-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Low: Red Hat OpenShift Jaeger 1.24.0 Operator/Operand Containers security update
Advisory ID:       RHSA-2021:3024-01
Product:           Red Hat OpenShift Jaeger
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:3024
Issue date:        2021-08-09
CVE Names:         CVE-2021-3516 CVE-2021-3517 CVE-2021-3518 
                   CVE-2021-3520 CVE-2021-3537 CVE-2021-3541 
                   CVE-2021-20271 CVE-2021-27292 CVE-2021-33910 
====================================================================
1. Summary:

An update is now available for Red Hat OpenShift Jaeger 1.24.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat OpenShift distributed tracing (formerly OpenShift Jaeger) is Red
Hat's distribution of the Jaeger project, tailored for installation into an
on-premise OpenShift Container Platform
installation.

Security Fix(es):

* nodejs-ua-parser-js: ReDoS via malicious User-Agent header
(CVE-2021-27292)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

jaeger-updating.html

4. Bugs fixed (https://bugzilla.redhat.com/):

1940613 - CVE-2021-27292 nodejs-ua-parser-js: ReDoS via malicious User-Agent header

5. JIRA issues fixed (https://issues.redhat.com/):

TRACING-2009 - Update jaeger operator to support strimzi operator 0.23.0
TRACING-377 - Jaeger Elasticsearch Rollover Support

6. References:

https://access.redhat.com/security/cve/CVE-2021-3516
https://access.redhat.com/security/cve/CVE-2021-3517
https://access.redhat.com/security/cve/CVE-2021-3518
https://access.redhat.com/security/cve/CVE-2021-3520
https://access.redhat.com/security/cve/CVE-2021-3537
https://access.redhat.com/security/cve/CVE-2021-3541
https://access.redhat.com/security/cve/CVE-2021-20271
https://access.redhat.com/security/cve/CVE-2021-27292
https://access.redhat.com/security/cve/CVE-2021-33910
https://access.redhat.com/security/updates/classification/#low

7. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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wayi
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-3024:01 Low: Red Hat OpenShift Jaeger 1.24.0

An update is now available for Red Hat OpenShift Jaeger 1.24

Summary

Red Hat OpenShift distributed tracing (formerly OpenShift Jaeger) is Red Hat's distribution of the Jaeger project, tailored for installation into an on-premise OpenShift Container Platform installation.
Security Fix(es):
* nodejs-ua-parser-js: ReDoS via malicious User-Agent header (CVE-2021-27292)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
jaeger-updating.html

References

https://access.redhat.com/security/cve/CVE-2021-3516 https://access.redhat.com/security/cve/CVE-2021-3517 https://access.redhat.com/security/cve/CVE-2021-3518 https://access.redhat.com/security/cve/CVE-2021-3520 https://access.redhat.com/security/cve/CVE-2021-3537 https://access.redhat.com/security/cve/CVE-2021-3541 https://access.redhat.com/security/cve/CVE-2021-20271 https://access.redhat.com/security/cve/CVE-2021-27292 https://access.redhat.com/security/cve/CVE-2021-33910 https://access.redhat.com/security/updates/classification/#low

Package List


Severity
Advisory ID: RHSA-2021:3024-01
Product: Red Hat OpenShift Jaeger
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3024
Issued Date: : 2021-08-09
CVE Names: CVE-2021-3516 CVE-2021-3517 CVE-2021-3518 CVE-2021-3520 CVE-2021-3537 CVE-2021-3541 CVE-2021-20271 CVE-2021-27292 CVE-2021-33910

Topic

An update is now available for Red Hat OpenShift Jaeger 1.24.Red Hat Product Security has rated this update as having a security impactof Low. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

1940613 - CVE-2021-27292 nodejs-ua-parser-js: ReDoS via malicious User-Agent header

5. JIRA issues fixed (https://issues.redhat.com/):

TRACING-2009 - Update jaeger operator to support strimzi operator 0.23.0

TRACING-377 - Jaeger Elasticsearch Rollover Support


Related News