drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Cross-Site Request Forgery in Red Hat Build of Apache Camel 4.8 for Quarkus
| Name: |
Cross-Site Request Forgery in Red Hat Build of Apache Camel 4.8 for Quarkus |
|
| ID: |
RHSA-2025:1082 |
|
| Distribution: |
Red Hat |
|
| Plattformen: |
Red Hat Build of Apache Camel 4.8 for Quarkus 3.15 |
|
| Datum: |
Fr, 7. Februar 2025, 23:13 |
|
| Referenzen: |
https://bugzilla.redhat.com/show_bug.cgi?id=2331298
https://access.redhat.com/security/cve/CVE-2024-12397
https://access.redhat.com/errata/RHSA-2025:1082 |
|
| Applikationen: |
Red Hat Build of Apache Camel 4.8 for Quarkus |
|
Originalnachricht |
An update for Red Hat Build of Apache Camel 4.8 for Quarkus 3.15 update is now available (RHBQ 3.15.3.GA). The purpose of this text-only errata is to inform you about the enhancements that improve your developer experience and ensure the security and stability of your products. Red Hat Product Security has rated this update as having a security impact of Moderate.
An update for Red Hat Build of Apache Camel 4.8 for Quarkus 3.15 update is now available (RHBQ 3.15.3.GA). The purpose of this text-only errata is to inform you about the enhancements that improve your developer experience and ensure the security and stability of your products: * com.redhat.quarkus.platform/quarkus-cxf-bom: Quarkus HTTP Cookie Smuggling (CVE-2024-12397) * com.redhat.quarkus.platform/quarkus-camel-bom: Quarkus HTTP Cookie Smuggling (CVE-2024-12397)
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
CVE-2024-12397: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') (CWE-444)
|
|
|
|