First published: Thu Dec 15 2022(Updated: )
This release of Red Hat build of Eclipse Vert.x 4.3.4 GA includes security updates. For more information, see the release notes listed in the References section.<br>Security Fix(es):<br><li> snakeyaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)</li> <li> jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)</li> <li> jackson-databind: use of deeply nested arrays (CVE-2022-42004)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse Vert.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:9032 is critical due to the potential for remote code execution.
To fix RHSA-2022:9032, update to the latest release of the Red Hat build of Eclipse Vert.x 4.3.4 GA.
RHSA-2022:9032 addresses vulnerabilities including CVE-2022-1471 related to remote code execution via Constructor Deserialization.
RHSA-2022:9032 affects specific versions of the Red Hat build of Eclipse Vert.x prior to the security updates.
There are no recommended workarounds for RHSA-2022:9032; the advised action is to apply the security update.