Login
Newsletter
Werbung

Sicherheit: Denial of Service in memcached
Aktuelle Meldungen Distributionen
Name: Denial of Service in memcached
ID: RHSA-2018:2857-01
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux OpenStack Platform
Datum: Di, 2. Oktober 2018, 22:31
Referenzen: https://access.redhat.com/security/cve/CVE-2018-1000115
Applikationen: memcached

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat OpenStack Platform 8 director security and
bug fix update
Advisory ID: RHSA-2018:2857-01
Product: Red Hat Enterprise Linux OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2018:2857
Issue date: 2018-10-02
CVE Names: CVE-2018-1000115
=====================================================================

1. Summary:

An update for instack-undercloud and openstack-tripleo-heat-templates is
now available for Red Hat OpenStack Platform 8.0 (Liberty) director.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

OpenStack 8.0 Director for RHEL 7 - noarch

3. Description:

memcached is a high-performance, distributed memory object caching system,
generic in nature, but intended for use in speeding up dynamic web
applications by alleviating database load.

instack-undercloud provides a collection of scripts and elements that can
be used to install an OpenStack undercloud (using python-instack).

openstack-tripleo-heat-templates is a collection of OpenStack Orchestration
templates and tools (codename heat), which can be used to help deploy
OpenStack.

Security Fix(es):

* memcached: UDP server support allows spoofed traffic amplification DoS
(CVE-2018-1000115)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Bug Fix(es):

* This update fixes a race condition that could cause pacemaker-managed
glance-fs deployments to fail.

Now the glance-fs resource is created from a single node of the overcloud
in a way that eliminates the race condition and the resultant deployment
failures. (BZ#1418617)

* Prior to this update, the source IP address for cold migration and resize
was determined by the default gateway configured on the source compute
node.

Now the my_ip option is explicitly set to the internal_api network IP in
nova.conf, ensuring the correct network is used for this traffic.
(BZ#1552855)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1418617 - OSP8 - Pacemaker-related race condition observed during controller
deployment
1517269 - openstack-nova-migration is potentially missing after a minor update
1551182 - CVE-2018-1000115 memcached: UDP server support allows spoofed traffic
amplification DoS
1552855 - [Deployment][OSP8] Cold-migration should use the internal_api network
1568469 - [Deployment][OSP8] nova-api not properly configure
secure_proxy_ssl_header option in nova.conf when using HAProxy and SSL
1590376 - [osp8] Creation of "/etc/ssh/ssh_known_hosts" silently fails
in scale deplyoments
1598927 - ceilometer-expirer cron job does not run correctly [osp8]
1630968 - openstack-puppet-modules-7.1.5-9.el7ost introduces duplicate puppet
declaration in instack-undercloud

6. Package List:

OpenStack 8.0 Director for RHEL 7:

Source:
instack-undercloud-2.2.7-13.el7ost.src.rpm
openstack-tripleo-heat-templates-0.8.14-42.el7ost.src.rpm

noarch:
instack-undercloud-2.2.7-13.el7ost.noarch.rpm
openstack-tripleo-heat-templates-0.8.14-42.el7ost.noarch.rpm
openstack-tripleo-heat-templates-kilo-0.8.14-42.el7ost.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-1000115
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=lBMi
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung