdtAhXFt0ob8eyoLzEk/aJMclYwNMGaUvUr0aqg4jy0G6q dKiHoKuFFoCDUGvin+vp01E983jofbOiOrnjCI1rLcegp+TqjgSx4DBAsGw6KVGi t+PYb/lfG150O2ZhI/Gg4bOfTqdkSYkwlkxMO+CPkwT/N5YN4oy0wLeFwORQUzaz XSrKNPUfdoc= =lBMi -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
|
|
|
|