—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: openstack-neutron security and bug fix update
Advisory ID: RHSA-2019:0935-01
Product: Red Hat Enterprise Linux OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2019:0935
Issue date: 2019-04-30
CVE Names: CVE-2019-9735 CVE-2019-10876
=====================================================================
1. Summary:
An update for openstack-neutron is now available for Red Hat OpenStack
Platform 13.0 (Queens).
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat OpenStack Platform 13.0 – noarch
3. Description:
OpenStack Networking (neutron) is a pluggable, scalable, and API-driven
system that provisions networking services to virtual machines. Its main
function is to manage connectivity to and from virtual machines.
Security Fix(es):
* openstack-neutron: incorrect validation of port settings in iptables
security group driver (CVE-2019-9735)
* openstack-neutron: DOS via broken port range merging in security group
(CVE-2019-10876)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1610468 – floating ip not reachable on vlan with two different networks and multiple VMs
1629465 – Prevent SR-IOV / direct port from being attached to neutron router (DVR or not)
1630167 – [FFWD] Tempest test_dualnet_dhcp6_stateless_from_os failed
1643135 – OSP 13 – OVS/ml2 – ipv6 forwarding is broken in HA neutron routers due to incorrect ipv6 kernel forwarding parameters
1651936 – [RHOSP 13][DVR] Neutron doesn’t configure multiple external subnets for one network properly
1654840 – Routers hosted on one of two networker nodes unable to access external network
1685893 – DHCP Agent should not release DHCP lease when client ID is not set on port
1690745 – CVE-2019-9735 openstack-neutron: incorrect validation of port settings in iptables security group driver
1695451 – CVE-2019-10876 openstack-neutron: DOS via broken port range merging in security group [openstack-13-default]
1695883 – CVE-2019-10876 openstack-neutron: DOS via broken port range merging in security group
1696792 – Rebase openstack-neutron to 8b744646264a1fda50f13739a4476cdf32172d0f
6. Package List:
Red Hat OpenStack Platform 13.0:
Source:
openstack-neutron-12.0.5-11.el7ost.src.rpm
noarch:
openstack-neutron-12.0.5-11.el7ost.noarch.rpm
openstack-neutron-common-12.0.5-11.el7ost.noarch.rpm
openstack-neutron-linuxbridge-12.0.5-11.el7ost.noarch.rpm
openstack-neutron-macvtap-agent-12.0.5-11.el7ost.noarch.rpm
openstack-neutron-metering-agent-12.0.5-11.el7ost.noarch.rpm
openstack-neutron-ml2-12.0.5-11.el7ost.noarch.rpm
openstack-neutron-openvswitch-12.0.5-11.el7ost.noarch.rpm
openstack-neutron-rpc-server-12.0.5-11.el7ost.noarch.rpm
openstack-neutron-sriov-nic-agent-12.0.5-11.el7ost.noarch.rpm
python-neutron-12.0.5-11.el7ost.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2019-9735
https://access.redhat.com/security/cve/CVE-2019-10876
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=47Dj
—–END PGP SIGNATURE—–
—
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
=====================================================================
Red Hat Security Advisory
Synopsis: Important: openstack-neutron security update
Advisory ID: RHSA-2019:0879-01
Product: Red Hat Enterprise Linux OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2019:0879
Issue date: 2019-04-30
CVE Names: CVE-2019-9735 CVE-2019-10876
=====================================================================
1. Summary:
An update for openstack-neutron is now available for Red Hat OpenStack
Platform 14.0 (Rocky).
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat OpenStack Platform 14.0 – noarch
3. Description:
OpenStack Networking (neutron) is a pluggable, scalable, and API-driven
system that provisions networking services to virtual machines. Its main
function is to manage connectivity to and from virtual machines.
Security Fix(es):
* openstack-neutron: incorrect validation of port settings in iptables
security group driver (CVE-2019-9735)
* openstack-neutron: DOS via broken port range merging in security group
(CVE-2019-10876)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1690150 – Rebase openstack-neutron to 00b63be
1690745 – CVE-2019-9735 openstack-neutron: incorrect validation of port settings in iptables security group driver
1695883 – CVE-2019-10876 openstack-neutron: DOS via broken port range merging in security group
6. Package List:
Red Hat OpenStack Platform 14.0:
Source:
openstack-neutron-13.0.3-0.20190313155649.00b63be.el7ost.src.rpm
noarch:
openstack-neutron-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
openstack-neutron-common-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
openstack-neutron-linuxbridge-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
openstack-neutron-macvtap-agent-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
openstack-neutron-metering-agent-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
openstack-neutron-ml2-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
openstack-neutron-openvswitch-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
openstack-neutron-rpc-server-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
openstack-neutron-sriov-nic-agent-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
python-neutron-13.0.3-0.20190313155649.00b63be.el7ost.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2019-9735
https://access.redhat.com/security/cve/CVE-2019-10876
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
iQIVAwUBXMiKPdzjgjWX9erEAQhbbxAAjH/SgJM3Zpx7TwELCGzEKgT3ke9ybpSg
0oSdib+V+wPZm1BvOGpN5r+Xs0wIfnhoxrJFKpie/kBftO4RbG9viMmvNN00dYEr
9yg2BS5Z2zQtCGIid3qI4JgYUQi0RhFpIhaO9ojfvTxDEopCPjj1bR67R6eBPCHd
OD1mLbq+zESEyNaxoXh4hvyD4mBE92fDGIGwXL87MAyCjQ/4UAPIkyi/H05Wsvtt
2SL+4DKYVn1ceMS2F9e99KDMafmqafi4PJ8yiaNQrMt8hMyYqrParwWWUt6rBCmM
UPXxdqie3UehMIx0GD0yElSzIoG7C/QgCupniYBIoWK9STPYLkgCKLLFAJx//gCS
mc5oMIynKP0zaObqqj6ywJchuqPIhJWlK4QUmz701vVQdMy40703Ty1NyHrKdEdr
GKP1R3EwLBoUOP2IHwc2X1a4gtelANKqWL8IWGjSBh0e1OSsD/xu4nzbji0D6NIO
8WlAri38eK+hU3MoX7YnvHHJhaByOJw8ErTSuhYKEYYwQIoC8Uc33BL713G+ZWeG
5ks3R0TnkrmSytydT3d47c+5gZRP20bFlmNBv839UQZ+pLzhzFrmVtjgR9SBo2QD
bNw29uQwLxtBk4urLNErIvc3kiQUbFqYr4Go2IESJMr8CxIHmetlrc8ZneKaR3tU
2O0r1QrEyl4=
=z8Cd
—–END PGP SIGNATURE—–
—
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce