exploit the possibilities

Red Hat Security Advisory 2021-0084-01

Red Hat Security Advisory 2021-0084-01
Posted Jan 13, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-0084-01 - This release of Red Hat build of Quarkus 1.7.6 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section.

tags | advisory
systems | linux, redhat
advisories | CVE-2020-13956
MD5 | 98feed9e40743a3037ad053ba60978ac

Red Hat Security Advisory 2021-0084-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat build of Quarkus 1.7.6 release and security update
Advisory ID: RHSA-2021:0084-01
Product: Red Hat build of Quarkus
Advisory URL: https://access.redhat.com/errata/RHSA-2021:0084
Issue date: 2021-01-12
CVE Names: CVE-2020-13956
=====================================================================

1. Summary:

An update is now available for Red Hat build of Quarkus.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability. For
more information, see the CVE links in the References section.

2. Description:

This release of Red Hat build of Quarkus 1.7.6 includes security updates,
bug fixes, and enhancements. For more information, see the release notes
page listed in the References section.

Security Fix(es):

* apache http client: incorrect handling of malformed authority component
in request URIs (CVE-2020-13956)

* vertx-web: Vert.x StaticHandler backslash issue on Windows (QUARKUS-458)

For more details about the security issues and their impact, the CVSS
score, acknowledgments, and other related information see the CVE pages
listed in the References section.

3. Solution:

Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.

The References section of this erratum contains a download link for the
update. You must be logged in to download the update.

4. Bugs fixed (https://bugzilla.redhat.com/):

1886587 - CVE-2020-13956 apache-httpclient: incorrect handling of malformed authority component in request URIs

5. References:

https://access.redhat.com/security/cve/CVE-2020-13956
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=redhat.quarkus&downloadType=distributions&version=1.7.6
https://access.redhat.com/documentation/en-us/red_hat_build_of_quarkus/1.7/
https://access.redhat.com/articles/4966181

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=hVxB
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

January 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    4 Files
  • 2
    Jan 2nd
    3 Files
  • 3
    Jan 3rd
    3 Files
  • 4
    Jan 4th
    33 Files
  • 5
    Jan 5th
    31 Files
  • 6
    Jan 6th
    21 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    19 Files
  • 9
    Jan 9th
    1 Files
  • 10
    Jan 10th
    1 Files
  • 11
    Jan 11th
    33 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    27 Files
  • 14
    Jan 14th
    8 Files
  • 15
    Jan 15th
    16 Files
  • 16
    Jan 16th
    1 Files
  • 17
    Jan 17th
    2 Files
  • 18
    Jan 18th
    20 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close