-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat OpenStack Platform 10.0 (openstack-neutron) security update Advisory ID: RHSA-2021:3502-01 Product: Red Hat OpenStack Platform Advisory URL: https://access.redhat.com/errata/RHSA-2021:3502 Issue date: 2021-09-13 CVE Names: CVE-2021-40085 ===================================================================== 1. Summary: An update for openstack-neutron is now available for Red Hat OpenStack Platform 10 (Newton). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat OpenStack Platform 10.0 - noarch 3. Description: Neutron is a virtual network service for OpenStack. Just like OpenStack Nova provides an API to dynamically request and configure virtual servers, Neutron provides an API to dynamically request and configure virtual networks. These networks connect "interfaces" from other OpenStack services (e.g., virtual NICs from Nova VMs). The Neutron API supports extensions to provide advanced network capabilities (e.g., QoS, ACLs, network, monitoring, etc.). Security Fix(es): * arbitrary dnsmasq reconfiguration via extra_dhcp_opts (CVE-2021-40085) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1998052 - CVE-2021-40085 openstack-neutron: arbitrary dnsmasq reconfiguration via extra_dhcp_opts 6. Package List: Red Hat OpenStack Platform 10.0: Source: openstack-neutron-9.4.1-56.el7ost.src.rpm noarch: openstack-neutron-9.4.1-56.el7ost.noarch.rpm openstack-neutron-common-9.4.1-56.el7ost.noarch.rpm openstack-neutron-linuxbridge-9.4.1-56.el7ost.noarch.rpm openstack-neutron-macvtap-agent-9.4.1-56.el7ost.noarch.rpm openstack-neutron-metering-agent-9.4.1-56.el7ost.noarch.rpm openstack-neutron-ml2-9.4.1-56.el7ost.noarch.rpm openstack-neutron-openvswitch-9.4.1-56.el7ost.noarch.rpm openstack-neutron-rpc-server-9.4.1-56.el7ost.noarch.rpm openstack-neutron-sriov-nic-agent-9.4.1-56.el7ost.noarch.rpm python-neutron-9.4.1-56.el7ost.noarch.rpm python-neutron-tests-9.4.1-56.el7ost.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-40085 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYT8nOtzjgjWX9erEAQhi9xAAkt9wmYKeGjdOsEyxmgrNQ8fhFcWxPeVK XjZCecuxz3JzUmAUlNx/gG97wz7fi6qo4yidaBW9ACKpOp4R1QoXv23YFJeIH7yh EHsK/DbfYbyJNQAV2kJ/Ex2VxYwFTHyAjGuWfA53hvCOSAHMtMHpQcWcfvc1Misc eHCHbjlIwjAuMqN9LykE8NrCkfflKaSN8IoWk2JVQjAWL+n3RZ3/DT6PJgdDG34h rXPsUf7VKh4VWZNlvpebsK7ScNWbOdJ8pt3cZcJCTEnl0mgl8mya2iwG3wb7cGqo C/IuUkeFbWvL9WHt3MKqo2hnX2UQTS3ln0BBhKxV+Im9rD3CeBRDRY55UqpSjYzO 26tCUfdJSD3iMPfwSEsUta/ec6XivnagUVOfIia+0asg0055QbnTRVN0cC2lGHDQ uKgyIx9qOki8EHZAKwBULdIibOzpKpMaZyPNoijPkCyzaZVU0OData1RsdwXDU0K sgD42XoemJ2c8m55iNul6dr/zV4J/bZKY1urV4ERg1ldIGu50Kl2slep63/b91UE siBSQZfVMB1BnbFcA2gI6u6RXh7nLutR0P1MyOrXtfjSAGrWqVChZoWhCuTKaC3F T0FkSUoUmh7YtPiIEz78meHzwdGwk7+CsF4ObgfXeDOLMoh9CfXFzMi9kpc9zDV9 T24kTfB2dzg= =OTod -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce