Bug 1781214 (CVE-2019-17632)
Summary: | CVE-2019-17632 jetty: generation of default unhandled error response content does not escape exception messages in stacktraces included in error output | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aboyko, aileenc, bkearney, chazlett, drieden, eclipse-sig, ggaughan, gvarsami, hhorak, janstey, java-maint, java-sig-commits, jcoleman, jjohnstn, jochrist, jorton, jwon, kconner, krathod, krzysztof.daniel, ldimaggi, mat.booth, mizdebsk, nwallace, pdrozd, pjindal, rwagner, sochotni, sthorger, tcunning, tkirby, tlestach |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | jetty 9.4.24.v20191120 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-03-30 04:31:51 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1781215 | ||
Bug Blocks: | 1781216 |
Description
Guilherme de Almeida Suckevicz
2019-12-09 14:46:15 UTC
Created jetty tracking bugs for this issue: Affects: fedora-all [bug 1781215] This vulnerability is out of security support scope for the following products: * Red Hat JBoss Fuse 6 * Red Hat JBoss Fuse Service Works 6 Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details. RHSSO don't ship Jetty at all, just adapters that can be deployed on top of Jetty hence marking RHSSO as not affected. Satellite 5.8 is currently in Maintenance Support 2 phase that means we're addressing only Critical Impact Security Advisories. Reference -- https://access.redhat.com/support/policy/updates/satellite This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-17632 |