First published: Wed Feb 28 2024(Updated: )
Migration Toolkit for Applications <br>Security Fix(es):<br><li> golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)</li> <li> jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos (CVE-2022-45693)</li> <li> apache-ivy: XML External Entity vulnerability (CVE-2022-46751)</li> <li> jettison: Uncontrolled Recursion in JSONArray (CVE-2023-1436)</li> <li> guava: insecure temporary directory creation (CVE-2023-2976)</li> <li> follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() (CVE-2023-26159)</li> <li> golang: net/<a href="http:" target="_blank">http:</a> insufficient sanitization of Host header (CVE-2023-29406)</li> <li> golang: crypto/tls: slow verification of certificate chains containing large RSA keys (CVE-2023-29409)</li> <li> jackson-databind: denial of service via cylic dependencies (CVE-2023-35116)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Red Hat Migration Toolkit for Applications |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.