https://bugzilla.redhat.com/show_bug.cgi?id=2170627
Bug ID: 2170627
Summary: CVE-2022-41966 xstream: Denial of Service by injecting
recursive collections or maps based on element's hash
values raising a stack overflow [epel-all]
Product: Fedora EPEL
Version: epel8
Status: NEW
Component: xstream
Keywords: Security, SecurityTracking
Severity: high
Priority: high
Assignee: fedoraproject.org(a)bluhm-de.com
Reporter: askrabec(a)redhat.com
QA Contact: extras-qa(a)fedoraproject.org
CC: didiksupriadi41(a)gmail.com,
fedoraproject.org(a)bluhm-de.com,
java-sig-commits(a)lists.fedoraproject.org,
lkundrak(a)v3.sk, mizdebsk(a)redhat.com
Target Milestone: ---
Classification: Fedora
More information about this security flaw is available in the following bug:
http://bugzilla.redhat.com/show_bug.cgi?id=2170431
Disclaimer: Community trackers are created by Red Hat Product Security team on
a best effort basis. Package maintainers are required to ascertain if the flaw
indeed affects their package, before starting the update process.
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugzilla.redhat.com/show_bug.cgi?id=2170627