- Issued:
- 2026-04-14
- Updated:
- 2026-04-14
RHSA-2026:8159 - Security Advisory
Synopsis
Important: Red Hat Build of Apache Camel 4.14 for Quarkus 3.27 update is now available (RHBQ 3.27.3.GA)
Type/Severity
Security Advisory: Important
Topic
An update for Red Hat Build of Apache Camel 4.14 for Quarkus 3.27 update is now available (RHBQ 3.27.3.GA).
The purpose of this text-only errata is to inform you about the enhancements that improve your developer experience and ensure the security and stability of your products.
Description
An update for Red Hat Build of Apache Camel 4.14 for Quarkus 3.27 update is now available (RHBQ 3.27.3.GA).
The purpose of this text-only errata is to inform you about the enhancements that improve your developer experience and ensure the security and stability of your products:
- vertx-core: static handler component cache can be manipulated to deny the access to static files (CVE-2026-1002)
- netty-codec-http: Netty: Request smuggling via incorrect parsing of HTTP/1.1 chunked transfer encoding extension values (CVE-2026-33870)
- netty-codec-http2: Netty: Denial of Service via HTTP/2 CONTINUATION frame flood (CVE-2026-33871)
Solution
Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.
The References section of this erratum contains a download link (you must log in to download the update).
Affected Products
- Red Hat Build of Apache Camel 1 x86_64
Fixes
- BZ - 2430180 - CVE-2026-1002 io.vertx/vertx-core: static handler component cache can be manipulated to deny the access to static files
- BZ - 2452453 - CVE-2026-33870 io.netty/netty-codec-http: Netty: Request smuggling via incorrect parsing of HTTP/1.1 chunked transfer encoding extension values
- BZ - 2452456 - CVE-2026-33871 netty: Netty: Denial of Service via HTTP/2 CONTINUATION frame flood
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.