-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: web-admin-build security update Advisory ID: RHSA-2022:1628-01 Product: Red Hat Gluster Storage Advisory URL: https://access.redhat.com/errata/RHSA-2022:1628 Issue date: 2022-04-27 CVE Names: CVE-2021-44716 ===================================================================== 1. Summary: Updated web-admin-build packages are now available for Red Hat Gluster Storage 3.5 Web Administration on Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Gluster 3.5 Web Administration on RHEL-7 - x86_64 3. Description: Red Hat Gluster Storage Web Administration includes a fully automated setup based on Ansible and provides deep metrics and insights into active Gluster storage pools by using the Grafana platform. Red Hat Gluster Storage Web Administration provides a dashboard view that allows an administrator to get a view of overall gluster health in terms of hosts, volumes, bricks, and other components of GlusterFS. Security Fix(es): * golang: net/http: limit growth of header canonicalization cache (CVE-2021-44716) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. All users of Red Hat Gluster Storage Web Administration are advised to upgrade to this updated package, which fixes this bug. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2030801 - CVE-2021-44716 golang: net/http: limit growth of header canonicalization cache 6. Package List: Red Hat Gluster 3.5 Web Administration on RHEL-7: Source: etcd-3.3.23-9.el7rhgs.src.rpm grafana-5.2.4-5.el7rhgs.src.rpm x86_64: etcd-3.3.23-9.el7rhgs.x86_64.rpm etcd-debuginfo-3.3.23-9.el7rhgs.x86_64.rpm grafana-5.2.4-5.el7rhgs.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-44716 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYmlscdzjgjWX9erEAQg0kA/8Cxt6gvzuNGBzo4TjcUBzeKRdF12JXtW5 B7XmbbtLdo70VY7i1q9AYqYrySJ7aMJvxUl93yaU7eEf0sUH0cAdw/YSIlYd12Hb kvS9Je+YtqojJoMa6CDmFWYfS8g3Y6yvCtsbAe3GqOgIDcW7DPm/E63GsL2kJdRU dLpVbSnW/l6GNOfiGV2RGRhLl80UiOCyujU+VL8CdZCkI5rSEszXACKqpkeU4zY4 2gGplcfkxZJ9hv8EFKuIHuog0gfF18LIfcJH4CJJo+C4AvhHOr8wC6sY0bvCWewL nHTD4rjqG1+bzc4mtixFwjKY1J4Y5HmTIQdRkLmI0WBEcl65YwamzjeBMd4EP/SC VMMtvlmKfDwqaPklwsIb1s7lgttCgWtfOV7a723OA/jsOVuiIORLKWi74oK6l0cZ rTH4+Wi+H+PCMkSeVsVv3wYTfu8FkIQDmSklnM9i8mFXlyUZyHRIXaiTZXtCnM7o YodmTH1Ta6k0HYRTjN5c32FOa4bQBqaFsmSrFvGNFB2xrU0Xz6155lQBzGImwwvJ 37dz1to/JoFwjP5Mer0ixV4/1miwMvNq7bCirwu1U5nzXQzC9b3As74nXs3QWiWd FVrs9g6OBm7fRrJKEplUmn54DoPtZXUzjvuIEuksf0FgE8yGb3cW/4rq0935NOGz PgIWatZ0dtY= =36LQ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce