-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: qpid-proton security update Advisory ID: RHSA-2019:1398-01 Product: Red Hat Enterprise Linux OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2019:1398 Issue date: 2019-06-06 CVE Names: CVE-2019-0223 ==================================================================== 1. Summary: An update for qpid-proton is now available for Red Hat OpenStack Platform 14 (Rocky). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 14.0 Operational Tools for RHEL 7 - x86_64 3. Description: The AMQ Client enables connecting, sending, and receiving messages over the AMQP 1.0 wire transport protocol. This update provides various bug fixes and enhancements in addition to the client package versions previously released on Red Hat Enterprise Linux 7. Security Fix(es): * qpid-proton: TLS Man in the Middle Vulnerability (CVE-2019-0223) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1702439 - CVE-2019-0223 qpid-proton: TLS Man in the Middle Vulnerability 6. Package List: Red Hat OpenStack Platform 14.0 Operational Tools for RHEL 7: Source: qpid-proton-0.27.0-3.el7.src.rpm x86_64: qpid-proton-c-0.27.0-3.el7.x86_64.rpm qpid-proton-debuginfo-0.27.0-3.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-0223 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXPk249zjgjWX9erEAQj6Nw//Ve+wbVB6/SXQ3kZ95Flpj3QVxXfJ4Ude haXlFZBV52R8jsCj4BQ/8Wb1Ndqzlp7uvczQHp06kmQGay4ZM8JQFfqtY0/27RGW bhaSPVuWPrstUnrhKB2GbmGIE6P1o6YWesgTUmo3rwvdHG8nnXL/KbO9Gs4sgIRj CWhO7vhR6tkEKMsA8g5oSqbVFYdKy0FZ7K5MHA7XB3E3Phh4bZxcak7tRwmhldzz 7nY73JQ/gnW8jgs7AVZzUuD7gtKV3vKgwq8wFt3h9Wu8zfThf48ex+/c1v5YITiS hRC0bzubzTrspItBRnQBNB8YzWevhofxVCktLMapqqvyRm4Oy0/n1GYi0nJ/Ccxm XibWYrubPexdrwm4LxX3oxb7ztRi98GsmCZ5Ypp2fIj5oosjJ1s0NpG0g7OICppN pTBMpejBCdiuDvrNKlIUUZRoz2H6OjeQ9mMN4MhYtRGY4CMAC8LyzO21DJ13r5B5 /7L4GJ6G/KwfkB3R4RC8I9+AX98jEOr2kTk3ALKVKtdZsvrImXTR7j0u79MKjcuD C8cPZGti9vKFcWzS6uPFsf8YnTyvnuC6YdrtvQNi5BkFFPm6pzR2eojwanr9O51Q L72WYH6rUqeYV29AFs6HFwcy88tWDA2XrkUqOdk3xuNBo+yBflrSg+Bi0iHUSP9m jtrIRhIQzb4=aHhF -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce