-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.0123
 SUSE-SU-2020:0081-1 Multiple security updates for SUSE OpenStack Cloud 7
                              14 January 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           crowbar-core
                   crowbar-openstack
                   openstack-horizon-plugin-monasca-ui
                   openstack-monasca-api
                   openstack-monasca-log-api
                   openstack-neutron
                   rubygem-pu
Publisher:         SUSE
Operating System:  SUSE
                   Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Denial of Service        -- Existing Account
                   Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-16770 CVE-2019-13117 CVE-2015-3448

Reference:         ESB-2019.3244
                   ESB-2019.2660

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2020/suse-su-20200081-1.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than SUSE. It is recommended that administrators 
         running crowbar-core, crowbar-openstack, 
         openstack-horizon-plugin-monasca-ui, openstack-monasca-api, 
         openstack-monasca-log-api, openstack-neutron or rubygem-pu check for
         an updated version of the software for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for crowbar-core, crowbar-openstack,
openstack-horizon-plugin-monasca-ui, openstack-monasca-api,
openstack-monasca-log-api, openstack-neutron, rubygem-pu

______________________________________________________________________________

Announcement ID:   SUSE-SU-2020:0081-1
Rating:            moderate
References:        #1157028 #1157482 #1158675 #917802
Cross-References:  CVE-2015-3448 CVE-2019-13117 CVE-2019-16770
Affected Products:
                   SUSE OpenStack Cloud 7
______________________________________________________________________________

ma, rubygem-rest-client

An update that solves three vulnerabilities and has one errata is now
available.

Description:

This update for crowbar-core, crowbar-openstack,
openstack-horizon-plugin-monasca-ui, openstack-monasca-api,
openstack-monasca-log-api, openstack-neutron, rubygem-puma, rubygem-rest-client
contains the following fixes:
Security issue fixed for rubygem-puma:

  o CVE-2019-16770: Fixed a potential denial of service in Puma's reactor (bsc#
    1158675, jsc#SOC-10999)


Security issue fixed for rubygem-rest-client:

  o CVE-2015-3448: Fixed a plain text local password disclosure. (bsc#917802)


Updates for crowbar-core:

  o Update to version 4.0+git.1574788924.e4a6aeb0c: * Allow pacemaker remotes
    for upgrade (SOC-10133)


  o Update to version 4.0+git.1574713660.972029d1a: * Ignore CVE-2019-13117 in
    CI builds (bsc#1157028)


Updates for crowbar-openstack:

  o Update to version 4.0+git.1574869671.9c7bade2d: * tempest: configure Kibana
    version (SOC-10131)


  o Update to version 4.0+git.1574764112.c260c70e5: * horizon: install lbaas
    horizon dashboard (SOC-10883)


Updates for openstack-horizon-plugin-monasca-ui:

  o Refresh allow-raw-grafana-links.patch
  o update to version 1.5.5~dev3 * Replace openstack.org git:// URLs with
    https:// * Fix the partial missing metrics in Create Alarm Definition flow
    * import zuul job settings from project-config * Fix incorrect splitting of
    dimension in ProxyView * Fix Alarm status Panel on Overview page * Change
    IntegerField to ChoiceField for notification period * Imported Translations
    from Zanata * Display unique metric names for alarm * Fix Alarm Details
    section in Alarm History view * Fix validators for creating and editing
    notifications * Center the text for the button Deterministic * Adding title
    to Filter Alarms pop-up * Fix misleading validation error * Fix nit found
    in monasca-ui * Fix Breadcrumbs * Fix description for name field * Fixing
    'Create Alarm Definition' for IE11 * Imported Translations from Zanata


Updates to openstack-monasca-api:

  o added fix-metric-name-offset.patch (SOC-10131)
  o removed 0001-Fix-InfluxDB-repository-list_dimension_values-to-sup.patch
    (merged upstream)
  o update to version 1.7.1~dev18 * Replace openstack.org git:// URLs with
    https:// * import zuul job settings from project-config * Upgrade Apache
    Storm to 1.0.6 * Zuul: Remove project name


Updates to openstack-monasca-log-api:

  o added fix-tempest-region.patch (SOC-10131)
  o update to version 1.4.3~dev3 * Replace openstack.org git:// URLs with
    https:// * import zuul job settings from project-config * Avoid tox\
    _install.sh for constraints support


Updates to openstack-neutron:

  o neutron: Remove stop action from ovs-cleanup (bsc#1157482) backport of
    https://review.opendev.org/#/c/695867/

