The following advisory data is extracted from: https://access.redhat.com/security/data/csaf/v2/advisories/2024/rhsa-2024_0722.json Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment. - Packet Storm Staff ==================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat build of Quarkus 3.2.10 release and security update Advisory ID: RHSA-2024:0722-03 Product: Red Hat build of Quarkus Advisory URL: https://access.redhat.com/errata/RHSA-2024:0722 Issue date: 2024-03-18 Revision: 03 CVE Names: CVE-2023-4043 ==================================================================== Summary: An update is now available for Red Hat build of Quarkus. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For more information, see the CVE links in the References section. Description: This release of Red Hat build of Quarkus 3.2.10 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Security Fix(es): * CVE-2023-22102 mysql/mysql-connector-java: Connector/J unspecified vulnerability (CPU October 2023) [quarkus-3.2] * CVE-2023-48795 org.apache.sshd/sshd-core: ssh: Prefix truncation attack on Binary Packet Protocol (BPP) [quarkus-3.2] * CVE-2023-4043 org.eclipse.parsson/parsson: Denial of Service due to large number parsing [quarkus-3.2] Solution: https://access.redhat.com/articles/11258 CVEs: CVE-2023-4043 References: https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_build_of_quarkus/3.2/ https://access.redhat.com/articles/4966181 https://bugzilla.redhat.com/show_bug.cgi?id=2254210 https://bugzilla.redhat.com/show_bug.cgi?id=2254594 https://bugzilla.redhat.com/show_bug.cgi?id=2256474 https://issues.redhat.com/browse/QUARKUS-3791 https://issues.redhat.com/browse/QUARKUS-3851 https://issues.redhat.com/browse/QUARKUS-3938 https://issues.redhat.com/browse/QUARKUS-3939 https://issues.redhat.com/browse/QUARKUS-3940 https://issues.redhat.com/browse/QUARKUS-3941 https://issues.redhat.com/browse/QUARKUS-3942 https://issues.redhat.com/browse/QUARKUS-3943 https://issues.redhat.com/browse/QUARKUS-3944 https://issues.redhat.com/browse/QUARKUS-3945 https://issues.redhat.com/browse/QUARKUS-3946 https://issues.redhat.com/browse/QUARKUS-3947 https://issues.redhat.com/browse/QUARKUS-3948 https://issues.redhat.com/browse/QUARKUS-3949 https://issues.redhat.com/browse/QUARKUS-3950 https://issues.redhat.com/browse/QUARKUS-3951 https://issues.redhat.com/browse/QUARKUS-3952 https://issues.redhat.com/browse/QUARKUS-3953 https://issues.redhat.com/browse/QUARKUS-3954 https://issues.redhat.com/browse/QUARKUS-3955 https://issues.redhat.com/browse/QUARKUS-3956 https://issues.redhat.com/browse/QUARKUS-3957 https://issues.redhat.com/browse/QUARKUS-3958 https://issues.redhat.com/browse/QUARKUS-3959 https://issues.redhat.com/browse/QUARKUS-3960 https://issues.redhat.com/browse/QUARKUS-3961 https://issues.redhat.com/browse/QUARKUS-3963 https://issues.redhat.com/browse/QUARKUS-3964