First published: Mon Jun 15 2020(Updated: )
Red Hat JBoss Enterprise Application Platform CD13 is a platform for Java applications based on the WildFly application runtime.<br>This release of Red Hat JBoss Enterprise Application Platform CD13 includes bug fixes and enhancements. <br>Security Fix(es):<br><li> guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service (CVE-2018-10237)</li> <li> undertow: HTTP header injection using CRLF with UTF-8 Encoding (incomplete fix of CVE-2016-4993) (CVE-2018-1067)</li> <li> jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries (CVE-2018-7489)</li> <li> wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip) (CVE-2018-10862)</li> <li> undertow: client can use bogus uri in digest authentication (CVE-2017-12196)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:2562 is categorized as important.
To fix RHSA-2020:2562, update the Red Hat JBoss Enterprise Application Platform to the latest version provided in the advisory.
RHSA-2020:2562 addresses vulnerabilities in the guava library involving unbounded memory consumption.
RHSA-2020:2562 affects Red Hat JBoss Enterprise Application Platform CD13.
No specific workaround is provided for RHSA-2020:2562; updating the software is recommended.