-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: prometheus-jmx-exporter security update Advisory ID: RHSA-2022:9058-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:9058 Issue date: 2022-12-15 CVE Names: CVE-2022-1471 ==================================================================== 1. Summary: An update for prometheus-jmx-exporter is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 8) - noarch 3. Description: Prometheus JMX Exporter is a JMX to Prometheus exporter: a collector that can be configured to scrape and expose MBeans of a JMX target. Security Fix(es): * SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2150009 - CVE-2022-1471 SnakeYaml: Constructor Deserialization Remote Code Execution 6. Package List: Red Hat Enterprise Linux AppStream (v. 8): Source: prometheus-jmx-exporter-0.12.0-9.el8_7.src.rpm noarch: prometheus-jmx-exporter-0.12.0-9.el8_7.noarch.rpm prometheus-jmx-exporter-openjdk11-0.12.0-9.el8_7.noarch.rpm prometheus-jmx-exporter-openjdk17-0.12.0-9.el8_7.noarch.rpm prometheus-jmx-exporter-openjdk8-0.12.0-9.el8_7.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-1471 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/cve/CVE-2022-1471 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY5tMj9zjgjWX9erEAQjTGw//bKVd2x49d3FgJD/JDguo1l2702uy6jR5 +cgE1y3cjQ+v6SKfEjapda+EKQWt5xR0rrZDiBG+1PobLGx/ntx96dF7EUARv0Ld KJTn/snPG5qgkIGzQzzVtsBZp5kjCVlJeLqvnMGQrXppP8NiK8287cyJIjC0bZAl AD1sqvCefS3U5uR+hELYjQfjw7+8EWKaaqFuDCvnQfc3Z/iM2SzAGSwf/xh80i9a 4nGiDmwsO0rsLILA3flVBpVSfFvrDYTXpP5fXGrkf5heRJkH/ztvi4MuiOdHsfE+ BY//smJzdP23T7h6qacmtw8/vyqRcdOV4UfpftwhXrkka3gUG3JOwbPd3WRL1NuB tVtA1rYOYJZ1lghJ4sRuzcWzQ5L5IUakNBRZBdh2V1HElXU9ZbWGTz2f36FFEmzc tUCx/uPEvhAX/b6qOU1avoI/fUxQVAA4TVrTMKvyhBcvDMs8MBs9D7KxC3lcCCiv WIWyMRu6XhNXv6kscFqWuTqqmQ5gvHgBeS+FifjE91Ysokf7ff8ye4iXdptjAy2C tQ/STSjSZLru2zP64+6xIg8nZDIqVf1JouQvTVeomQyubmwjbOXq2msUEZWNxPnf tehQ5LRMX1YkDJaiUrDNvCMf5Jma3BeqtCt80RRiqAXLuP67e/3MBAgM5lqZjVe5 k3tBGWDyq8U=T1+4 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce