-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: containernetworking-plugins security update
Advisory ID:       RHSA-2020:0406-01
Product:           Red Hat Enterprise Linux Extras
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:0406
Issue date:        2020-02-04
CVE Names:         CVE-2019-9512 CVE-2019-9514 
====================================================================
1. Summary:

An update for containernetworking-plugins is now available for Red Hat
Enterprise Linux 7 Extras.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux 7 Extras - ppc64le, s390x, x86_64

3. Description:

The Container Network Interface (CNI) project consists of a specification
and libraries for writing plug-ins for configuring network interfaces in
Linux containers, along with a number of supported plug-ins. CNI concerns
itself only with network connectivity of containers and removing allocated
resources when the container is deleted.

Security Fix(es):

* HTTP/2: flood using PING frames results in unbounded memory growth
(CVE-2019-9512)

* HTTP/2: flood using HEADERS frames results in unbounded memory growth
(CVE-2019-9514)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth
1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth

6. Package List:

Red Hat Enterprise Linux 7 Extras:

Source:
containernetworking-plugins-0.8.1-4.el7_7.src.rpm

ppc64le:
containernetworking-plugins-0.8.1-4.el7_7.ppc64le.rpm
containernetworking-plugins-debuginfo-0.8.1-4.el7_7.ppc64le.rpm

s390x:
containernetworking-plugins-0.8.1-4.el7_7.s390x.rpm
containernetworking-plugins-debuginfo-0.8.1-4.el7_7.s390x.rpm

x86_64:
containernetworking-plugins-0.8.1-4.el7_7.x86_64.rpm
containernetworking-plugins-debuginfo-0.8.1-4.el7_7.x86_64.rpm

Red Hat Enterprise Linux 7 Extras:

Source:
containernetworking-plugins-0.8.1-4.el7_7.src.rpm

x86_64:
containernetworking-plugins-0.8.1-4.el7_7.x86_64.rpm
containernetworking-plugins-debuginfo-0.8.1-4.el7_7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-9512
https://access.redhat.com/security/cve/CVE-2019-9514
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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37UJ
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-0406:01 Important: containernetworking-plugins security

An update for containernetworking-plugins is now available for Red Hat Enterprise Linux 7 Extras

Summary

The Container Network Interface (CNI) project consists of a specification and libraries for writing plug-ins for configuring network interfaces in Linux containers, along with a number of supported plug-ins. CNI concerns itself only with network connectivity of containers and removing allocated resources when the container is deleted.
Security Fix(es):
* HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2019-9512 https://access.redhat.com/security/cve/CVE-2019-9514 https://access.redhat.com/security/updates/classification/#important

Package List

Red Hat Enterprise Linux 7 Extras:
Source: containernetworking-plugins-0.8.1-4.el7_7.src.rpm
ppc64le: containernetworking-plugins-0.8.1-4.el7_7.ppc64le.rpm containernetworking-plugins-debuginfo-0.8.1-4.el7_7.ppc64le.rpm
s390x: containernetworking-plugins-0.8.1-4.el7_7.s390x.rpm containernetworking-plugins-debuginfo-0.8.1-4.el7_7.s390x.rpm
x86_64: containernetworking-plugins-0.8.1-4.el7_7.x86_64.rpm containernetworking-plugins-debuginfo-0.8.1-4.el7_7.x86_64.rpm
Red Hat Enterprise Linux 7 Extras:
Source: containernetworking-plugins-0.8.1-4.el7_7.src.rpm
x86_64: containernetworking-plugins-0.8.1-4.el7_7.x86_64.rpm containernetworking-plugins-debuginfo-0.8.1-4.el7_7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2020:0406-01
Product: Red Hat Enterprise Linux Extras
Advisory URL: https://access.redhat.com/errata/RHSA-2020:0406
Issued Date: : 2020-02-04
CVE Names: CVE-2019-9512 CVE-2019-9514

Topic

An update for containernetworking-plugins is now available for Red HatEnterprise Linux 7 Extras.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux 7 Extras - ppc64le, s390x, x86_64


Bugs Fixed

1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth

1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth


Related News