-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat AMQ Broker 7.4.6 release and security update Advisory ID: RHSA-2021:0329-01 Product: Red Hat JBoss AMQ Advisory URL: https://access.redhat.com/errata/RHSA-2021:0329 Issue date: 2021-02-02 Keywords: amq,messaging,integration,broker Cross references: RHBA-2021:68165-02 CVE Names: CVE-2020-27216 CVE-2020-27218 ==================================================================== 1. Summary: Red Hat AMQ Broker 7.4.6 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.4.6 serves as a replacement for Red Hat AMQ Broker 7.4.5, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Security Fix(es): * jetty: local temporary directory hijacking vulnerability (CVE-2020-27216) * jetty: buffer not correctly recycled in Gzip Request inflation (CVE-2020-27218) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. The References section of this erratum contains a download link (you must log in to download the update). 4. Bugs fixed (https://bugzilla.redhat.com/): 1891132 - CVE-2020-27216 jetty: local temporary directory hijacking vulnerability 1902826 - CVE-2020-27218 jetty: buffer not correctly recycled in Gzip Request inflation 5. References: https://access.redhat.com/security/cve/CVE-2020-27216 https://access.redhat.com/security/cve/CVE-2020-27218 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=jboss.amq.broker&version=7.4.6 https://access.redhat.com/documentation/en-us/red_hat_amq/7.4/ 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYBkBLtzjgjWX9erEAQiRaBAAlrxfPdxaP4AIpIoQO7uJJxmzArLxtFtl MgYaKk+e4B8ZQtErkZ3QujmHL0AEX3xsJAzREIfq7ml9thMZ75SYD/tsdg8jFKU3 SwStGtNS5HczHS80qYpJCf2DqoGsy7WKT7DFroFM/f2/tbFcn8uqc0G3ToUZK6Ii stnXOzbyk5jnRTp6RaGpoNUk/R4G22dMwm8B311yVhMEX/VGOYA9XbtS9yx3A2/1 NmnZRUGOu3jlo25TuOzbccoeNsLbmV2iE8C4UFHGAku4A8PePeNAwfVSCsC9CvU2 Z5klu9Gmj/KkPG8Dm9Dv/WSOwxZ967LcZfTZS5Jrcmn5pPNaQGNstbbkhlhy28Jb YLn/1I4lttI1n7+2UUqq3IjBKQiM8st618BuBLSfWLRG6T6a6XgAmOgMDdmyTbj3 DtTEFG8mXE+PKmsSvRFhM0EOvSZ97nXq0DrkdPpv4kFfVnfinqbg7wemOEniP/oX TJVxOim1ye94/qDccUKN14/d95krgH+TwiecfVSzVGLYuCgcFjklSu9E8D023T4X c7lD+JTbD0UvPGo6DZXMPQk0MjZzSs6UqSgike/ZeqwfQErrmMrUiEZ7tyzvbM8Z 9K9Oa9/inB9xBynYtcHPt0OsCt2Rk5XU0vE5dTz2U6qZnQs5IT/rLwsTGW2jDxeI mqINYGvTM/M=FqkB -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce