First published: Tue Apr 14 2020(Updated: )
AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. <br>This release of Red Hat AMQ Broker 7.4.3 serves as a replacement for Red Hat AMQ Broker 7.4.2, and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.<br>Security Fix(es):<br><li> jetty: HTTP/2: large amount of data requests leads to denial of service (CVE-2019-9511)</li> <li> jetty: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)</li> <li> jetty: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)</li> <li> jetty: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)</li> <li> jetty: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)</li> <li> jetty: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)</li> <li> jetty: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)</li> <li> netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)</li> <li> netty: HTTP request smuggling (CVE-2019-20444)</li> <li> netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header (CVE-2019-20445)</li> <li> netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling (CVE-2020-7238)</li> <li> mqtt-client: activemq: Corrupt MQTT frame can cause broker shutdown (CVE-2019-0222)</li> <li> jetty: using specially formatted URL against DefaultServlet or ResourceHandler leads to XSS conditions (CVE-2019-10241)</li> <li> jetty: error path information disclosure (CVE-2019-10247)</li> For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.