exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2022-8957-01

Red Hat Security Advisory 2022-8957-01
Posted Dec 13, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-8957-01 - This release of Red Hat build of Quarkus 2.7.6.SP3 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Issues addressed include a deserialization vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2022-4116, CVE-2022-4147, CVE-2022-45047
SHA-256 | 1d7b3776854eea648f6ee0a551cc3a26fa11a5ba5adbe93d1bb9b0b1c72a9738

Red Hat Security Advisory 2022-8957-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat build of Quarkus Platform 2.7.6.SP3 and security update
Advisory ID: RHSA-2022:8957-01
Product: Red Hat build of Quarkus
Advisory URL: https://access.redhat.com/errata/RHSA-2022:8957
Issue date: 2022-12-13
CVE Names: CVE-2022-4116 CVE-2022-4147 CVE-2022-45047
====================================================================
1. Summary:

An update is now available for Red Hat build of Quarkus Platform. Red Hat
Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability. For
more information, see the CVE links in the References section.

2. Description:

This release of Red Hat build of Quarkus 2.7.6.SP3 includes security
updates, bug fixes, and enhancements. For more information, see the release
notes page listed in the References section.

Security Fix(es):

* CVE-2022-4147 quarkus-vertx-http: Security misconfiguration of CORS :
OWASP A05_2021 level in Quarkus

* CVE-2022-4116 quarkus_dev_ui: Dev UI Config Editor is vulnerable to
drive-by localhost attacks leading to RCE

* CVE-2022-45047 mina-sshd: Java unsafe deserialization vulnerability

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s)
listed in the References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2144748 - CVE-2022-4116 quarkus_dev_ui: Dev UI Config Editor is vulnerable to drive-by localhost attacks leading to RCE
2145194 - CVE-2022-45047 mina-sshd: Java unsafe deserialization vulnerability
2148867 - CVE-2022-4147 quarkus-vertx-http: Security misconfiguration of CORS : OWASP A05_2021 level in Quarkus

5. References:

https://access.redhat.com/security/cve/CVE-2022-4116
https://access.redhat.com/security/cve/CVE-2022-4147
https://access.redhat.com/security/cve/CVE-2022-45047
https://access.redhat.com/articles/4966181
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=redhat.quarkus&version=2.7.6.SP3
https://access.redhat.com/documentation/en-us/red_hat_build_of_quarkus/2.7
https://bugzilla.redhat.com/show_bug.cgi?id!48867
https://bugzilla.redhat.com/show_bug.cgi?id!44748
https://bugzilla.redhat.com/show_bug.cgi?id!45194
https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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xC3s
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close