First published: Thu Nov 21 2024(Updated: )
Moderate: RHOSP 17.1.4 (openstack-tripleo-common and python-tripleoclient) security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openstack-tripleo-common | <15.4.1-17.1.20240911093743.e5b18f2.el8 | 15.4.1-17.1.20240911093743.e5b18f2.el8 |
redhat/python-tripleoclient | <16.5.1-17.1.20240913093745.f3599d0.el8 | 16.5.1-17.1.20240913093745.f3599d0.el8 |
redhat/openstack-tripleo-common-container-base | <15.4.1-17.1.20240911093743.e5b18f2.el8 | 15.4.1-17.1.20240911093743.e5b18f2.el8 |
redhat/openstack-tripleo-common-containers | <15.4.1-17.1.20240911093743.e5b18f2.el8 | 15.4.1-17.1.20240911093743.e5b18f2.el8 |
redhat/python3-tripleo-common | <15.4.1-17.1.20240911093743.e5b18f2.el8 | 15.4.1-17.1.20240911093743.e5b18f2.el8 |
redhat/python3-tripleoclient | <16.5.1-17.1.20240913093745.f3599d0.el8 | 16.5.1-17.1.20240913093745.f3599d0.el8 |
Red Hat OpenStack Services on OpenShift |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:9991 is classified as Moderate.
To fix RHSA-2024:9991, update the affected packages to the specified remedial versions for openstack-tripleo-common and python-tripleoclient.
The affected packages in RHSA-2024:9991 include openstack-tripleo-common, python-tripleoclient, and their container counterparts.
TLS verification is disabled for registry mirrors in RHSA-2024:9991 to address security vulnerabilities that could arise from improper SSL validation.
If you are using Red Hat OpenStack, ensure you apply the security update provided in RHSA-2024:9991 urgently to mitigate any associated risks.