Linux Security
    Linux Security
    Linux Security

    RedHat: RHSA-2021-0084:01 Moderate: Red Hat build of Quarkus 1.7.6 release

    Date 12 Jan 2021
    273
    Posted By LinuxSecurity Advisories
    An update is now available for Red Hat build of Quarkus. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Moderate: Red Hat build of Quarkus 1.7.6 release and security update
    Advisory ID:       RHSA-2021:0084-01
    Product:           Red Hat build of Quarkus
    Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0084
    Issue date:        2021-01-12
    CVE Names:         CVE-2020-13956 
    =====================================================================
    
    1. Summary:
    
    An update is now available for Red Hat build of Quarkus.
    
    Red Hat Product Security has rated this update as having a security impact
    of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
    gives a detailed severity rating, is available for each vulnerability. For
    more information, see the CVE links in the References section.
    
    2. Description:
    
    This release of Red Hat build of Quarkus 1.7.6 includes security updates,
    bug fixes, and enhancements. For more information, see the release notes
    page listed in the References section.
    
    Security Fix(es):
    
    * apache http client: incorrect handling of malformed authority component
    in request URIs (CVE-2020-13956)
    
    * vertx-web: Vert.x StaticHandler backslash issue on Windows (QUARKUS-458)
    
    For more details about the security issues and their impact, the CVSS
    score, acknowledgments, and other related information see the CVE pages
    listed in the References section.
    
    3. Solution:
    
    Before applying the update, back up your existing installation, including
    all applications, configuration files, databases and database settings, and
    so on.
    
    The References section of this erratum contains a download link for the
    update. You must be logged in to download the update.
    
    4. Bugs fixed (https://bugzilla.redhat.com/):
    
    1886587 - CVE-2020-13956 apache-httpclient: incorrect handling of malformed authority component in request URIs
    
    5. References:
    
    https://access.redhat.com/security/cve/CVE-2020-13956
    https://access.redhat.com/security/updates/classification/#moderate
    https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=redhat.quarkus&downloadType=distributions&version=1.7.6
    https://access.redhat.com/documentation/en-us/red_hat_build_of_quarkus/1.7/
    https://access.redhat.com/articles/4966181
    
    6. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2021 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBX/3R4tzjgjWX9erEAQhnZg/+KazeUlyl0/SfdqdhNd3RJT8Pd+jghn3d
    y1EE3m15v2TQ0SkFRdNWj58srDpOA3BYn/9JK0kOxW6PzyfOxKU08jH/XAitEg3Z
    L3H5Sod3reOISz2jtJCDVwweHoqQWaiWqfF7w5g+wHQt7eJmSYmKs6k1ndV6D3x6
    3BfCcqVAIy7/qBmp5O2S+I5iLTCPKWFXcRrmw2v46CxnacoULAGkQLfS+Nynt6oY
    siA0J7rkSaOHCiLYQyT7WCuOjZtSeiFWp3m7HuOWkvzhCCKcuL6SbE9ePfG/jfGC
    movB00m8D901046bOc1JExWp7BJnipTRHJpZbckSwKTOLx0MvaxdqXbphR69CcX3
    X8uYssVXPMxT3oTzsn5uFcRPIpFD3w2AtKwuncwvXfFDFjGWQ65/3nn6kYjsQ0pY
    ATyHX9Jgsh4690Dis9D+sIzQhGGWDOyKCGOFxTjlYn7aZc/nKBkMLRL2kVLWy7fV
    D2LbvjXTPiI3e0xBFTWb0YWaVDG+u4+Wr8r3G9OKvKq3l/BJh7J4ev9RKlVjFdu8
    jXY13StLNo+pV+aacIMMoMht46MOxHmKM9XEQcdTgyWBujGNox9nBT/BWVz466p9
    5Pxu090LNHoCmlE738r2BQQSuhYbHE3fQySjjDexo7pS5e1qKCy3+Vu3ymkDQp1M
    RxLxL1ZmL18=
    =hVxB
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/49-tis-the-season-of-giving-how-have-you-given-back-to-the-open-source-community?task=poll.vote&format=json
    49
    radio
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"9","type":"x","order":"1","pct":30,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":20,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":50,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.