RHEL 9 : openstack-tripleo-heat-templates and tripleo-ansible update (Moderate) (RHSA-2024:2736)

medium Nessus Plugin ID 197639

Synopsis

The remote Red Hat host is missing a security update.

Description

The remote Redhat Enterprise Linux 9 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2024:2736 advisory.

openstack-tripleo-heat-templates is a collection of OpenStack Orchestration templates and tools (codename heat), which can be used to help deploy OpenStack.

Security Fix(es):

* tripleo-ansible: bind keys are world readable (CVE-2023-6725)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* Banner text is not being displayed for overcloud hosts (BZ#2237000)

* RHOSP16.2 to 17.1 upgrade: During Leapp uprade steps the network interface names are not preserved (BZ#2249024)

* [FFU][DCN] ceph-ansible package is removed at the end of ceph adopt stage during ceph upgrade (BZ#2249690)

* [FFU] The Host System upgrade of HCI nodes fails on setting noout flags (BZ#2254036)

* Config state files created during update run for tripleo ha services has unexpected file suffixes (BZ#2256780)

* [OSP17.1] After upgrade to OSP16.2.6 Octavia Mgmt network amphoras having random MTU change: smaller MTU (1500) compared to orginal value 8950 (jumbo frames) (BZ#2257274)

* multi-rhel-container-image-prepare.py for 16.2 to 17.1 upgrades returning wrong ceph image (BZ#2259286)

* Upgrade [OSP16.2 -> OSP17.1] VMS stoped due to use Libvirt on RHEL-8 computes instead of LibvirtLegacy (BZ#2263916)

* iptables on the undercloud not starting due to neutron rules (BZ#2272006)

* [RHOSP 17.1] ipmi/main plugin read error in collectd container (BZ#2274010)

Enhancement(s):

* DCN - FFU 16.2 to 17.1.1 computes only (BZ#1900663)

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected openstack-tripleo-heat-templates and / or tripleo-ansible packages.

See Also

http://www.nessus.org/u?02ae8706

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=1900663

https://bugzilla.redhat.com/show_bug.cgi?id=2233300

https://bugzilla.redhat.com/show_bug.cgi?id=2237000

https://bugzilla.redhat.com/show_bug.cgi?id=2249024

https://bugzilla.redhat.com/show_bug.cgi?id=2249273

https://bugzilla.redhat.com/show_bug.cgi?id=2249690

https://bugzilla.redhat.com/show_bug.cgi?id=2250940

https://bugzilla.redhat.com/show_bug.cgi?id=2254036

https://bugzilla.redhat.com/show_bug.cgi?id=2255114

https://bugzilla.redhat.com/show_bug.cgi?id=2256780

https://bugzilla.redhat.com/show_bug.cgi?id=2257274

https://bugzilla.redhat.com/show_bug.cgi?id=2259286

https://bugzilla.redhat.com/show_bug.cgi?id=2260304

https://bugzilla.redhat.com/show_bug.cgi?id=2263226

https://bugzilla.redhat.com/show_bug.cgi?id=2263916

https://bugzilla.redhat.com/show_bug.cgi?id=2264884

https://bugzilla.redhat.com/show_bug.cgi?id=2266206

https://bugzilla.redhat.com/show_bug.cgi?id=2272006

https://bugzilla.redhat.com/show_bug.cgi?id=2274010

https://access.redhat.com/errata/RHSA-2024:2736

Plugin Details

Severity: Medium

ID: 197639

File Name: redhat-RHSA-2024-2736.nasl

Version: 1.2

Type: local

Agent: unix

Published: 5/22/2024

Updated: 11/8/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.7

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: Medium

Base Score: 5.7

Temporal Score: 4.2

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:P/A:P

CVSS Score Source: CVE-2023-6725

CVSS v3

Risk Factor: Medium

Base Score: 6.6

Temporal Score: 5.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:openstack-tripleo-heat-templates, p-cpe:/a:redhat:enterprise_linux:tripleo-ansible, cpe:/o:redhat:enterprise_linux:9

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 5/22/2024

Vulnerability Publication Date: 3/15/2024

Reference Information

CVE: CVE-2023-6725

CWE: 1220

RHSA: 2024:2736