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE OpenStack Cloud 7:
    zypper in -t patch SUSE-OpenStack-Cloud-7-2020-81=1

Package List:

  o SUSE OpenStack Cloud 7 (aarch64 s390x x86_64):
       crowbar-core-4.0+git.1574788924.e4a6aeb0c-9.60.2
       crowbar-core-branding-upstream-4.0+git.1574788924.e4a6aeb0c-9.60.2
       ruby2.1-rubygem-puma-2.16.0-4.3.1
       ruby2.1-rubygem-puma-debuginfo-2.16.0-4.3.1
       rubygem-puma-debugsource-2.16.0-4.3.1
  o SUSE OpenStack Cloud 7 (noarch):
       crowbar-openstack-4.0+git.1574869671.9c7bade2d-9.65.1
       grafana-monasca-ui-drilldown-1.5.5~dev3-8.1
       openstack-horizon-plugin-monasca-ui-1.5.5~dev3-8.1
       openstack-monasca-api-1.7.1~dev18-12.1
       openstack-monasca-log-api-1.4.3~dev3-5.1
       openstack-neutron-9.4.2~dev21-7.38.1
       openstack-neutron-dhcp-agent-9.4.2~dev21-7.38.1
       openstack-neutron-doc-9.4.2~dev21-7.38.1
       openstack-neutron-ha-tool-9.4.2~dev21-7.38.1
       openstack-neutron-l3-agent-9.4.2~dev21-7.38.1
       openstack-neutron-linuxbridge-agent-9.4.2~dev21-7.38.1
       openstack-neutron-macvtap-agent-9.4.2~dev21-7.38.1
       openstack-neutron-metadata-agent-9.4.2~dev21-7.38.1
       openstack-neutron-metering-agent-9.4.2~dev21-7.38.1
       openstack-neutron-openvswitch-agent-9.4.2~dev21-7.38.1
       openstack-neutron-server-9.4.2~dev21-7.38.1
       python-horizon-plugin-monasca-ui-1.5.5~dev3-8.1
       python-monasca-api-1.7.1~dev18-12.1
       python-monasca-log-api-1.4.3~dev3-5.1
       python-neutron-9.4.2~dev21-7.38.1


References:

  o https://www.suse.com/security/cve/CVE-2015-3448.html
  o https://www.suse.com/security/cve/CVE-2019-13117.html
  o https://www.suse.com/security/cve/CVE-2019-16770.html
  o https://bugzilla.suse.com/1157028
  o https://bugzilla.suse.com/1157482
  o https://bugzilla.suse.com/1158675
  o https://bugzilla.suse.com/917802

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXh0K7WaOgq3Tt24GAQjwDRAAuLdASAh5OAMFK171y/ut0c5C/AZZnqek
jxrXkoZsJf8IDMRqGaNphjemLvaMMCZXe9rLiBvgyNUlBBDxFMQk/gmE3X4hJyok
fiKDoA2VLbwVhAFcdYer5Lx8S0YMFvTyV3SeSS1dEdNhOw287M782oywE+cnQghV
gH9lQLaPK2m56PcMF1pXilzqwfkseLeeGNLxUCrqmwUeC2ZEnz+S+ASXQlKng+mh
wA6OKLa129Z77gdZ7++ltw/P8CbAIz6KGzFp02WThiioWoSDbktig0by2P25jQu8
hdfflhuFN6y7sgTWJlkd7w3trhHg41Ui3Kdi8sOJnbVtLx30Id8kWpDZs4yPws7i
DdzvBoyE5mm2hpUF8xA2YWbp/RmzV3WG0KvKghwR0HgyynemKqZ2ovKBubCRpKIf
PQvR9zZ76riYq0+0q/cHcX1YMm6PQGcuCcFAGJFyTl2Pu+Ama5t0DKCuNSVYHjyN
aN7yaiWh+/7gxBJEB3e3MCdClf22O+bnmqKbMrzvdRJMz1OUOiupR2hREGLXTcMS
LCKSBqdkkwm6g+I9XafsPPcK17zq6Ku83sBRHz1tY8xd1AE9zoKKeOR51122FffW
oD1cwXUpVI5QtymaSLK50t8PGmXG2VevbA9Be5+I1rh0P6WUHkBqyu4WyvHhJtNp
Im9wvUXkpYY=
=N6q8
-----END PGP SIGNATURE-----