Issued:
2024-06-20
Updated:
2024-06-20

RHSA-2024:3989 - Important: Migration Toolkit for Applications security and bug fix update


Synopsis

Important: Migration Toolkit for Applications security and bug fix update

Type/Severity

Security Advisory Important

Topic

Migration Toolkit for Applications 6.2.3 release

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Migration Toolkit for Applications 6.2.3 Images

Security Fix(es) from Bugzilla:

  • keycloak: path transversal in redirection validation (CVE-2024-1132)

  • webpack-dev-middleware: lack of URL validation may lead to file leak (CVE-2024-29180)

  • axios: exposure of confidential data stored in cookies (CVE-2023-45857)

  • css-tools: Improper Input Validation causes Denial of Service via Regular Expression (CVE-2023-26364)

  • css-tools: regular expression denial of service (ReDoS) when parsing CSS (CVE-2023-48631)

  • follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse() (CVE-2023-26159)

  • io.vertx/vertx-core: memory leak due to the use of Netty FastThreadLocal data structures in Vertx (CVE-2024-1023)

  • io.vertx:vertx-core: memory leak when a TCP server is configured with TLS and SNI support (CVE-2024-1300)

  • commons-compress: Denial of service caused by an infinite loop for a corrupted DUMP file (CVE-2024-25710)

  • commons-compress: OutOfMemoryError unpacking broken Pack200 file (CVE-2024-26308)

  • follow-redirects: Possible credential leak (CVE-2024-28849)

  • jetty: Improper addition of quotation marks to user inputs in CgiServlet (CVE-2023-36479)

  • commons-configuration: StackOverflowError calling ListDelimiterHandler.flatten(Object, int) with a cyclical object tree (CVE-2024-29133)

  • commons-configuration: StackOverflowError adding property in AbstractListDelimiterHandler.flattenIterator() (CVE-2024-29131)

Solution

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

ProductVersionArch
Red Hat Migration Toolkit for ApplicationsContainer Advisoriesx86_64

Fixes

CVEs

References


Additional information