what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2022-4932-01

Red Hat Security Advisory 2022-4932-01
Posted Jun 8, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-4932-01 - This release of Red Hat Fuse 7.10.1 serves as a replacement for Red Hat Fuse 7.10 and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-22573
SHA-256 | 177a7e61e511b99231263b6335e7c4dc6947c76a3c9bcd04e7413e227f36803e

Red Hat Security Advisory 2022-4932-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat Fuse 7.10.2.P1 security update
Advisory ID: RHSA-2022:4932-01
Product: Red Hat JBoss Fuse
Advisory URL: https://access.redhat.com/errata/RHSA-2022:4932
Issue date: 2022-06-07
CVE Names: CVE-2021-22573
====================================================================
1. Summary:

A patch update (from 7.10.2 to 7.10.2.P1) is now available for Red Hat on
OpenShift for EAP, Karaf, and Spring Boot. The purpose of this text-only
errata is to inform you about the security issues fixed in this release.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

This release of Red Hat Fuse 7.10.1 serves as a replacement for Red Hat
Fuse 7.10 and includes bug fixes and enhancements, which are documented in
the Release Notes document linked in the References.

Security Fix(es):

* google-oauth-client: Token signature not verified [fuse-7]
(CVE-2021-22573)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.

Installation instructions are available from the Fuse 7.10 product
documentation page:
https://access.redhat.com/documentation/en-us/red_hat_fuse/7.10/

4. Bugs fixed (https://bugzilla.redhat.com/):

2081879 - CVE-2021-22573 google-oauth-client: Token signature not verified

5. References:

https://access.redhat.com/security/cve/CVE-2021-22573
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=jboss.fuse&version=7.10.2.P1

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYp9nUdzjgjWX9erEAQiNiBAAo4gtwYg3sju8sO7QX31IM928M0cM3QU3
Gj2l2kharF/WicDpc2xW9GZOJ09Z1D4F+UI9zqketdXQsS4Fbq9Rz0n0mQ8rDDvO
xf02g3aXZWM1uItkzjjtQxGvd/vaQH/djRkBc3hO+ez9iBuE5sUHrUmAQ/aTE5Nq
YzJ6XrO9QCxWpmwjnyC/kNs5Yds6DE27vxEHUqx8iDU9EUsybcZNbE45RMoHLx+m
GyUiysRV0jCfRVggNt4GEqfjCOQJ/a3+ftWypW/oW42oOUarr8V1G/menlQLOWFO
KmjcI+ISjvxQ51e+HVS50jHNgJPnxdrKb9ibiNSmUeYGPrjgRmNMOcUbUStCGj4o
XZEB3mxsBZVQLKueygPIclnOiaitAVrJq+68ajS+V8at+XxA4U+2xZDieOxwAG6o
7HzTOLfuPHgssIDV2Qp0EixCw1rc/KIibCj1FN5y6FEvVzzlZzujXYTI/DybF6wQ
ZgX4IYXCYDB+Il88L6l3MZR9e/n7JS8RBJKRlJgjudURX8L2/mjS1b1ZY99Lj8K0
lIP0IwDGobNwZnYk7pZ5Dvr8bKjni+yragiMZgezratObVySDzUIsHkhUrKTwk1M
oK67Kc145gMbtEwHV3SV00fIHMBq4xumNBMpsI8SIIJsrZd+QSqI9xIV52c51pLb
28ICGYY235k=bKHz
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    0 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    0 Files
  • 6
    Sep 6th
    0 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close