-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Low: Red Hat OpenStack Platform 16.1.9 (rabbitmq-server) security update
Advisory ID:       RHSA-2022:8867-01
Product:           Red Hat OpenStack Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:8867
Issue date:        2022-12-07
CVE Names:         CVE-2021-32718 
====================================================================
1. Summary:

An update for rabbitmq-server is now available for Red Hat OpenStack
Platform 16.1.9 (Train) for Red Hat Enterprise Linux (RHEL) 8.2.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat OpenStack Platform 16.1 - ppc64le, x86_64

3. Description:

RabbitMQ is an implementation of AMQP, the emerging standard for high
performance enterprise messaging. The RabbitMQ server is a robust and
scalable implementation of an AMQP broker. # We want to install into
/usr/lib, even on 64-bit platforms

Security Fix(es):

* improper neutralization of script-related HTML tags in a web page (basic
XSS) in management UI (CVE-2021-32718)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1977002 - CVE-2021-32718 rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in management UI

6. Package List:

Red Hat OpenStack Platform 16.1:

Source:
rabbitmq-server-3.7.23-9.el8ost.src.rpm

ppc64le:
rabbitmq-server-3.7.23-9.el8ost.ppc64le.rpm

x86_64:
rabbitmq-server-3.7.23-9.el8ost.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-32718
https://access.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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ueW9
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-8867:01 Low: Red Hat OpenStack Platform 16.1.9

An update for rabbitmq-server is now available for Red Hat OpenStack Platform 16.1.9 (Train) for Red Hat Enterprise Linux (RHEL) 8.2

Summary

RabbitMQ is an implementation of AMQP, the emerging standard for high performance enterprise messaging. The RabbitMQ server is a robust and scalable implementation of an AMQP broker. # We want to install into /usr/lib, even on 64-bit platforms
Security Fix(es):
* improper neutralization of script-related HTML tags in a web page (basic XSS) in management UI (CVE-2021-32718)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2021-32718 https://access.redhat.com/security/updates/classification/#low

Package List

Red Hat OpenStack Platform 16.1:
Source: rabbitmq-server-3.7.23-9.el8ost.src.rpm
ppc64le: rabbitmq-server-3.7.23-9.el8ost.ppc64le.rpm
x86_64: rabbitmq-server-3.7.23-9.el8ost.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2022:8867-01
Product: Red Hat OpenStack Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2022:8867
Issued Date: : 2022-12-07
CVE Names: CVE-2021-32718

Topic

An update for rabbitmq-server is now available for Red Hat OpenStackPlatform 16.1.9 (Train) for Red Hat Enterprise Linux (RHEL) 8.2.Red Hat Product Security has rated this update as having a security impactof Low. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat OpenStack Platform 16.1 - ppc64le, x86_64


Bugs Fixed

1977002 - CVE-2021-32718 rabbitmq-server: improper neutralization of script-related HTML tags in a web page (basic XSS) in management UI


Related News