-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.1065
     Release of containers for OSP 16.2 director operator tech preview
                               15 March 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat OpenStack Platform 16.2 (Train) director Operator containers
Publisher:         Red Hat
Operating System:  Red Hat
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-24407 CVE-2021-44716 CVE-2021-42574
                   CVE-2021-36087 CVE-2021-36086 CVE-2021-36085
                   CVE-2021-36084 CVE-2021-35942 CVE-2021-33574
                   CVE-2021-33560 CVE-2021-28153 CVE-2021-27645
                   CVE-2021-22925 CVE-2021-22898 CVE-2021-22876
                   CVE-2021-20232 CVE-2021-20231 CVE-2021-4193
                   CVE-2021-4192 CVE-2021-4122 CVE-2021-4019
                   CVE-2021-3984 CVE-2021-3872 CVE-2021-3800
                   CVE-2021-3712 CVE-2021-3580 CVE-2021-3572
                   CVE-2021-3521 CVE-2021-3445 CVE-2021-3426
                   CVE-2021-3200 CVE-2020-24370 CVE-2020-16135
                   CVE-2020-14155 CVE-2020-13435 CVE-2020-12762
                   CVE-2019-20838 CVE-2019-19603 CVE-2019-18218
                   CVE-2019-17595 CVE-2019-17594 CVE-2019-13751
                   CVE-2019-13750 CVE-2019-5827 

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2022:0842

Comment: CVSS (Max):  9.8 CVE-2019-18218 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: Red Hat
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Release of containers for OSP 16.2 director operator tech preview
Advisory ID:       RHSA-2022:0842-01
Product:           Red Hat OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:0842
Issue date:        2022-03-14
CVE Names:         CVE-2019-5827 CVE-2019-13750 CVE-2019-13751 
                   CVE-2019-17594 CVE-2019-17595 CVE-2019-18218 
                   CVE-2019-19603 CVE-2019-20838 CVE-2020-12762 
                   CVE-2020-13435 CVE-2020-14155 CVE-2020-16135 
                   CVE-2020-24370 CVE-2021-3200 CVE-2021-3426 
                   CVE-2021-3445 CVE-2021-3521 CVE-2021-3572 
                   CVE-2021-3580 CVE-2021-3712 CVE-2021-3800 
                   CVE-2021-3872 CVE-2021-3984 CVE-2021-4019 
                   CVE-2021-4122 CVE-2021-4192 CVE-2021-4193 
                   CVE-2021-20231 CVE-2021-20232 CVE-2021-22876 
                   CVE-2021-22898 CVE-2021-22925 CVE-2021-27645 
                   CVE-2021-28153 CVE-2021-33560 CVE-2021-33574 
                   CVE-2021-35942 CVE-2021-36084 CVE-2021-36085 
                   CVE-2021-36086 CVE-2021-36087 CVE-2021-42574 
                   CVE-2021-44716 CVE-2022-24407 
=====================================================================

1. Summary:

Red Hat OpenStack Platform 16.2 (Train) director Operator containers are
available for technology preview.

2. Description:

Release osp-director-operator images

Security Fix(es):

* golang: net/http: limit growth of header canonicalization cache
(CVE-2021-44716)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

3. Solution:

OSP 16.2.z Release - OSP Director Operator Containers

4. Bugs fixed (https://bugzilla.redhat.com/):

2025995 - Rebase tech preview on latest upstream v1.2.x branch
2030801 - CVE-2021-44716 golang: net/http: limit growth of header canonicalization cache
2036784 - osp controller (fencing enabled) in downed state after system manual crash test

5. References:

https://access.redhat.com/security/cve/CVE-2019-5827
https://access.redhat.com/security/cve/CVE-2019-13750
https://access.redhat.com/security/cve/CVE-2019-13751
https://access.redhat.com/security/cve/CVE-2019-17594
https://access.redhat.com/security/cve/CVE-2019-17595
https://access.redhat.com/security/cve/CVE-2019-18218
https://access.redhat.com/security/cve/CVE-2019-19603
https://access.redhat.com/security/cve/CVE-2019-20838
https://access.redhat.com/security/cve/CVE-2020-12762
https://access.redhat.com/security/cve/CVE-2020-13435
https://access.redhat.com/security/cve/CVE-2020-14155
https://access.redhat.com/security/cve/CVE-2020-16135
https://access.redhat.com/security/cve/CVE-2020-24370
https://access.redhat.com/security/cve/CVE-2021-3200
https://access.redhat.com/security/cve/CVE-2021-3426
https://access.redhat.com/security/cve/CVE-2021-3445
https://access.redhat.com/security/cve/CVE-2021-3521
https://access.redhat.com/security/cve/CVE-2021-3572
https://access.redhat.com/security/cve/CVE-2021-3580
https://access.redhat.com/security/cve/CVE-2021-3712
https://access.redhat.com/security/cve/CVE-2021-3800
https://access.redhat.com/security/cve/CVE-2021-3872
https://access.redhat.com/security/cve/CVE-2021-3984
https://access.redhat.com/security/cve/CVE-2021-4019
https://access.redhat.com/security/cve/CVE-2021-4122
https://access.redhat.com/security/cve/CVE-2021-4192
https://access.redhat.com/security/cve/CVE-2021-4193
https://access.redhat.com/security/cve/CVE-2021-20231
https://access.redhat.com/security/cve/CVE-2021-20232
https://access.redhat.com/security/cve/CVE-2021-22876
https://access.redhat.com/security/cve/CVE-2021-22898
https://access.redhat.com/security/cve/CVE-2021-22925
https://access.redhat.com/security/cve/CVE-2021-27645
https://access.redhat.com/security/cve/CVE-2021-28153
https://access.redhat.com/security/cve/CVE-2021-33560
https://access.redhat.com/security/cve/CVE-2021-33574
https://access.redhat.com/security/cve/CVE-2021-35942
https://access.redhat.com/security/cve/CVE-2021-36084
https://access.redhat.com/security/cve/CVE-2021-36085
https://access.redhat.com/security/cve/CVE-2021-36086
https://access.redhat.com/security/cve/CVE-2021-36087
https://access.redhat.com/security/cve/CVE-2021-42574
https://access.redhat.com/security/cve/CVE-2021-44716
https://access.redhat.com/security/cve/CVE-2022-24407
https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=1SVS
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=hm27
-----END PGP SIGNATURE-----