Red Hat 8873 Published by

Containers for OSP 16.2 director operator tech preview are available.



RHSA-2022:0842-01: Important: Release of containers for OSP 16.2 director operator tech preview



=====================================================================
Red Hat Security Advisory

Synopsis: Important: Release of containers for OSP 16.2 director operator tech preview
Advisory ID: RHSA-2022:0842-01
Product: Red Hat OpenStack Platform
Advisory URL:   https://access.redhat.com/errata/RHSA-2022:0842
Issue date: 2022-03-14
CVE Names: CVE-2019-5827 CVE-2019-13750 CVE-2019-13751
CVE-2019-17594 CVE-2019-17595 CVE-2019-18218
CVE-2019-19603 CVE-2019-20838 CVE-2020-12762
CVE-2020-13435 CVE-2020-14155 CVE-2020-16135
CVE-2020-24370 CVE-2021-3200 CVE-2021-3426
CVE-2021-3445 CVE-2021-3521 CVE-2021-3572
CVE-2021-3580 CVE-2021-3712 CVE-2021-3800
CVE-2021-3872 CVE-2021-3984 CVE-2021-4019
CVE-2021-4122 CVE-2021-4192 CVE-2021-4193
CVE-2021-20231 CVE-2021-20232 CVE-2021-22876
CVE-2021-22898 CVE-2021-22925 CVE-2021-27645
CVE-2021-28153 CVE-2021-33560 CVE-2021-33574
CVE-2021-35942 CVE-2021-36084 CVE-2021-36085
CVE-2021-36086 CVE-2021-36087 CVE-2021-42574
CVE-2021-44716 CVE-2022-24407
=====================================================================

1. Summary:

Red Hat OpenStack Platform 16.2 (Train) director Operator containers are
available for technology preview.

2. Description:

Release osp-director-operator images

Security Fix(es):

* golang: net/http: limit growth of header canonicalization cache
(CVE-2021-44716)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

3. Solution:

OSP 16.2.z Release - OSP Director Operator Containers

4. Bugs fixed (  https://bugzilla.redhat.com/):

2025995 - Rebase tech preview on latest upstream v1.2.x branch
2030801 - CVE-2021-44716 golang: net/http: limit growth of header canonicalization cache
2036784 - osp controller (fencing enabled) in downed state after system manual crash test

5. References:

  https://access.redhat.com/security/cve/CVE-2019-5827
  https://access.redhat.com/security/cve/CVE-2019-13750
  https://access.redhat.com/security/cve/CVE-2019-13751
  https://access.redhat.com/security/cve/CVE-2019-17594
  https://access.redhat.com/security/cve/CVE-2019-17595
  https://access.redhat.com/security/cve/CVE-2019-18218
  https://access.redhat.com/security/cve/CVE-2019-19603
  https://access.redhat.com/security/cve/CVE-2019-20838
  https://access.redhat.com/security/cve/CVE-2020-12762
  https://access.redhat.com/security/cve/CVE-2020-13435
  https://access.redhat.com/security/cve/CVE-2020-14155
  https://access.redhat.com/security/cve/CVE-2020-16135
  https://access.redhat.com/security/cve/CVE-2020-24370
  https://access.redhat.com/security/cve/CVE-2021-3200
  https://access.redhat.com/security/cve/CVE-2021-3426
  https://access.redhat.com/security/cve/CVE-2021-3445
  https://access.redhat.com/security/cve/CVE-2021-3521
  https://access.redhat.com/security/cve/CVE-2021-3572
  https://access.redhat.com/security/cve/CVE-2021-3580
  https://access.redhat.com/security/cve/CVE-2021-3712
  https://access.redhat.com/security/cve/CVE-2021-3800
  https://access.redhat.com/security/cve/CVE-2021-3872
  https://access.redhat.com/security/cve/CVE-2021-3984
  https://access.redhat.com/security/cve/CVE-2021-4019
  https://access.redhat.com/security/cve/CVE-2021-4122
  https://access.redhat.com/security/cve/CVE-2021-4192
  https://access.redhat.com/security/cve/CVE-2021-4193
  https://access.redhat.com/security/cve/CVE-2021-20231
  https://access.redhat.com/security/cve/CVE-2021-20232
  https://access.redhat.com/security/cve/CVE-2021-22876
  https://access.redhat.com/security/cve/CVE-2021-22898
  https://access.redhat.com/security/cve/CVE-2021-22925
  https://access.redhat.com/security/cve/CVE-2021-27645
  https://access.redhat.com/security/cve/CVE-2021-28153
  https://access.redhat.com/security/cve/CVE-2021-33560
  https://access.redhat.com/security/cve/CVE-2021-33574
  https://access.redhat.com/security/cve/CVE-2021-35942
  https://access.redhat.com/security/cve/CVE-2021-36084
  https://access.redhat.com/security/cve/CVE-2021-36085
  https://access.redhat.com/security/cve/CVE-2021-36086
  https://access.redhat.com/security/cve/CVE-2021-36087
  https://access.redhat.com/security/cve/CVE-2021-42574
  https://access.redhat.com/security/cve/CVE-2021-44716
  https://access.redhat.com/security/cve/CVE-2022-24407
  https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is . More contact
details at   https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.