- Issued:
- 2021-09-15
- Updated:
- 2021-09-15
RHEA-2021:3489 - Red Hat OpenStack Platform 16.2 containers bug fix advisory
Synopsis
Red Hat OpenStack Platform 16.2 containers bug fix advisory
Type/Severity
Product Enhancement Advisory None
Topic
Container updates are available for Red Hat OpenStack Platform 16.2 for Red Hat Enterprise Linux (RHEL) 8.4.
Description
Red Hat OpenStack Platform provides the facilities for building, deploying and monitoring a private or public infrastructure-as-a-service (IaaS) cloud running on commonly available physical hardware.
Solution
Before applying this update, ensure all previously released errata relevant to your system have been applied.
Red Hat OpenStack Platform 16.2 runs on RHEL 8.4.
The Red Hat OpenStack Platform 16.2 Release Notes contain the following:
An explanation of the way in which the provided components interact to form a working cloud computing environment.
Technology Previews, Recommended Practices, and Known Issues. The channels required for Red Hat OpenStack Platform 16.2, including which channels need to be enabled and disabled.
The Release Notes are available at: https://access.redhat.com/documentation/en-us/red_hat_openstack_platform/16.2/html/release_notes/index
The container images provided by this update can be downloaded from the Red Hat Container Registry at registry.redhat.io using the "podman pull" command.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenStack | 16.2 | x86_64 |
| Red Hat OpenStack for IBM Power | 16.2 | ppc64le |
Fixes
- This content is not included.BZ - 1885520
- This content is not included.BZ - 1886730
- This content is not included.BZ - 1898467
- This content is not included.BZ - 1898468
- This content is not included.BZ - 1905154
- This content is not included.BZ - 1990484
CVEs
- CVE-2016-10228
- CVE-2017-14502
- CVE-2018-20843
- CVE-2018-1000858
- CVE-2019-2708
- CVE-2019-8625
- CVE-2019-8710
- CVE-2019-8720
- CVE-2019-8743
- CVE-2019-8764
- CVE-2019-8766
- CVE-2019-8769
- CVE-2019-8771
- CVE-2019-8782
- CVE-2019-8783
- CVE-2019-8808
- CVE-2019-8811
- CVE-2019-8812
- CVE-2019-8813
- CVE-2019-8814
- CVE-2019-8815
- CVE-2019-8816
- CVE-2019-8819
- CVE-2019-8820
- CVE-2019-8823
- CVE-2019-8835
- CVE-2019-8844
- CVE-2019-8846
- CVE-2019-9169
- CVE-2019-13050
- CVE-2019-13225
- CVE-2019-13627
- CVE-2019-14889
- CVE-2019-15903
- CVE-2019-19906
- CVE-2019-20454
- CVE-2019-20807
- CVE-2019-25013
- CVE-2019-25032
- CVE-2019-25034
- CVE-2019-25035
- CVE-2019-25036
- CVE-2019-25037
- CVE-2019-25038
- CVE-2019-25039
- CVE-2019-25040
- CVE-2019-25041
- CVE-2019-25042
- CVE-2020-1730
- CVE-2020-2574
- CVE-2020-2752
- CVE-2020-2922
- CVE-2020-3862
- CVE-2020-3864
- CVE-2020-3865
- CVE-2020-3867
- CVE-2020-3868
- CVE-2020-3885
- CVE-2020-3894
- CVE-2020-3895
- CVE-2020-3897
- CVE-2020-3898
- CVE-2020-3899
- CVE-2020-3900
- CVE-2020-3901
- CVE-2020-3902
- CVE-2020-6829
- CVE-2020-8231
- CVE-2020-8284
- CVE-2020-8285
- CVE-2020-8286
- CVE-2020-8927
- CVE-2020-9802
- CVE-2020-9803
- CVE-2020-9805
- CVE-2020-9806
- CVE-2020-9807
- CVE-2020-9843
- CVE-2020-9850
- CVE-2020-9862
- CVE-2020-9893
- CVE-2020-9894
- CVE-2020-9895
- CVE-2020-9915
- CVE-2020-9925
- CVE-2020-9952
- CVE-2020-10018
- CVE-2020-11793
- CVE-2020-12400
- CVE-2020-12403
- CVE-2020-13249
- CVE-2020-13434
- CVE-2020-14391
- CVE-2020-15358
- CVE-2020-15503
- CVE-2020-25659
- CVE-2020-26116
- CVE-2020-26137
- CVE-2020-27618
- CVE-2020-27619
- CVE-2020-27783
- CVE-2020-28196
- CVE-2020-28935
- CVE-2020-29361
- CVE-2020-29362
- CVE-2020-29363
- CVE-2020-36242
- CVE-2021-2007
- CVE-2021-3177
- CVE-2021-3281
- CVE-2021-3326
- CVE-2021-3421
- CVE-2021-3449
- CVE-2021-3450
- CVE-2021-3516
- CVE-2021-3517
- CVE-2021-3518
- CVE-2021-3520
- CVE-2021-3537
- CVE-2021-3541
- CVE-2021-20271
- CVE-2021-20305
- CVE-2021-23239
- CVE-2021-23240
- CVE-2021-23336
- CVE-2021-25215
- CVE-2021-27218
- CVE-2021-30666
- CVE-2021-30761
- CVE-2021-30762
- CVE-2021-31525
- CVE-2021-33195
- CVE-2021-33197
- CVE-2021-33198
- CVE-2021-33203
- CVE-2021-33571
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.