First published: Mon Feb 12 2024(Updated: )
A security update for 3.20.5 is now available.<br>The purpose of this text-only errata is to inform you about the security issues fixed.<br>Security Fix(es):<br><li> json-path: stack-based buffer overflow in Criteria.parse method (CVE-2023-51074)</li> A Red Hat Security Bulletin which addresses further details about the Rapid Reset flaw is available in the References section.<br>For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Integration - Camel for Spring Boot |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:0792 is classified as moderate.
To fix RHSA-2024:0792, you should upgrade to the patched version of Red Hat Integration - Camel for Spring Boot.
RHSA-2024:0792 addresses a stack-based buffer overflow in the Criteria.parse method, identified as CVE-2023-51074.
RHSA-2024:0792 affects Red Hat Integration - Camel for Spring Boot, specifically version 3.20.5.
There are no official workarounds provided for RHSA-2024:0792; the recommended action is to apply the security update.