what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2021-0986-01

Red Hat Security Advisory 2021-0986-01
Posted Mar 25, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0986-01 - The release of Red Hat AMQ Online 1.7.0 serves as a replacement for earlier AMQ Online releases, and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References. Issues addressed include information leakage and traversal vulnerabilities.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2021-20218, CVE-2021-21290, CVE-2021-21295
SHA-256 | 23990e2f898aef17b77d80cf4cd02c8a28de9443759dcc3226d9242052bb06f8

Red Hat Security Advisory 2021-0986-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Low: AMQ Online 1.7.0 release and security update
Advisory ID: RHSA-2021:0986-01
Product: Red Hat JBoss AMQ
Advisory URL: https://access.redhat.com/errata/RHSA-2021:0986
Issue date: 2021-03-25
Cross references: RHBA-2021:69759
CVE Names: CVE-2021-20218 CVE-2021-21290 CVE-2021-21295
=====================================================================

1. Summary:

An update of the Red Hat OpenShift Container Platform 3.11 and 4.6/4.7
container images is now available for Red Hat AMQ Online.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

The release of Red Hat AMQ Online 1.7.0 serves as a replacement for earlier
AMQ Online releases, and includes bug fixes and enhancements, which are
documented in the Release Notes document linked in the References.

Security Fix(es):

* fabric8-kubernetes-client: vulnerable to a path traversal leading to
integrity and availability compromise (CVE-2021-20218)

* netty: Information disclosure via the local system temporary directory
(CVE-2021-21290)

* netty: possible request smuggling in HTTP/2 due missing validation
(CVE-2021-21295)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

The Red Hat OpenShift Container Platform 3.11 and 4.6/4.7 container images
provided by this update can be downloaded from the Red Hat Container
Registry at registry.access.redhat.com. Installation instructions for your
platform are available from https://access.redhat.com.

Dockerfiles and scripts should be amended either to refer to this new image
specifically, or to the latest image generally.

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

4. Bugs fixed (https://bugzilla.redhat.com/):

1923405 - CVE-2021-20218 fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise
1927028 - CVE-2021-21290 netty: Information disclosure via the local system temporary directory
1937364 - CVE-2021-21295 netty: possible request smuggling in HTTP/2 due missing validation

5. References:

https://access.redhat.com/security/cve/CVE-2021-20218
https://access.redhat.com/security/cve/CVE-2021-21290
https://access.redhat.com/security/cve/CVE-2021-21295
https://access.redhat.com/security/updates/classification/#low

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYFxbrtzjgjWX9erEAQiwKg//XrTq5q1L6qEYy8hsZhz0FmRSqnyzQDmh
4+RcJLkO+zUxqEZQsyfRtk1vMFwr6SWipXv6qyg6rsKtfXhXCEVfRjI1W+aFoPp3
mtWR2wYi3BDEWHKe3zYuTwYRspN2nTcWyusNjRD046/lvbPMw2kTPEUYEsIfLFlB
70eqRJeDmwxCokOUwreqMAsZj7JL/ThMLEFJcvp66KqLs64RZDGDEsihaGavg2Q2
symTfhs1scy/cg279YYs1sS7fEXGuVRZZrAQkT7WY/ZWMvps1eMWx0McYKo6z+es
Bcx+14/LZ3ABv5qppUuF9sYLgBu2rXRghYOhmHT04dJNvuQ6L4mAAQRdFLT8pwW4
Dm0t92sJc6uLPdfdCRgAP3diic0hLwc7BNTvwaFpcvJG++w4nZpJiFA4/RkSN0sg
DJF1Y52eVih5ZbmH8LDv8oIPi6Ynr17gTtw5jq0h8cPEhXTnwuFElGQncit4hEYi
jt1KQVNwWO7+Ha6hHMX3Nf4/WBNCczCQK8wLjFSILKYwrESsMJXlr1mkSsFCz1wn
OgRgofJytU63RYJDGIn9aC7lIABYSnyx8zaO5RQBwSBPm2tYN0WCL4Yo1Sg21q3h
EZfS1qFe/UQbq0lU1wPKhcfvzqIiq3Wn6vRFfftZ3eifx9IjzLA000/65geSM+u1
4rZZ2ixBWhE=
=TFVy
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close