- 発行日:
- 2024-02-28
- 更新日:
- 2024-02-28
RHSA-2024:1027 - Security Advisory
概要
Moderate: Migration Toolkit for Applications security update
タイプ/重大度
Security Advisory: Moderate
トピック
An update is now available for MTA-6.2-RHEL-8 and MTA-6.2-RHEL-9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
説明
Migration Toolkit for Applications
Security Fix(es):
- golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)
- jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos (CVE-2022-45693)
- apache-ivy: XML External Entity vulnerability (CVE-2022-46751)
- jettison: Uncontrolled Recursion in JSONArray (CVE-2023-1436)
- guava: insecure temporary directory creation (CVE-2023-2976)
- follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() (CVE-2023-26159)
- golang: net/http: insufficient sanitization of Host header (CVE-2023-29406)
- golang: crypto/tls: slow verification of certificate chains containing large RSA keys (CVE-2023-29409)
- jackson-databind: denial of service via cylic dependencies (CVE-2023-35116)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
解決策
For details on how to apply this update, which includes the changes described in this advisory, refer to:
影響を受ける製品
- Red Hat Migration Toolkit for Applications Container Advisories x86_64
修正
- BZ - 2107376 - CVE-2022-1962 golang: go/parser: stack exhaustion in all Parse* functions
- BZ - 2155970 - CVE-2022-45693 jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
- BZ - 2182788 - CVE-2023-1436 jettison: Uncontrolled Recursion in JSONArray
- BZ - 2215214 - CVE-2023-35116 jackson-databind: denial of service via cylic dependencies
- BZ - 2215229 - CVE-2023-2976 guava: insecure temporary directory creation
- BZ - 2222167 - CVE-2023-29406 golang: net/http: insufficient sanitization of Host header
- BZ - 2228743 - CVE-2023-29409 golang: crypto/tls: slow verification of certificate chains containing large RSA keys
- BZ - 2233112 - CVE-2022-46751 apache-ivy: XML External Entity vulnerability
- BZ - 2256413 - CVE-2023-26159 follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()
- MTA-87 - CVE-2022-45693 org.keycloak-keycloak-parent: jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos [mta-6]
CVE
- CVE-2007-4559
- CVE-2021-3468
- CVE-2021-3502
- CVE-2021-35937
- CVE-2021-35938
- CVE-2021-35939
- CVE-2021-43618
- CVE-2022-1962
- CVE-2022-24963
- CVE-2022-44638
- CVE-2022-45693
- CVE-2022-46751
- CVE-2023-1436
- CVE-2023-1981
- CVE-2023-2731
- CVE-2023-2976
- CVE-2023-3138
- CVE-2023-3316
- CVE-2023-3576
- CVE-2023-4016
- CVE-2023-4641
- CVE-2023-5363
- CVE-2023-5557
- CVE-2023-5981
- CVE-2023-6135
- CVE-2023-7104
- CVE-2023-22745
- CVE-2023-26159
- CVE-2023-26965
- CVE-2023-26966
- CVE-2023-27043
- CVE-2023-28100
- CVE-2023-28101
- CVE-2023-29406
- CVE-2023-29409
- CVE-2023-29491
- CVE-2023-29499
- CVE-2023-31486
- CVE-2023-32324
- CVE-2023-32611
- CVE-2023-32665
- CVE-2023-34241
- CVE-2023-35116
- CVE-2023-36054
- CVE-2023-38545
- CVE-2023-38546
- CVE-2023-39615
- CVE-2023-39975
- CVE-2023-42917
- CVE-2023-44487
- CVE-2024-0553
- CVE-2024-0567
- CVE-2024-20918
- CVE-2024-20919
- CVE-2024-20921
- CVE-2024-20926
- CVE-2024-20945
- CVE-2024-20952
x86_64
| mta/mta-hub-rhel9@sha256:b232b42b2de4be2d7c67ef2418070b155b79a275e2cbba343a04c22c1e016662 |
| mta/mta-operator-bundle@sha256:d142049160f51b71f1c9d970e23824952ca35e7c2e23d6c8753a33e727b87b81 |
| mta/mta-pathfinder-rhel9@sha256:781aef6a3a23c765a31e38a36ebc4c40957249888532f46a77d320f416816508 |
| mta/mta-rhel8-operator@sha256:e1e6f80467054b95379c1b482800a656917e1cfd35d8fac2d4f6ff4091088a67 |
| mta/mta-ui-rhel9@sha256:2e10de6bd9bb24a03579f555b71e6ff57f2c9d74cf3b79ec42e9dba4cab628a1 |
| mta/mta-windup-addon-rhel9@sha256:73671e9d3c4bf624d1a6745c5002b93b158519abf6b13c7bb0e1491d873316fc |
Red Hat のセキュリティーに関する連絡先は secalert@redhat.com です。 連絡先の詳細は https://access.redhat.com/security/team/contact/ をご覧ください。