First published: Thu Jan 26 2023(Updated: )
Red Hat Integration - Camel Extensions for Quarkus 2.13.2 serves as a replacement for 2.7 and includes the following security fixes.<br>Security Fix(es):<br><li> jettison: memory exhaustion via user-supplied XML or JSON data (CVE-2022-40150)</li> <li> jettison: parser crash by stackoverflow (CVE-2022-40149)</li> <li> jackson-databind: use of deeply nested arrays (CVE-2022-42004)</li> <li> jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)</li> <li> commons-text: apache-commons-text: variable interpolation RCE (CVE-2022-42889)</li> <li> xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40151)</li> <li> woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40152)</li> <li> xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40153)</li> <li> xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40155)</li> <li> xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40156)</li> <li> xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40154)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.