drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Red Hat Build of Apache Camel
Name: |
Mehrere Probleme in Red Hat Build of Apache Camel |
|
ID: |
RHSA-2024:2707 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat build of Apache Camel 4.4.0 for Spring Boot |
|
Datum: |
Mo, 6. Mai 2024, 23:04 |
|
Referenzen: |
https://access.redhat.com/security/cve/CVE-2023-35116
https://access.redhat.com/security/cve/CVE-2023-51074
https://access.redhat.com/errata/RHSA-2024:2707
https://bugzilla.redhat.com/show_bug.cgi?id=2256063
https://access.redhat.com/security/cve/CVE-2023-5685
https://bugzilla.redhat.com/show_bug.cgi?id=2215214
https://access.redhat.com/security/cve/CVE-2023-2976
https://bugzilla.redhat.com/show_bug.cgi?id=2241822
https://bugzilla.redhat.com/show_bug.cgi?id=2259204
https://bugzilla.redhat.com/show_bug.cgi?id=2215229
https://access.redhat.com/security/cve/CVE-2024-21733 |
|
Applikationen: |
Red Hat Build of Apache Camel |
|
Originalnachricht |
Red Hat build of Apache Camel 4.4.0 for Spring Boot release and security update is now available.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Red Hat build of Apache Camel 4.4.0 for Spring Boot release and security update is now available.
The purpose of this text-only errata is to inform you about the security issues fixed.
Security Fix(es):
* xnio: StackOverflowException when the chain of notifier states becomes problematically big (CVE-2023-5685)
* tomcat: Leaking of unrelated request bodies in default error page (CVE-2024-21733)
* guava: insecure temporary directory creation (CVE-2023-2976)
* jackson-databind: denial of service via cylic dependencies (CVE-2023-35116)
* json-path: stack-based buffer overflow in Criteria.parse method (CVE-2023-51074)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
CVE-2023-2976: Files or Directories Accessible to External Parties (CWE-552) CVE-2023-5685: Uncontrolled Resource Consumption (CWE-400) CVE-2023-35116: Allocation of Resources Without Limits or Throttling (CWE-770) CVE-2023-51074: Stack-based Buffer Overflow (CWE-121) CVE-2024-21733: Generation of Error Message Containing Sensitive Information (CWE-209)
|
|
|
|