-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat build of Eclipse Vert.x 4.1.0 security update
Advisory ID:       RHSA-2021:2465-01
Product:           Red Hat OpenShift Application Runtimes
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:2465
Issue date:        2021-07-07
CVE Names:         CVE-2021-21409 CVE-2021-29425 
====================================================================
1. Summary:

An update is now available for Red Hat build of Eclipse Vert.x.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability. For
more information, see the CVE pages listed in the References section.

2. Description:

This release of Red Hat build of Eclipse Vert.x 4.1.0 includes security
updates, bug fixes, and enhancements. For more information, see the release
notes listed in the References section.

Security Fix(es):

* netty: Request smuggling via content-length header (CVE-2021-21409)

* apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
(CVE-2021-29425)

For more details about the security issues and their impact, the CVSS
score, acknowledgements, and other related information, see the CVE pages
listed in the References section.

3. Solution:

Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.

The References section of this erratum contains a download link for the
update. You must be logged in to download the update.

4. Bugs fixed (https://bugzilla.redhat.com/):

1944888 - CVE-2021-21409 netty: Request smuggling via content-length header
1948752 - CVE-2021-29425 apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6

5. References:

https://access.redhat.com/security/cve/CVE-2021-21409
https://access.redhat.com/security/cve/CVE-2021-29425
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=catRhoar.eclipse.vertx&version=4.1.0
https://access.redhat.com/documentation/en-us/red_hat_build_of_eclipse_vert.x/4.1/html/release_notes_for_eclipse_vert.x_4.1/index

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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kFZD
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-2465:01 Moderate: Red Hat build of Eclipse Vert.x 4.1.0

An update is now available for Red Hat build of Eclipse Vert.x

Summary

This release of Red Hat build of Eclipse Vert.x 4.1.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes listed in the References section.
Security Fix(es):
* netty: Request smuggling via content-length header (CVE-2021-21409)
* apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 (CVE-2021-29425)
For more details about the security issues and their impact, the CVSS score, acknowledgements, and other related information, see the CVE pages listed in the References section.



Summary


Solution

Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.
The References section of this erratum contains a download link for the update. You must be logged in to download the update.

References

https://access.redhat.com/security/cve/CVE-2021-21409 https://access.redhat.com/security/cve/CVE-2021-29425 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=catRhoar.eclipse.vertx&version=4.1.0 https://access.redhat.com/documentation/en-us/red_hat_build_of_eclipse_vert.x/4.1/html/release_notes_for_eclipse_vert.x_4.1/index

Package List


Severity
Advisory ID: RHSA-2021:2465-01
Product: Red Hat OpenShift Application Runtimes
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2465
Issued Date: : 2021-07-07
CVE Names: CVE-2021-21409 CVE-2021-29425

Topic

An update is now available for Red Hat build of Eclipse Vert.x.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability. Formore information, see the CVE pages listed in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

1944888 - CVE-2021-21409 netty: Request smuggling via content-length header

1948752 - CVE-2021-29425 apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6


Related News