exploit the possibilities

Debian Security Advisory 4409-1

Debian Security Advisory 4409-1
Posted Mar 19, 2019
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4409-1 - Erik Olof Gunnar Andersson discovered that incorrect validation of port settings in the iptables security group driver of Neutron, the OpenStack virtual network service, could result in denial of service in a multi tenant setup.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2019-9735
MD5 | d3a948ca8507d7cb3d99637b37eb392b

Debian Security Advisory 4409-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4409-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
March 18, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : neutron
CVE ID : CVE-2019-9735

Erik Olof Gunnar Andersson discovered that incorrect validation of port
settings in the iptables security group driver of Neutron, the OpenStack
virtual network service, could result in denial of service in a multi
tenant setup.

For the stable distribution (stretch), this problem has been fixed in
version 2:9.1.1-3+deb9u1.

We recommend that you upgrade your neutron packages.

For the detailed security status of neutron please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/neutron

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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uW3e
-----END PGP SIGNATURE-----

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

November 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    28 Files
  • 2
    Nov 2nd
    1 Files
  • 3
    Nov 3rd
    1 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    19 Files
  • 6
    Nov 6th
    65 Files
  • 7
    Nov 7th
    22 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    1 Files
  • 10
    Nov 10th
    1 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    65 Files
  • 13
    Nov 13th
    27 Files
  • 14
    Nov 14th
    22 Files
  • 15
    Nov 15th
    18 Files
  • 16
    Nov 16th
    1 Files
  • 17
    Nov 17th
    3 Files
  • 18
    Nov 18th
    22 Files
  • 19
    Nov 19th
    17 Files
  • 20
    Nov 20th
    7 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close