-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat build of Eclipse Vert.x 4.1.5 security update Advisory ID: RHSA-2021:3959-01 Product: Red Hat OpenShift Application Runtimes Advisory URL: https://access.redhat.com/errata/RHSA-2021:3959 Issue date: 2021-11-10 CVE Names: CVE-2021-37136 CVE-2021-37137 ===================================================================== 1. Summary: An update is now available for Red Hat build of Eclipse Vert.x. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For more information, see the CVE pages listed in the References section. 2. Description: This release of Red Hat build of Eclipse Vert.x 4.1.5 includes security updates, bug fixes, and enhancements. For more information, see the release notes listed in the References section. Security Fix(es): * netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data (CVE-2021-37136) * netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way (CVE-2021-37137) For more details about the security issues and their impact, the CVSS score, acknowledgements, and other related information, see the CVE pages listed in the References section. 3. Solution: Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. The References section of this erratum contains a download link for the update. You must be logged in to download the update. 4. Bugs fixed (https://bugzilla.redhat.com/): 2004133 - CVE-2021-37136 netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data 2004135 - CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way 5. References: https://access.redhat.com/security/cve/CVE-2021-37136 https://access.redhat.com/security/cve/CVE-2021-37137 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=catRhoar.eclipse.vertx&version=4.1.5 https://access.redhat.com/documentation/en-us/red_hat_build_of_eclipse_vert.x/4.1/html/release_notes_for_eclipse_vert.x_4.1/index 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYYwp/NzjgjWX9erEAQguBA//alr96JXhkkiBQlzQCyqhZ1D5l8oLOL8W /ArT3u8Qq+jhaL7djwqAKWNSuMMt4VNymxnVcnA38rYrA/OCxPkKoKwS0CYs6Ic4 BJ17xAn3P1XygGXKFHYXSb2QPqGYeXAwjeglAdPn0lh5x9fMqyEhHhKtjNJ3LH6n xVAgF6ieB48a6nrI3EJ0QJXOx+bBy8KX/u2yefU4BBNxJEm6NcutgOc1PFdN8Qc3 4DR0wISHUBiESQwbaWbjYsv0rp+rb+9yyZAtEa+xzQg9VhqWmvGv0GmalYpa2jxi e38Iw0IMadxIjd2iD9kkimUJMlS8Jh759slkx8AEe9UAf8sWBTRLK04IFjThy0je BkLcN4qLOHMds25lr0enxzXQdXwxrRjD5W0fx9NU+L1ceYBzi3bIuF3zppuKL0E6 kAvIDPisZbSW5epYs+3NTY/Xu+Lsoa659GYLByCnxw0dsapISFCA5hn/9e6xFomw nzssnr8NF5wrqnb2g+hsxGXzW8HtVCdPE2os5wcLXOLzaig7VTF+tF+f/cwAeJSX fH+FCNV/A7answj3MsLxkz/7HEHT3nnbw5YF7a/WQsBsbBLBLQGXdUNlvPpEDS6f ei0R7UFWVcCklgBHFRPOWq/QM6+oQYsPv8eNZs9g/P1vi3AFwTGK+FjONvNIjQqv n6hP9HwdmfE= =oRqE -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce