Issued:
2024-02-28
Updated:
2024-02-28

RHSA-2024:1027 - Moderate: Migration Toolkit for Applications security update


Synopsis

Moderate: Migration Toolkit for Applications security update

Type/Severity

Security Advisory Moderate

Topic

An update is now available for MTA-6.2-RHEL-8 and MTA-6.2-RHEL-9.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Migration Toolkit for Applications

Security Fix(es):

  • golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)

  • jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos (CVE-2022-45693)

  • apache-ivy: XML External Entity vulnerability (CVE-2022-46751)

  • jettison: Uncontrolled Recursion in JSONArray (CVE-2023-1436)

  • guava: insecure temporary directory creation (CVE-2023-2976)

  • follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() (CVE-2023-26159)

  • golang: net/http: insufficient sanitization of Host header (CVE-2023-29406)

  • golang: crypto/tls: slow verification of certificate chains containing large RSA keys (CVE-2023-29409)

  • jackson-databind: denial of service via cylic dependencies (CVE-2023-35116)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

ProductVersionArch
Red Hat Migration Toolkit for ApplicationsContainer Advisoriesx86_64

Fixes

CVEs

References


Additional information