Recommended update for several crowbar barclamps

Announcement ID: SUSE-RU-2018:1071-1
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2018-1000115 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products:
  • SUSE Linux Enterprise High Performance Computing 12 SP2
  • SUSE Linux Enterprise Server 12 SP2
  • SUSE OpenStack Cloud 7

An update that solves one vulnerability and has six fixes can now be installed.

Description:

This update for Crowbar provides several fixes and improvements for the following barclamps:

crowbar-openstack:

  • nova: Use internal placement url (bsc#1055188)
  • nova: Subscribe to placement config (bsc#1055188)
  • barbican: Add missing roles used in policy.json (bsc#1081573)
  • barbican: Add creator role (bsc#1081573)
  • memcached: Disable UDP by default (bsc#1083903)
  • cinder: Set os_privileged_* values (bsc#1079763)
  • apache: don't collect Listen ports from wsgi vhosts (bsc#1077234)
  • magnum: Add domain name to keystone_auth (bsc#1080335)
  • neutron-ha-tool: Add insecure flag (bsc#1075394)

crowbar-ha:

  • pacemaker: Fix migration number.

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE OpenStack Cloud 7
    zypper in -t patch SUSE-OpenStack-Cloud-7-2018-724=1

Package List:

  • SUSE OpenStack Cloud 7 (noarch)
    • crowbar-ha-4.0+git.1521473535.67d2302-4.28.1
    • crowbar-openstack-4.0+git.1522325467.43e431f91-9.30.1

References: