-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: memcached security update
Advisory ID:       RHSA-2020:5583-01
Product:           Red Hat OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:5583
Issue date:        2020-12-16
CVE Names:         CVE-2019-11596 
====================================================================
1. Summary:

An update for memcached is now available for Red Hat OpenStack Platform 13
(Queens).

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenStack Platform 13.0 - ppc64le, x86_64
Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server - x86_64

3. Description:

memcached is a high-performance, distributed memory object caching system,
generic in nature, but intended for use in speeding up dynamic web
applications
by alleviating database load.

Security Fix(es):

* null-pointer dereference in "lru mode" and "lru temp_ttl" causing denial
of service (CVE-2019-11596)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1706001 - CVE-2019-11596 memcached: null-pointer dereference in "lru mode" and "lru temp_ttl" causing denial of service

6. Package List:

Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server:

Source:
memcached-1.4.39-3.el7ost.src.rpm

x86_64:
memcached-1.4.39-3.el7ost.x86_64.rpm
memcached-debuginfo-1.4.39-3.el7ost.x86_64.rpm

Red Hat OpenStack Platform 13.0:

Source:
memcached-1.4.39-3.el7ost.src.rpm

ppc64le:
memcached-1.4.39-3.el7ost.ppc64le.rpm
memcached-debuginfo-1.4.39-3.el7ost.ppc64le.rpm

x86_64:
memcached-1.4.39-3.el7ost.x86_64.rpm
memcached-debuginfo-1.4.39-3.el7ost.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-11596
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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AmCg
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-5583:01 Moderate: memcached security update

An update for memcached is now available for Red Hat OpenStack Platform 13 (Queens)

Summary

memcached is a high-performance, distributed memory object caching system, generic in nature, but intended for use in speeding up dynamic web applications by alleviating database load.
Security Fix(es):
* null-pointer dereference in "lru mode" and "lru temp_ttl" causing denial of service (CVE-2019-11596)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2019-11596 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server:
Source: memcached-1.4.39-3.el7ost.src.rpm
x86_64: memcached-1.4.39-3.el7ost.x86_64.rpm memcached-debuginfo-1.4.39-3.el7ost.x86_64.rpm
Red Hat OpenStack Platform 13.0:
Source: memcached-1.4.39-3.el7ost.src.rpm
ppc64le: memcached-1.4.39-3.el7ost.ppc64le.rpm memcached-debuginfo-1.4.39-3.el7ost.ppc64le.rpm
x86_64: memcached-1.4.39-3.el7ost.x86_64.rpm memcached-debuginfo-1.4.39-3.el7ost.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2020:5583-01
Product: Red Hat OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2020:5583
Issued Date: : 2020-12-16
CVE Names: CVE-2019-11596

Topic

An update for memcached is now available for Red Hat OpenStack Platform 13(Queens).Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat OpenStack Platform 13.0 - ppc64le, x86_64

Red Hat OpenStack Platform 13.0 for RHEL 7.6 EUS Server - x86_64


Bugs Fixed

1706001 - CVE-2019-11596 memcached: null-pointer dereference in "lru mode" and "lru temp_ttl" causing denial of service


Related News