exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2022-4932-01

Red Hat Security Advisory 2022-4932-01
Posted Jun 8, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-4932-01 - This release of Red Hat Fuse 7.10.1 serves as a replacement for Red Hat Fuse 7.10 and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-22573
SHA-256 | 177a7e61e511b99231263b6335e7c4dc6947c76a3c9bcd04e7413e227f36803e

Red Hat Security Advisory 2022-4932-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat Fuse 7.10.2.P1 security update
Advisory ID: RHSA-2022:4932-01
Product: Red Hat JBoss Fuse
Advisory URL: https://access.redhat.com/errata/RHSA-2022:4932
Issue date: 2022-06-07
CVE Names: CVE-2021-22573
====================================================================
1. Summary:

A patch update (from 7.10.2 to 7.10.2.P1) is now available for Red Hat on
OpenShift for EAP, Karaf, and Spring Boot. The purpose of this text-only
errata is to inform you about the security issues fixed in this release.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

This release of Red Hat Fuse 7.10.1 serves as a replacement for Red Hat
Fuse 7.10 and includes bug fixes and enhancements, which are documented in
the Release Notes document linked in the References.

Security Fix(es):

* google-oauth-client: Token signature not verified [fuse-7]
(CVE-2021-22573)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.

Installation instructions are available from the Fuse 7.10 product
documentation page:
https://access.redhat.com/documentation/en-us/red_hat_fuse/7.10/

4. Bugs fixed (https://bugzilla.redhat.com/):

2081879 - CVE-2021-22573 google-oauth-client: Token signature not verified

5. References:

https://access.redhat.com/security/cve/CVE-2021-22573
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=jboss.fuse&version=7.10.2.P1

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYp9nUdzjgjWX9erEAQiNiBAAo4gtwYg3sju8sO7QX31IM928M0cM3QU3
Gj2l2kharF/WicDpc2xW9GZOJ09Z1D4F+UI9zqketdXQsS4Fbq9Rz0n0mQ8rDDvO
xf02g3aXZWM1uItkzjjtQxGvd/vaQH/djRkBc3hO+ez9iBuE5sUHrUmAQ/aTE5Nq
YzJ6XrO9QCxWpmwjnyC/kNs5Yds6DE27vxEHUqx8iDU9EUsybcZNbE45RMoHLx+m
GyUiysRV0jCfRVggNt4GEqfjCOQJ/a3+ftWypW/oW42oOUarr8V1G/menlQLOWFO
KmjcI+ISjvxQ51e+HVS50jHNgJPnxdrKb9ibiNSmUeYGPrjgRmNMOcUbUStCGj4o
XZEB3mxsBZVQLKueygPIclnOiaitAVrJq+68ajS+V8at+XxA4U+2xZDieOxwAG6o
7HzTOLfuPHgssIDV2Qp0EixCw1rc/KIibCj1FN5y6FEvVzzlZzujXYTI/DybF6wQ
ZgX4IYXCYDB+Il88L6l3MZR9e/n7JS8RBJKRlJgjudURX8L2/mjS1b1ZY99Lj8K0
lIP0IwDGobNwZnYk7pZ5Dvr8bKjni+yragiMZgezratObVySDzUIsHkhUrKTwk1M
oK67Kc145gMbtEwHV3SV00fIHMBq4xumNBMpsI8SIIJsrZd+QSqI9xIV52c51pLb
28ICGYY235k=bKHz
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close