-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Low: rabbitmq-server security update
Advisory ID:       RHSA-2020:0553-01
Product:           Red Hat OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:0553
Issue date:        2020-02-19
CVE Names:         CVE-2019-11291 
====================================================================
1. Summary:

An update for rabbitmq-server is now available for Red Hat OpenStack
Platform 15 (Stein).

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link in the References section.

2. Relevant releases/architectures:

Red Hat OpenStack Platform 15.0 - ppc64le, x86_64

3. Description:

RabbitMQ is an implementation of AMQP, the emerging standard for high
performance enterprise messaging. The RabbitMQ server is a robust and
scalable implementation of an AMQP broker.

Security Fix(es):

* not properly sanitized user input may lead to XSS (CVE-2019-11291)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1783327 - CVE-2019-11291 rabbitmq-server: not properly sanitized user input may lead to XSS
1786326 - chown: invalid user: ‘@RABBITMQ_USER@:@RABBITMQ_GROUP@’

6. Package List:

Red Hat OpenStack Platform 15.0:

Source:
rabbitmq-server-3.7.23-2.el8ost.src.rpm

ppc64le:
rabbitmq-server-3.7.23-2.el8ost.ppc64le.rpm

x86_64:
rabbitmq-server-3.7.23-2.el8ost.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-11291
https://access.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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5hBL
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-0553:01 Low: rabbitmq-server security update

An update for rabbitmq-server is now available for Red Hat OpenStack Platform 15 (Stein)

Summary

RabbitMQ is an implementation of AMQP, the emerging standard for high performance enterprise messaging. The RabbitMQ server is a robust and scalable implementation of an AMQP broker.
Security Fix(es):
* not properly sanitized user input may lead to XSS (CVE-2019-11291)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2019-11291 https://access.redhat.com/security/updates/classification/#low

Package List

Red Hat OpenStack Platform 15.0:
Source: rabbitmq-server-3.7.23-2.el8ost.src.rpm
ppc64le: rabbitmq-server-3.7.23-2.el8ost.ppc64le.rpm
x86_64: rabbitmq-server-3.7.23-2.el8ost.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2020:0553-01
Product: Red Hat OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2020:0553
Issued Date: : 2020-02-19
CVE Names: CVE-2019-11291

Topic

An update for rabbitmq-server is now available for Red Hat OpenStackPlatform 15 (Stein).Red Hat Product Security has rated this update as having a security impactof Low. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link in the References section.


Topic


 

Relevant Releases Architectures

Red Hat OpenStack Platform 15.0 - ppc64le, x86_64


Bugs Fixed

1783327 - CVE-2019-11291 rabbitmq-server: not properly sanitized user input may lead to XSS

1786326 - chown: invalid user: ‘@RABBITMQ_USER@:@RABBITMQ_GROUP@’


Related News