[RHSA-2019:0879-01] Important: openstack-neutron security update

Security announcements for all Red Hat products and services. rhsa-announce at redhat.com
Tue Apr 30 17:47:44 UTC 2019


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: openstack-neutron security update
Advisory ID:       RHSA-2019:0879-01
Product:           Red Hat Enterprise Linux OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:0879
Issue date:        2019-04-30
CVE Names:         CVE-2019-9735 CVE-2019-10876 
=====================================================================

1. Summary:

An update for openstack-neutron is now available for Red Hat OpenStack
Platform 14.0 (Rocky).

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenStack Platform 14.0 - noarch

3. Description:

OpenStack Networking (neutron) is a pluggable, scalable, and API-driven
system that provisions networking services to virtual machines. Its main
function is to manage connectivity to and from virtual machines.

Security Fix(es):

* openstack-neutron: incorrect validation of port settings in iptables
security group driver (CVE-2019-9735)

* openstack-neutron: DOS via broken port range merging in security group
(CVE-2019-10876)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1690150 - Rebase openstack-neutron to 00b63be
1690745 - CVE-2019-9735 openstack-neutron: incorrect validation of port settings in iptables security group driver
1695883 - CVE-2019-10876 openstack-neutron: DOS via broken port range merging in security group

6. Package List:

Red Hat OpenStack Platform 14.0:

Source:
openstack-neutron-13.0.3-0.20190313155649.00b63be.el7ost.src.rpm

noarch:
openstack-neutron-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
openstack-neutron-common-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
openstack-neutron-linuxbridge-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
openstack-neutron-macvtap-agent-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
openstack-neutron-metering-agent-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
openstack-neutron-ml2-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
openstack-neutron-openvswitch-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
openstack-neutron-rpc-server-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
openstack-neutron-sriov-nic-agent-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
python-neutron-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-9735
https://access.redhat.com/security/cve/CVE-2019-10876
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert at redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=z8Cd
-----END PGP SIGNATURE-----




More information about the RHSA-announce mailing list