Thursday, October 14, 2021

Red Hat Security Advisory 2021-3851-01

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat 3scale API Management 2.11.0 Release - Container Images
Advisory ID: RHSA-2021:3851-01
Product: 3scale API Management
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3851
Issue date: 2021-10-14
CVE Names: CVE-2020-8911 CVE-2020-8912 CVE-2021-3442
CVE-2021-3653 CVE-2021-3715 CVE-2021-22922
CVE-2021-22923 CVE-2021-22924 CVE-2021-27218
CVE-2021-36222 CVE-2021-37750
=====================================================================

1. Summary:

Red Hat 3scale API Management 2.11.0 Release - Container Images
A security update for Red Hat 3scale API Management is now available from
the Red Hat Container Catalog.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
listed as CVE link(s) in the References section.

2. Description:

Red Hat 3scale API Management delivers centralized API management features
through a distributed, cloud-hosted layer. It includes built-in features to
help in building a more successful API program, including access control,
rate limits, payment gateway integration, and developer experience tools.

This advisory is intended to use with Container Images, for Red Hat 3scale
API Management 2.11.0.

Security Fixes:

* PT RHOAM: XSS in 3scale at various places (CVE-2021-3442)

* aws/aws-sdk-go: CBC padding oracle issue in AWS S3 Crypto SDK for golang
(CVE-2020-8911)

* aws-sdk-go: In-band key negotiation issue in AWS S3 Crypto SDK for golang
(CVE-2020-8912)

For more details about the security issues, including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
pages listed in the References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/red_hat_3scale_api_management
/2.11/html-single/installing_3scale/index

4. Bugs fixed (https://bugzilla.redhat.com/):

1869800 - CVE-2020-8911 aws/aws-sdk-go: CBC padding oracle issue in AWS S3 Crypto SDK for golang
1869801 - CVE-2020-8912 aws-sdk-go: In-band key negotiation issue in AWS S3 Crypto SDK for golang
1930083 - CVE-2021-3442 PT RHOAM: XSS in 3scale at various places

5. References:

https://access.redhat.com/security/cve/CVE-2020-8911
https://access.redhat.com/security/cve/CVE-2020-8912
https://access.redhat.com/security/cve/CVE-2021-3442
https://access.redhat.com/security/cve/CVE-2021-3653
https://access.redhat.com/security/cve/CVE-2021-3715
https://access.redhat.com/security/cve/CVE-2021-22922
https://access.redhat.com/security/cve/CVE-2021-22923
https://access.redhat.com/security/cve/CVE-2021-22924
https://access.redhat.com/security/cve/CVE-2021-27218
https://access.redhat.com/security/cve/CVE-2021-36222
https://access.redhat.com/security/cve/CVE-2021-37750
https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is <[email protected]>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=txQF
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce
 

Copyright © 2021 Vulnerability Database | Cyber Details™

thank you Templateism for the design - You should have written the code a little more complicated - Nothing Encrypted anymore