- Issued:
- 2021-12-16
- Updated:
- 2021-12-16
RHSA-2021:5191 - Security Advisory
Synopsis
Moderate: Red Hat 3scale API Management 2.11.1 Release - Container Images
Type/Severity
Security Advisory: Moderate
Topic
Red Hat 3scale API Management 2.11.1 Release - Container Images
A security update for Red Hat 3scale API Management is now available from the Red Hat Container Catalog.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability listed as CVE link(s) in the References section.
Description
Red Hat 3scale API Management delivers centralized API management features through a distributed, cloud-hosted layer. It includes built-in features to help in building a more successful API program, including access control, rate limits, payment gateway integration, and developer experience tools.
This advisory is intended to use with Container Images, for Red Hat 3scale API Management 2.11.1.
Security Fix(es):
- rubygem-nokogiri: XML external entity injection via Nokogiri::XML::Schema (CVE-2020-26247)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat 3scale API Management Platform 2 for RHEL 8 x86_64
- Red Hat 3scale API Management Platform 2 for RHEL 8 ppc64le
- Red Hat 3scale API Management Platform 2 for RHEL 7 x86_64
- Red Hat 3scale API Management Platform 2 for RHEL 7 ppc64le
Fixes
- BZ - 1912487 - CVE-2020-26247 rubygem-nokogiri: XML external entity injection via Nokogiri::XML::Schema
- THREESCALE-7704 - Images based on RHEL 7 should contain at least ca-certificates-2021.2.50-72.el7_9.noarch.rpm
- THREESCALE-6868 - [3scale][2.11][LO-prio] Improve select default Application plan
- THREESCALE-7030 - Address scalability in 'Create new Application' form
- THREESCALE-7203 - Fix Zync resync command in 5.6.9. Creating equivalent Zync routes
- THREESCALE-7475 - Some api calls result in "Destroying user session"
- THREESCALE-7488 - Ability to add external Lua dependencies for custom policies
- THREESCALE-7573 - Enable proxy environment variables via the APICAST CRD
- THREESCALE-7605 - type change of "policies_config" in /admin/api/services/{service_id}/proxy.json
- THREESCALE-7633 - Signup form in developer portal is disabled for users authenticted via external SSO
- THREESCALE-7644 - Metrics: Service for 3scale operator is missing
- THREESCALE-7646 - Cleanup/refactor Products and Backends index logic
- THREESCALE-7648 - Remove "#context-menu" from the url
- THREESCALE-7731 - Reenable operator metrics service for apicast-operator
- THREESCALE-7761 - 3scale Operator doesn't respect *_proxy env vars
- THREESCALE-7765 - Remove MessageBus from System
- THREESCALE-7834 - admin can't create application when developer is not allowed to pick a plan
- THREESCALE-6879 - [3scale][2.11][HI-prio] Add 'Create new Application' flow to Product > Applications index
- THREESCALE-7863 - Update some Obsolete API's in 3scale_v2.js
- THREESCALE-7884 - Service top application endpoint is not working properly
- THREESCALE-7912 - ServiceMonitor created by monitoring showing HTTP 400 error
- THREESCALE-7913 - ServiceMonitor for 3scale operator has wide selector
CVEs
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.