Home / mailings [RHSA-2023:4694-01] Moderate: Release of containers for OSP 16.2.z (Train) director Operator
Posted on 22 August 2023
RedHat===================================================================== Red Hat Security Advisory
Synopsis: Moderate: Release of containers for OSP 16.2.z (Train) director Operator
Advisory ID: RHSA-2023:4694-01
Product: Red Hat OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2023:4694
Issue date: 2023-08-22
CVE Names: CVE-2020-24736 CVE-2022-21235 CVE-2022-36227
CVE-2023-0361 CVE-2023-1667 CVE-2023-2283
CVE-2023-2602 CVE-2023-2603 CVE-2023-27536
CVE-2023-28321 CVE-2023-28484 CVE-2023-29469
=====================================================================
1. Summary:
Red Hat OpenStack Platform (RHOSP) 16.2.z (Train) director Operator
containers are now available.
2. Description:
Release of Red Hat OpenStack Platform (RHOSP) 16.2.z (Train) provides these
changes:
3. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
4. Bugs fixed (https://bugzilla.redhat.com/):
2215317 - CVE-2022-21235 github.com/Masterminds/vcs: Command Injection via argument injection
2218300 - git url logic does not handle non-default ports and users
2228513 - [16.2] Ephemeral heat communication is not using svc fqdn and hitting proxy
2229173 - [16.2] OpenStackConfigGenerator fails to clone from Azure DevOps with empty git-upload-pack given
5. JIRA issues fixed (https://issues.redhat.com/):
OSPK8-735 - Improve logging for BMH selection in BaremetalSet controller
6. References:
https://access.redhat.com/security/cve/CVE-2020-24736
https://access.redhat.com/security/cve/CVE-2022-21235
https://access.redhat.com/security/cve/CVE-2022-36227
https://access.redhat.com/security/cve/CVE-2023-0361
https://access.redhat.com/security/cve/CVE-2023-1667
https://access.redhat.com/security/cve/CVE-2023-2283
https://access.redhat.com/security/cve/CVE-2023-2602
https://access.redhat.com/security/cve/CVE-2023-2603
https://access.redhat.com/security/cve/CVE-2023-27536
https://access.redhat.com/security/cve/CVE-2023-28321
https://access.redhat.com/security/cve/CVE-2023-28484
https://access.redhat.com/security/cve/CVE-2023-29469
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/16.2/html/release_notes
7. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2023 Red Hat, Inc.