Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Red Hat Build of Apache Camel
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Red Hat Build of Apache Camel
ID: RHSA-2024:2707
Distribution: Red Hat
Plattformen: Red Hat build of Apache Camel 4.4.0 for Spring Boot
Datum: Mo, 6. Mai 2024, 23:04
Referenzen: https://access.redhat.com/security/cve/CVE-2023-35116
https://access.redhat.com/security/cve/CVE-2023-51074
https://access.redhat.com/errata/RHSA-2024:2707
https://bugzilla.redhat.com/show_bug.cgi?id=2256063
https://access.redhat.com/security/cve/CVE-2023-5685
https://bugzilla.redhat.com/show_bug.cgi?id=2215214
https://access.redhat.com/security/cve/CVE-2023-2976
https://bugzilla.redhat.com/show_bug.cgi?id=2241822
https://bugzilla.redhat.com/show_bug.cgi?id=2259204
https://bugzilla.redhat.com/show_bug.cgi?id=2215229
https://access.redhat.com/security/cve/CVE-2024-21733
Applikationen: Red Hat Build of Apache Camel

Originalnachricht

Red Hat build of Apache Camel 4.4.0 for Spring Boot release and security update
is now available.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Red Hat build of Apache Camel 4.4.0 for Spring Boot release and security update
is now available.

The purpose of this text-only errata is to inform you about the security issues
fixed.

Security Fix(es):

* xnio: StackOverflowException when the chain of notifier states becomes
problematically big (CVE-2023-5685)

* tomcat: Leaking of unrelated request bodies in default error page
(CVE-2024-21733)

* guava: insecure temporary directory creation (CVE-2023-2976)

* jackson-databind: denial of service via cylic dependencies (CVE-2023-35116)

* json-path: stack-based buffer overflow in Criteria.parse method
(CVE-2023-51074)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2023-2976: Files or Directories Accessible to External Parties (CWE-552)
CVE-2023-5685: Uncontrolled Resource Consumption (CWE-400)
CVE-2023-35116: Allocation of Resources Without Limits or Throttling (CWE-770)
CVE-2023-51074: Stack-based Buffer Overflow (CWE-121)
CVE-2024-21733: Generation of Error Message Containing Sensitive Information
(CWE-209)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung