RedHat: RHSA-2019-1400:01 Moderate: qpid-proton security update

    Date06 Jun 2019
    CategoryRed Hat
    2557
    Posted ByLinuxSecurity Advisories
    An update for qpid-proton is now available for Red Hat OpenStack Platform 13 (Queens). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Moderate: qpid-proton security update
    Advisory ID:       RHSA-2019:1400-01
    Product:           Red Hat Enterprise Linux OpenStack Platform
    Advisory URL:      https://access.redhat.com/errata/RHSA-2019:1400
    Issue date:        2019-06-06
    CVE Names:         CVE-2019-0223 
    =====================================================================
    
    1. Summary:
    
    An update for qpid-proton is now available for Red Hat OpenStack Platform 
    13 (Queens).
    
    Red Hat Product Security has rated this update as having a security impact
    of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
    gives a detailed severity rating, is available for each vulnerability from
    the CVE link(s) in the References section.
    
    2. Relevant releases/architectures:
    
    Red Hat OpenStack Platform 13.0 - ppc64le, x86_64
    
    3. Description:
    
    The AMQ Client enables connecting, sending, and receiving messages over the
    AMQP 1.0 wire transport protocol.
    
    Security Fix(es):
    
    * qpid-proton: TLS Man in the Middle Vulnerability (CVE-2019-0223)
    
    For more details about the security issue(s), including the impact, a CVSS 
    score, acknowledgments, and other related information, refer to the CVE 
    page(s) listed in the References section.
    
    This update provides various bug fixes and enhancements in addition to the
    client package versions previously released on Red Hat Enterprise Linux 7.
    
    4. Solution:
    
    For details on how to apply this update, which includes the changes
    described in this advisory, refer to:
    
    https://access.redhat.com/articles/11258
    
    5. Bugs fixed (https://bugzilla.redhat.com/):
    
    1702439 - CVE-2019-0223 qpid-proton: TLS Man in the Middle Vulnerability
    1704978 - AMQ Interconnect edge mode doesn't work with anonymous channels; rebuild container after resolved to 1.4 version [openstack-13]
    1717133 - add jsoncpp for dep of qpid-proton for fixing CVE-2019-0223
    
    6. Package List:
    
    Red Hat OpenStack Platform 13.0:
    
    Source:
    jsoncpp-1.7.7-1.el7.src.rpm
    qpid-proton-0.27.0-3.el7.src.rpm
    
    ppc64le:
    jsoncpp-1.7.7-1.el7.ppc64le.rpm
    jsoncpp-debuginfo-1.7.7-1.el7.ppc64le.rpm
    python-qpid-proton-0.27.0-3.el7.ppc64le.rpm
    qpid-proton-c-0.27.0-3.el7.ppc64le.rpm
    qpid-proton-cpp-0.27.0-3.el7.ppc64le.rpm
    qpid-proton-debuginfo-0.27.0-3.el7.ppc64le.rpm
    
    x86_64:
    jsoncpp-1.7.7-1.el7.x86_64.rpm
    jsoncpp-debuginfo-1.7.7-1.el7.x86_64.rpm
    python-qpid-proton-0.27.0-3.el7.x86_64.rpm
    qpid-proton-c-0.27.0-3.el7.x86_64.rpm
    qpid-proton-cpp-0.27.0-3.el7.x86_64.rpm
    qpid-proton-debuginfo-0.27.0-3.el7.x86_64.rpm
    
    These packages are GPG signed by Red Hat for security.  Our key and
    details on how to verify the signature are available from
    https://access.redhat.com/security/team/key/
    
    7. References:
    
    https://access.redhat.com/security/cve/CVE-2019-0223
    https://access.redhat.com/security/updates/classification/#moderate
    
    8. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2019 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBXPk3l9zjgjWX9erEAQisGw/9HrWTr6H1mCSe3e3ZAUNwCqghiJ752W4Q
    OTp2xwQ5APHTjpQQqOkJyV6P413wtWc3NCYon4ATgN2r7+uBk93Lsu4QOpiGytCv
    z4M1iZ1AyefQIps50UAozS/moBwf28700HaCoJe6TLstBHZ0zRpSxlu/WMr0FItq
    z4jfL5RqcJY23T5eBeM4u0J4XURthRq4ZBMhEci5q/97VUuvwFpUhcQ7Jks7t04b
    EUYezxPr2H+YaWRMHhiiiDhvbynppIGmWbJ/qZXD7N7dqUKxqhdxz15Q+hOUNd6b
    beoX3QRSbp8ckZCVvYl9yl8mTOoJxg6TG0It+AkuFuSHxlsRTyFZZ4lhmQG0Fxfa
    TtKhv5KRfGUE8ifE1S6WoqgjCNQmzedxjaAXF+W5CDLzQW4l35Tt8HVT9ZwHCVGp
    Sgpyr7o3rGZ7d44vk+DE+2kIxtCECezGFy5ZYJCPSLMmYUa5RiySRmXrufohulcP
    SoDWXTlT32EHams7UJw8hVNdCu4ad3tqdP7408koeMMbxgEsD3hE2GlQIVETmu5s
    Nm/K8+FJlHPpuKCM9fzIKQoRKxKG0JkK0vZ3H8UAUv3Xj0KKX/QK7YPPRxDEfl7J
    YakccH6AM4CxNz00LWKayiLuetaw6LjPHm7bD/ovCKYZLR5VZGIr6UHgS7hLWyAY
    MTiAnsfNvog=
    =PwoV
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"22","type":"x","order":"1","pct":55,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.5,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":32.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.