-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat OpenShift Application Runtimes security and bug fix update
Advisory ID:       RHSA-2018:2946-01
Product:           Red Hat OpenShift Application Runtimes
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:2946
Issue date:        2018-10-18
CVE Names:         CVE-2018-12541 CVE-2018-12544 
====================================================================
1. Summary:

An update is now available for Red Hat OpenShift Application Runtimes.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat Openshift Application Runtimes provides an application platform
that reduces the complexity of developing and operating applications
(monoliths and microservices) for OpenShift as a containerized platform.

The RHOAR Eclipse Vert.x 3.5.4 release serves as a replacement for RHOAR
Eclipse Vert.x 3.5.3, and includes bug fixes and enhancements. For a
detailed list of issues resolved in the community Eclipse Vert.x 3.5.4
release, see the release notes in the References section.

Security Fix(es):

* vertx: WebSocket HTTP upgrade implementation holds the entire http
request in memory before the handshake (CVE-2018-12541)

* vertx: API Validation XML Schemas do not forbid file system access
(CVE-2018-12544)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

3. Solution:

Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (https://bugzilla.redhat.com/):

1638384 - CVE-2018-12544 vertx: API Validation XML Schemas do not forbid file system access
1638391 - CVE-2018-12541 vertx: WebSocket HTTP upgrade implementation holds the entire http request in memory before the handshake

5. References:

https://access.redhat.com/security/cve/CVE-2018-12541
https://access.redhat.com/security/cve/CVE-2018-12544
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=catRhoar.eclipse.vertx&version=3.5.4

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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BElT
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2018-2946:01 Moderate: Red Hat OpenShift Application Runtimes

An update is now available for Red Hat OpenShift Application Runtimes

Summary

Red Hat Openshift Application Runtimes provides an application platform that reduces the complexity of developing and operating applications (monoliths and microservices) for OpenShift as a containerized platform.
The RHOAR Eclipse Vert.x 3.5.4 release serves as a replacement for RHOAR Eclipse Vert.x 3.5.3, and includes bug fixes and enhancements. For a detailed list of issues resolved in the community Eclipse Vert.x 3.5.4 release, see the release notes in the References section.
Security Fix(es):
* vertx: WebSocket HTTP upgrade implementation holds the entire http request in memory before the handshake (CVE-2018-12541)
* vertx: API Validation XML Schemas do not forbid file system access (CVE-2018-12544)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.
The References section of this erratum contains a download link (you must log in to download the update).

References

https://access.redhat.com/security/cve/CVE-2018-12541 https://access.redhat.com/security/cve/CVE-2018-12544 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=catRhoar.eclipse.vertx&version=3.5.4

Package List


Severity
Advisory ID: RHSA-2018:2946-01
Product: Red Hat OpenShift Application Runtimes
Advisory URL: https://access.redhat.com/errata/RHSA-2018:2946
Issued Date: : 2018-10-18
CVE Names: CVE-2018-12541 CVE-2018-12544

Topic

An update is now available for Red Hat OpenShift Application Runtimes.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

1638384 - CVE-2018-12544 vertx: API Validation XML Schemas do not forbid file system access

1638391 - CVE-2018-12541 vertx: WebSocket HTTP upgrade implementation holds the entire http request in memory before the handshake


Related News