Published on March 26th, 2021 📆 | 3473 Views ⚑0
Red Hat Security Advisory 2021-0986-01 ≈ Packet Storm
Red Hat Security Advisory
Synopsis: Low: AMQ Online 1.7.0 release and security update
Advisory ID: RHSA-2021:0986-01
Product: Red Hat JBoss AMQ
Advisory URL: https://access.redhat.com/errata/RHSA-2021:0986
Issue date: 2021-03-25
Cross references: RHBA-2021:69759
CVE Names: CVE-2021-20218 CVE-2021-21290 CVE-2021-21295
An update of the Red Hat OpenShift Container Platform 3.11 and 4.6/4.7
container images is now available for Red Hat AMQ Online.
Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
The release of Red Hat AMQ Online 1.7.0 serves as a replacement for earlier
AMQ Online releases, and includes bug fixes and enhancements, which are
documented in the Release Notes document linked in the References.
* fabric8-kubernetes-client: vulnerable to a path traversal leading to
integrity and availability compromise (CVE-2021-20218)
* netty: Information disclosure via the local system temporary directory
* netty: possible request smuggling in HTTP/2 due missing validation
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
The Red Hat OpenShift Container Platform 3.11 and 4.6/4.7 container images
provided by this update can be downloaded from the Red Hat Container
Registry at registry.access.redhat.com. Installation instructions for your
platform are available from https://access.redhat.com.
Dockerfiles and scripts should be amended either to refer to this new image
specifically, or to the latest image generally.
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
4. Bugs fixed (https://bugzilla.redhat.com/):
1923405 – CVE-2021-20218 fabric8-kubernetes-client: vulnerable to a path traversal leading to integrity and availability compromise
1927028 – CVE-2021-21290 netty: Information disclosure via the local system temporary directory
1937364 – CVE-2021-21295 netty: possible request smuggling in HTTP/2 due missing validation
The Red Hat security contact is
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
—–END PGP SIGNATURE—–
RHSA-announce mailing list