Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Red Hat JBoss Enterprise Application Platform 8.0.1
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Red Hat JBoss Enterprise Application Platform 8.0.1
ID: RHSA-2024:1194
Distribution: Red Hat
Plattformen: Red Hat EAP 8.0.1
Datum: Do, 7. März 2024, 07:07
Referenzen: https://access.redhat.com/security/cve/CVE-2023-35887
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/8.0/
https://access.redhat.com/security/cve/CVE-2023-4759
https://access.redhat.com/errata/RHSA-2024:1194
https://bugzilla.redhat.com/show_bug.cgi?id=2238614
https://bugzilla.redhat.com/show_bug.cgi?id=2254594
https://access.redhat.com/security/cve/CVE-2023-4043
https://access.redhat.com/security/cve/CVE-2023-48795
https://bugzilla.redhat.com/show_bug.cgi?id=2254210
https://bugzilla.redhat.com/show_bug.cgi?id=2240036
Applikationen: Red Hat JBoss Enterprise Application Platform 8.0.1

Originalnachricht

An update is now available for Red Hat JBoss Enterprise Application Platform
8.0. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Red Hat JBoss Enterprise Application Platform 8 is a platform for Java
applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.0.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 8.0.0, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 8.0.0 Release Notes for information about the most significant bug fixes and enhancements included in this release.

Security Fix(es):

* jgit: arbitrary file overwrite (CVE-2023-4759)

* sshd-common: apache-mina-sshd: information exposure in SFTP server
implementations (CVE-2023-35887)

* parsson: Denial of Service due to large number parsing (CVE-2023-4043)

* apache-sshd: ssh: Prefix truncation attack on Binary Packet Protocol
(CVE-2023-48795)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2023-4043: Excessive Iteration (CWE-834)
CVE-2023-4759
CVE-2023-35887: Improper Limitation of a Pathname to a Restricted Directory
('Path Traversal') (CWE-22)
CVE-2023-48795: Truncation of Security-relevant Information (CWE-222)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung