exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2023-0544-01

Red Hat Security Advisory 2023-0544-01
Posted Jan 31, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-0544-01 - This patch, Camel for Spring Boot 3.14.5 Patch 1, serves as a replacement for the previous release of Camel for Spring Boot 3.14.5 and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References. This release of Camel for Spring Boot includes CXF artifacts that were missing from the previous 3.14.5 release. Issues addressed include a server-side request forgery vulnerability.

tags | advisory
systems | linux, redhat
advisories | CVE-2022-40149, CVE-2022-45693, CVE-2022-46363, CVE-2022-46364
SHA-256 | 489c108fec329cf77b35d28d1f85ba5d1b39602e1324910c726cb4f3b1be1bfc

Red Hat Security Advisory 2023-0544-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat Camel for Spring Boot 3.14.5 Patch 1 release and security update
Advisory ID: RHSA-2023:0544-01
Product: Red Hat Integration
Advisory URL: https://access.redhat.com/errata/RHSA-2023:0544
Issue date: 2023-01-30
CVE Names: CVE-2022-40149 CVE-2022-45693 CVE-2022-46363
CVE-2022-46364
=====================================================================

1. Summary:

A patch is now available for Camel for Spring Boot 3.14.5. The purpose of
this text-only errata is to inform you about the security issues fixed in
this release.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

This patch, Camel for Spring Boot 3.14.5 Patch 1, serves as a replacement
for the previous release of Camel for Spring Boot 3.14.5 and includes bug
fixes and enhancements, which are documented in the Release Notes document
linked in the References. This release of Camel for Spring Boot includes
CXF artifacts that were missing from the previous 3.14.5 release.

Security Fix(es):

* CXF: Apache CXF: SSRF Vulnerability (CVE-2022-46364)

* jettison: parser crash by stackoverflow (CVE-2022-40149)

* jettison: If the value in map is the map's self, the new JSONObject(map)
cause StackOverflowError which may lead to dos (CVE-2022-45693)

* CXF: Apache CXF: directory listing / code exfiltration (CVE-2022-46363)

For more details about the security issues, including the impact, CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

Installation instructions are available from the Camel for Spring Boot
3.14.5 product documentation page.

https://access.redhat.com/documentation/en-us/red_hat_integration/2023.q1/html/getting_started_with_camel_spring_boot/index

https://access.redhat.com/documentation/en-us/red_hat_integration/2023.q1/html/camel_spring_boot_reference/index

4. Bugs fixed (https://bugzilla.redhat.com/):

2135771 - CVE-2022-40149 jettison: parser crash by stackoverflow
2155681 - CVE-2022-46363 Apache CXF: directory listing / code exfiltration
2155682 - CVE-2022-46364 Apache CXF: SSRF Vulnerability
2155970 - CVE-2022-45693 jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos

5. References:

https://access.redhat.com/security/cve/CVE-2022-40149
https://access.redhat.com/security/cve/CVE-2022-45693
https://access.redhat.com/security/cve/CVE-2022-46363
https://access.redhat.com/security/cve/CVE-2022-46364
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=red.hat.integration&version=2023-Q1

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=DTJ+
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close