-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.1053
               AMQ Online 1.7.0 release and security update
                               26 March 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat JBoss AMQ
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Provide Misleading Information -- Remote/Unauthenticated
                   Access Confidential Data       -- Remote/Unauthenticated
                   Reduced Security               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-21295 CVE-2021-21290 CVE-2021-20218

Reference:         ESB-2021.0515

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2021:0986

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: AMQ Online 1.7.0 release and security update
Advisory ID:       RHSA-2021:0986-01
Product:           Red Hat JBoss AMQ
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0986
Issue date:        2021-03-25
Cross references:  RHBA-2021:69759
CVE Names:         CVE-2021-20218 CVE-2021-21290 CVE-2021-21295 
=====================================================================

1. Summary:

An update of the Red Hat OpenShift Container Platform 3.11 and 4.6/4.7
container images is now available for Red Hat AMQ Online.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

The release of Red Hat AMQ Online 1.7.0 serves as a replacement for earlier
AMQ Online releases, and includes bug fixes and enhancements, which are
documented in the Release Notes document linked in the References.

Security Fix(es):

* fabric8-kubernetes-client: vulnerable to a path traversal leading to
integrity and availability compromise (CVE-2021-20218)

* netty: Information disclosure via the local system temporary directory
(CVE-2021-21290)

* netty: possible request smuggling in HTTP/2 due missing validation
(CVE-2021-21295)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

The Red Hat OpenShift Container Platform 3.11 and 4.6/4.7 container images
provided by this update can be downloaded from the Red Hat Container
Registry at registry.access.redhat.com. Installation instructions for your
platform are available from https://access.redhat.com.

Dockerfiles and scripts should be amended either to refer to this new image
specifically, or to the latest image generally.

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

4. Bugs fixed (https://bugzilla.redhat.com/):

1923405 - CVE-2021-20218 fabric8-kubernetes-client: vulnerable to a path traversal 
leading to integrity and availability compromise
1927028 - CVE-2021-21290 netty: Information disclosure via the local system 
temporary directory
1937364 - CVE-2021-21295 netty: possible request smuggling in HTTP/2 due missing validation

5. References:

https://access.redhat.com/security/cve/CVE-2021-20218
https://access.redhat.com/security/cve/CVE-2021-21290
https://access.redhat.com/security/cve/CVE-2021-21295
https://access.redhat.com/security/updates/classification/#low

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=TFVy
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=dr0J
-----END PGP SIGNATURE-----