[RHSA-2023:0544-01] Important: Red Hat Camel for Spring Boot 3.14.5 Patch 1 release and security update

Security announcements for all Red Hat products and services. rhsa-announce at redhat.com
Mon Jan 30 22:34:26 UTC 2023


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat Camel for Spring Boot 3.14.5 Patch 1 release and security update
Advisory ID:       RHSA-2023:0544-01
Product:           Red Hat Integration
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:0544
Issue date:        2023-01-30
CVE Names:         CVE-2022-40149 CVE-2022-45693 CVE-2022-46363 
                   CVE-2022-46364 
=====================================================================

1. Summary:

A patch is now available for Camel for Spring Boot 3.14.5. The purpose of
this text-only errata is to inform you about the security issues fixed in
this release.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

This patch, Camel for Spring Boot 3.14.5 Patch 1, serves as a replacement
for the previous release of Camel for Spring Boot 3.14.5 and includes bug
fixes and enhancements, which are documented in the Release Notes document
linked in the References. This release of Camel for Spring Boot includes
CXF artifacts that were missing from the previous 3.14.5 release.

Security Fix(es):

* CXF: Apache CXF: SSRF Vulnerability (CVE-2022-46364)

* jettison: parser crash by stackoverflow (CVE-2022-40149)

* jettison: If the value in map is the map's self, the new JSONObject(map)
cause StackOverflowError which may lead to dos (CVE-2022-45693)

* CXF: Apache CXF: directory listing / code exfiltration (CVE-2022-46363)

For more details about the security issues, including the impact, CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

Installation instructions are available from the Camel for Spring Boot
3.14.5 product documentation page.

https://access.redhat.com/documentation/en-us/red_hat_integration/2023.q1/html/getting_started_with_camel_spring_boot/index

https://access.redhat.com/documentation/en-us/red_hat_integration/2023.q1/html/camel_spring_boot_reference/index

4. Bugs fixed (https://bugzilla.redhat.com/):

2135771 - CVE-2022-40149 jettison: parser crash by stackoverflow
2155681 - CVE-2022-46363 Apache CXF: directory listing / code exfiltration
2155682 - CVE-2022-46364 Apache CXF: SSRF Vulnerability
2155970 - CVE-2022-45693 jettison:  If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos

5. References:

https://access.redhat.com/security/cve/CVE-2022-40149
https://access.redhat.com/security/cve/CVE-2022-45693
https://access.redhat.com/security/cve/CVE-2022-46363
https://access.redhat.com/security/cve/CVE-2022-46364
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=red.hat.integration&version=2023-Q1

6. Contact:

The Red Hat security contact is <secalert at redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=DTJ+
-----END PGP SIGNATURE-----


More information about the RHSA-announce mailing list