-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat Camel for Spring Boot 3.14.5 Patch 1 release and security update Advisory ID: RHSA-2023:0544-01 Product: Red Hat Integration Advisory URL: https://access.redhat.com/errata/RHSA-2023:0544 Issue date: 2023-01-30 CVE Names: CVE-2022-40149 CVE-2022-45693 CVE-2022-46363 CVE-2022-46364 ===================================================================== 1. Summary: A patch is now available for Camel for Spring Boot 3.14.5. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: This patch, Camel for Spring Boot 3.14.5 Patch 1, serves as a replacement for the previous release of Camel for Spring Boot 3.14.5 and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References. This release of Camel for Spring Boot includes CXF artifacts that were missing from the previous 3.14.5 release. Security Fix(es): * CXF: Apache CXF: SSRF Vulnerability (CVE-2022-46364) * jettison: parser crash by stackoverflow (CVE-2022-40149) * jettison: If the value in map is the map's self, the new JSONObject(map) cause StackOverflowError which may lead to dos (CVE-2022-45693) * CXF: Apache CXF: directory listing / code exfiltration (CVE-2022-46363) For more details about the security issues, including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Installation instructions are available from the Camel for Spring Boot 3.14.5 product documentation page. https://access.redhat.com/documentation/en-us/red_hat_integration/2023.q1/html/getting_started_with_camel_spring_boot/index https://access.redhat.com/documentation/en-us/red_hat_integration/2023.q1/html/camel_spring_boot_reference/index 4. Bugs fixed (https://bugzilla.redhat.com/): 2135771 - CVE-2022-40149 jettison: parser crash by stackoverflow 2155681 - CVE-2022-46363 Apache CXF: directory listing / code exfiltration 2155682 - CVE-2022-46364 Apache CXF: SSRF Vulnerability 2155970 - CVE-2022-45693 jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos 5. References: https://access.redhat.com/security/cve/CVE-2022-40149 https://access.redhat.com/security/cve/CVE-2022-45693 https://access.redhat.com/security/cve/CVE-2022-46363 https://access.redhat.com/security/cve/CVE-2022-46364 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=red.hat.integration&version=2023-Q1 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY9hF8tzjgjWX9erEAQg6Ow//XgCSLfM8dQqfsbHhU4NcNetCycbg1dX6 VH5C6P/anmXj4k42FLXVgxm4sFQNh4L77L/aDjmjybywIKh5Z17KqTYE52vZa/qZ ETAZcseICxDwlacorAlX3EcGkvKAxIWxyuH9hzTCHCyJ/cepQncGTCmt/Q08mncH 3151bPWJERSgvbjDXknrC5hnpes7RVmLbcgYdJltspw90+RUVcTsWEfv3LaYSk4A sZYW8PoD1P0oPPr5lxgYwvl71SxpiFD7s64dM0+QhGpzZ3713MwTq0VzJOaR//pS vq4sh+4wkc+uEFBpMJD7Pwii0WaMHZP0C3/q53MibKFEny9TNvnJErbVEKKSVG0R 0jM3yeoA2fPrnNheWSOGdjm5WSVVh8QdAUqSXUJWN5rF17DPH5ACiRKP5/DR9Buf IV+QXzBHo2lEz2sKcUzE1ghHoIbi/YHa2bJsAKY1D9Lrd2spinal8zLvmKkhVUnY +C7+szPaLn8Ipti2cCb/k4LJsxzaaRVByIKcpilVnEO13n7QcX8wUY53Lkd77c8H 5otQCGxEdpqNQyBgIvnrHrGy+WfDlEjjbfkx4/5sOZGDCVWAx29gkU9I2d+KHOHY NjErWnwzAu8TlXIZ5hfiD5ovKtVqIjxl41ZgdN21Xp99JjLr91wYy0PFGPZe2xhC LT0Xsd/gjF8= =DTJ+ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce