First published: Thu Jun 29 2023(Updated: )
This release of Red Hat build of Quarkus 2.13.8 includes security updates, bug<br>fixes, and enhancements. For more information, see the release notes page listed in the References section.<br>Security Fixes:<br><li> CVE-2023-1436 jettison: Uncontrolled Recursion in JSONArray [quarkus-2]</li> <li> CVE-2023-26053 gradle: usage of long IDs for PGP keys is unsafe and is subject to collision attacks [quarkus-2]</li> <li> CVE-2023-28867 graphql-java: crafted GraphQL query causes stack consumption [quarkus-2]</li> <li> CVE-2023-1584 quarkus-oidc: ID and access tokens leak via the authorization code flow [quarkus-2]</li> <li> CVE-2023-0482 RESTEasy: creation of insecure temp files [quarkus-2]</li> <li> CVE-2022-3782 keycloak: path traversal via double URL encoding [quarkus-2]</li> <li> CVE-2023-0481 io.quarkus-quarkus-parent: quarkus: insecure permissions on temp files [quarkus-2]</li> <li> CVE-2022-45787 apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider [quarkus-2]</li> For more information about the security issues, including the impact, a CVSS<br>score, acknowledgments, and other related information, see the CVE links listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.