what you don't know can hurt you

Red Hat Security Advisory 2022-0082-01

Red Hat Security Advisory 2022-0082-01
Posted Jan 12, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-0082-01 - Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services. This release of Red Hat Process Automation Manager 7.11.1 serves as an update to Red Hat Process Automation Manager 7.11.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include a code execution vulnerability.

tags | advisory, code execution
systems | linux, redhat
advisories | CVE-2021-44228
MD5 | 8cbe2d84f9014387e27a49c31a261bf7

Red Hat Security Advisory 2022-0082-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Critical: Red Hat Process Automation Manager 7.11.1 security update
Advisory ID: RHSA-2022:0082-01
Product: Red Hat Process Automation Manager
Advisory URL: https://access.redhat.com/errata/RHSA-2022:0082
Issue date: 2022-01-11
CVE Names: CVE-2021-44228
====================================================================
1. Summary:

An update is now available for Red Hat Process Automation Manager.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat Process Automation Manager is an open source business process
management suite that combines process management and decision service
management and enables business and IT users to create, manage, validate,
and deploy process applications and decision services.

This release of Red Hat Process Automation Manager 7.11.1 serves as an
update to Red Hat Process Automation Manager 7.11.0, and includes bug fixes
and enhancements, which are documented in the Release Notes document linked
to in the References.

Security Fix(es):

* log4j-core: Remote code execution in Log4j 2.x when logs contain an
attacker-controlled string value (CVE-2021-44228)

3. Solution:

For on-premise installations, before applying the update, back up your
existing installation, including all applications, configuration files,
databases and database settings, and so on.

It is recommended to halt the server by stopping the JBoss Application
Server process before installing this update; after installing the update,
restart the server by starting the JBoss Application Server process.

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (https://bugzilla.redhat.com/):

2030932 - CVE-2021-44228 log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value

5. References:

https://access.redhat.com/security/cve/CVE-2021-44228
https://access.redhat.com/security/updates/classification/#critical

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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/NnU
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

January 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    0 Files
  • 3
    Jan 3rd
    20 Files
  • 4
    Jan 4th
    4 Files
  • 5
    Jan 5th
    37 Files
  • 6
    Jan 6th
    20 Files
  • 7
    Jan 7th
    4 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    0 Files
  • 10
    Jan 10th
    18 Files
  • 11
    Jan 11th
    8 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    31 Files
  • 14
    Jan 14th
    2 Files
  • 15
    Jan 15th
    2 Files
  • 16
    Jan 16th
    2 Files
  • 17
    Jan 17th
    18 Files
  • 18
    Jan 18th
    13 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    29 Files
  • 21
    Jan 21st
    12 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    17 Files
  • 25
    Jan 25th
    34 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close