First published: Wed Mar 08 2023(Updated: )
This release of Red Hat build of Quarkus 2.7.7 includes security updates, bug<br>fixes, and enhancements. For more information, see the release notes page listed<br>in the References section.<br>Security Fix(es):<br><li>CVE-2023-0044 quarkus-vertx-<a href="http:" target="_blank">http:</a> a cross-site attack may be initiated which might lead to the Information Disclosure [quarkus-2]</li> <li>CVE-2022-41946 jdbc-postgresql: postgresql-jdbc: PreparedStatement.setText(int, InputStream) will create a temporary file if the InputStream is larger than 2k [quarkus-2]</li> <li>CVE-2022-31197 postgresql: SQL Injection in ResultSet.refreshRow() with malicious column names [quarkus-2.7]</li> <li>CVE-2022-42004 jackson-databind: use of deeply nested arrays [quarkus-2.7]</li> <li>CVE-2022-42003 jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS [quarkus-2.7]</li> <li>CVE-2022-42889 commons-text: apache-commons-text: variable interpolation RCE [quarkus-2.7]</li> <li>CVE-2022-1471 snakeyaml: Constructor Deserialization Remote Code Execution [quarkus-2]</li> <li>CVE-2022-41966 xstream: Denial of Service by injecting recursive collections or maps based on element's hash values raising a stack overflow [quarkus-2.7]</li> <li>CVE-2022-3171 protobuf-java: timeout in parser leads to DoS [quarkus-2]</li>
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.