RedHat: RHSA-2019-1398:01 Moderate: qpid-proton security update

    Date06 Jun 2019
    CategoryRed Hat
    2550
    Posted ByLinuxSecurity Advisories
    An update for qpid-proton is now available for Red Hat OpenStack Platform 14 (Rocky). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Moderate: qpid-proton security update
    Advisory ID:       RHSA-2019:1398-01
    Product:           Red Hat Enterprise Linux OpenStack Platform
    Advisory URL:      https://access.redhat.com/errata/RHSA-2019:1398
    Issue date:        2019-06-06
    CVE Names:         CVE-2019-0223 
    =====================================================================
    
    1. Summary:
    
    An update for qpid-proton is now available for Red Hat OpenStack Platform
    14 (Rocky).
    
    Red Hat Product Security has rated this update as having a security impact
    of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
    gives a detailed severity rating, is available for each vulnerability from
    the CVE link(s) in the References section.
    
    2. Relevant releases/architectures:
    
    Red Hat OpenStack Platform 14.0 Operational Tools for RHEL 7 - x86_64
    
    3. Description:
    
    The AMQ Client enables connecting, sending, and receiving messages over the
    AMQP 1.0 wire transport protocol.
    
    This update provides various bug fixes and enhancements in addition to the
    client package versions previously released on Red Hat Enterprise Linux 7.
    
    Security Fix(es):
    
    * qpid-proton: TLS Man in the Middle Vulnerability (CVE-2019-0223)
    
    For more details about the security issue(s), including the impact, a CVSS
    score, acknowledgments, and other related information, refer to the CVE 
    page(s) listed in the References section.
    
    4. Solution:
    
    For details on how to apply this update, which includes the changes
    described in this advisory, refer to:
    
    https://access.redhat.com/articles/11258
    
    5. Bugs fixed (https://bugzilla.redhat.com/):
    
    1702439 - CVE-2019-0223 qpid-proton: TLS Man in the Middle Vulnerability
    
    6. Package List:
    
    Red Hat OpenStack Platform 14.0 Operational Tools for RHEL 7:
    
    Source:
    qpid-proton-0.27.0-3.el7.src.rpm
    
    x86_64:
    qpid-proton-c-0.27.0-3.el7.x86_64.rpm
    qpid-proton-debuginfo-0.27.0-3.el7.x86_64.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and
    details on how to verify the signature are available from
    https://access.redhat.com/security/team/key/
    
    7. References:
    
    https://access.redhat.com/security/cve/CVE-2019-0223
    https://access.redhat.com/security/updates/classification/#moderate
    
    8. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2019 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBXPk249zjgjWX9erEAQj6Nw//Ve+wbVB6/SXQ3kZ95Flpj3QVxXfJ4Ude
    haXlFZBV52R8jsCj4BQ/8Wb1Ndqzlp7uvczQHp06kmQGay4ZM8JQFfqtY0/27RGW
    bhaSPVuWPrstUnrhKB2GbmGIE6P1o6YWesgTUmo3rwvdHG8nnXL/KbO9Gs4sgIRj
    CWhO7vhR6tkEKMsA8g5oSqbVFYdKy0FZ7K5MHA7XB3E3Phh4bZxcak7tRwmhldzz
    7nY73JQ/gnW8jgs7AVZzUuD7gtKV3vKgwq8wFt3h9Wu8zfThf48ex+/c1v5YITiS
    hRC0bzubzTrspItBRnQBNB8YzWevhofxVCktLMapqqvyRm4Oy0/n1GYi0nJ/Ccxm
    XibWYrubPexdrwm4LxX3oxb7ztRi98GsmCZ5Ypp2fIj5oosjJ1s0NpG0g7OICppN
    pTBMpejBCdiuDvrNKlIUUZRoz2H6OjeQ9mMN4MhYtRGY4CMAC8LyzO21DJ13r5B5
    /7L4GJ6G/KwfkB3R4RC8I9+AX98jEOr2kTk3ALKVKtdZsvrImXTR7j0u79MKjcuD
    C8cPZGti9vKFcWzS6uPFsf8YnTyvnuC6YdrtvQNi5BkFFPm6pzR2eojwanr9O51Q
    L72WYH6rUqeYV29AFs6HFwcy88tWDA2XrkUqOdk3xuNBo+yBflrSg+Bi0iHUSP9m
    jtrIRhIQzb4=
    =aHhF
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"64","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.39,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.46,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.