Zwei Probleme in openstack-neutron
ID: | RHSA-2019:0879-01 |
Distribution: | Red Hat |
Plattformen: | Red Hat Enterprise Linux OpenStack Platform |
Datum: | Mi, 1. Mai 2019, 09:41 |
Referenzen: | https://access.redhat.com/security/cve/CVE-2019-10876
https://access.redhat.com/security/cve/CVE-2019-9735 |
Applikationen: | OpenStack |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: openstack-neutron security update Advisory ID: RHSA-2019:0879-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2019:0879 Issue date: 2019-04-30 CVE Names: CVE-2019-9735 CVE-2019-10876 ===================================================================== 1. Summary: An update for openstack-neutron is now available for Red Hat OpenStack Platform 14.0 (Rocky). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 14.0 - noarch 3. Description: OpenStack Networking (neutron) is a pluggable, scalable, and API-driven system that provisions networking services to virtual machines. Its main function is to manage connectivity to and from virtual machines. Security Fix(es): * openstack-neutron: incorrect validation of port settings in iptables security group driver (CVE-2019-9735) * openstack-neutron: DOS via broken port range merging in security group (CVE-2019-10876) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1690150 - Rebase openstack-neutron to 00b63be 1690745 - CVE-2019-9735 openstack-neutron: incorrect validation of port settings in iptables security group driver 1695883 - CVE-2019-10876 openstack-neutron: DOS via broken port range merging in security group 6. Package List: Red Hat OpenStack Platform 14.0: Source: openstack-neutron-13.0.3-0.20190313155649.00b63be.el7ost.src.rpm noarch: openstack-neutron-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm openstack-neutron-common-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm openstack-neutron-linuxbridge-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm openstack-neutron-macvtap-agent-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm openstack-neutron-metering-agent-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm openstack-neutron-ml2-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm openstack-neutron-openvswitch-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm openstack-neutron-rpc-server-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm openstack-neutron-sriov-nic-agent-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm python-neutron-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-9735 https://access.redhat.com/security/cve/CVE-2019-10876 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is |