First published: Tue Feb 14 2023(Updated: )
This release of Red Hat build of Quarkus 2.13.7 includes security updates, bug<br>fixes, and enhancements. For more information, see the release notes page listed in the References section.<br>Security Fix(es):<br><li> CVE-2022-1471 snakeyaml: Constructor Deserialization Remote Code Execution [quarkus-2.13]</li> <li> CVE-2022-41881 codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS [quarkus-2.13]</li> <li> CVE-2022-45047 sshd-common: mina-sshd: Java unsafe deserialization vulnerability [quarkus-2.13]</li> <li> CVE-2023-0044 quarkus-vertx-<a href="http:" target="_blank">http:</a> a cross-site attack may be initiated which might lead to the Information Disclosure [quarkus-2.13]</li> <li> CVE-2022-41946 jdbc-postgresql: postgresql-jdbc: PreparedStatement.setText(int, InputStream) will create a temporary file if the InputStream is larger than 2k [quarkus-2.13]</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.