First published: Wed May 18 2022(Updated: )
This release of Red Hat build of Quarkus 2.7.5 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section.<br>Security Fix(es):<br><li> gradle: information disclosure through temporary directory permissions (CVE-2021-29429)</li> <li> gradle: repository content filters do not work in Settings pluginManagement (CVE-2021-29427)</li> <li> gradle: local privilege escalation through system temporary director (CVE-2021-29428)</li> <li> smallrye-health-ui: persistent cross-site scripting in endpoint (CVE-2021-3914)</li> <li> Quarkus Resteasy component may return Resteasy implementation details </li> <li> netty: control chars in header names may lead to HTTP request smuggling (CVE-2021-43797)</li> <li> jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes (CVE-2022-21724)</li> <li> mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors (CVE-2022-21363)</li> <li> quarkus: privilege escalation vulnerability with RestEasy Reactive scope leakage in Quarkus (CVE-2022-0981)</li> <li> protobuf-java: potential DoS in the parsing procedure for binary data (CVE-2021-22569)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.