[RHSA-2023:0661-01] Critical: Red Hat Fuse 7.11.1.P1 security update for Fuse on EAP

Security announcements for all Red Hat products and services. rhsa-announce at redhat.com
Wed Feb 8 15:25:49 UTC 2023


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Critical: Red Hat Fuse 7.11.1.P1 security update for Fuse on EAP
Advisory ID:       RHSA-2023:0661-01
Product:           Red Hat JBoss Fuse
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:0661
Issue date:        2023-02-08
CVE Names:         CVE-2022-36437 
=====================================================================

1. Summary:

A security update for Fuse 7.11.1 is now available for Red Hat Fuse on EAP.
The purpose of this text-only errata is to inform you about the security
issues fixed in this release.

Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

This asynchronous update (7.11.1.P1) patches Red Hat Fuse 7.11.1 on EAP and
includes the following security fix, which is documented in the Release
Notes document linked to in the References.

Security Fix(es):

* hazelcast: Hazelcast connection caching (CVE-2022-36437)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.

Installation instructions are available from the Fuse 7.11 product
documentation page:
https://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/

4. Bugs fixed (https://bugzilla.redhat.com/):

2162053 - CVE-2022-36437 hazelcast: Hazelcast connection caching

5. References:

https://access.redhat.com/security/cve/CVE-2022-36437
https://access.redhat.com/security/updates/classification/#critical
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse&downloadType=securityPatches&version=7.11.1

6. Contact:

The Red Hat security contact is <secalert at redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=D4Tr
-----END PGP SIGNATURE-----


More information about the RHSA-announce mailing list