First published: Wed Oct 20 2021(Updated: )
This release of Red Hat build of Quarkus 2.2.3 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section.<br>Security Fix(es):<br><li> maven: Block repositories using http by default (CVE-2021-26291)</li> <li> jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception (CVE-2020-28491)</li> <li> wildfly-elytron: possible timing attack in ScramServer (CVE-2021-3642)</li> <li> netty: Information disclosure via the local system temporary directory (CVE-2021-21290)</li> <li> netty: possible request smuggling in HTTP/2 due missing validation (CVE-2021-21295)</li> <li> netty: Request smuggling via content-length header (CVE-2021-21409)</li> <li> resteasy: Error message exposes endpoint class information (CVE-2021-20289)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Build of Quarkus |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:3880 is classified as important due to the associated security vulnerabilities.
To fix RHSA-2021:3880, update to the latest version of the Red Hat build of Quarkus as specified in the advisory.
RHSA-2021:3880 addresses the CVE-2021-26291 vulnerability related to blocking HTTP repositories by default.
The affected software includes the Red Hat build of Quarkus version 2.2.3 and its earlier versions.
A specific workaround for RHSA-2021:3880 is not recommended; updating to the patched version is the best approach.