-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: Red Hat Integration Camel K 1.10.1 release security update
Advisory ID:       RHSA-2023:3906-01
Product:           Red Hat Integration
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:3906
Issue date:        2023-06-28
CVE Names:         CVE-2022-4244 CVE-2022-4245 CVE-2022-39368 
                   CVE-2022-41946 CVE-2022-46363 CVE-2023-1370 
====================================================================
1. Summary:

Red Hat Integration Camel K 1.10.1 release and security update is now
available. The purpose of this text-only errata is to inform you about the
security issues fixed. Red Hat Product Security has rated this update as
having an impact of Important.

2. Description:

A security update for Camel K 1.10.1 is now available.

The purpose of this text-only errata is to inform you about the security
issues fixed with this release.

* json-smart: Uncontrolled Resource Consumption vulnerability in json-smart
(Resource Exhaustion)(CVE-2023-1370)

* codehaus-plexus: Directory Traversal (CVE-2022-4244)

* codehaus-plexus: XML External Entity (XXE) Injection (CVE-2022-4245)

* scandium: Failing DTLS handshakes may cause throttling to block
processing of records (CVE-2022-39368)

* jdbc-postgresql: postgresql-jdbc: Information leak of prepared statement
data due to insecure temporary file permissions (CVE-2022-41946)

* Apache CXF: directory listing / code exfiltration (CVE-2022-46363)

A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2145205 - CVE-2022-39368 scandium: Failing DTLS handshakes may cause throttling to block processing of records
2149841 - CVE-2022-4244 codehaus-plexus: Directory Traversal
2149843 - CVE-2022-4245 codehaus-plexus: XML External Entity (XXE) Injection
2153399 - CVE-2022-41946 postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions
2155681 - CVE-2022-46363 Apache CXF: directory listing / code exfiltration
2188542 - CVE-2023-1370 json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)

5. References:

https://access.redhat.com/security/cve/CVE-2022-4244
https://access.redhat.com/security/cve/CVE-2022-4245
https://access.redhat.com/security/cve/CVE-2022-39368
https://access.redhat.com/security/cve/CVE-2022-41946
https://access.redhat.com/security/cve/CVE-2022-46363
https://access.redhat.com/security/cve/CVE-2023-1370
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=red.hat.integration&version=2023-Q2

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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1Kio
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-3906:01 Important: Red Hat Integration Camel K 1.10.1

Red Hat Integration Camel K 1.10.1 release and security update is now available

Summary

A security update for Camel K 1.10.1 is now available.
The purpose of this text-only errata is to inform you about the security issues fixed with this release.
* json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)(CVE-2023-1370)
* codehaus-plexus: Directory Traversal (CVE-2022-4244)
* codehaus-plexus: XML External Entity (XXE) Injection (CVE-2022-4245)
* scandium: Failing DTLS handshakes may cause throttling to block processing of records (CVE-2022-39368)
* jdbc-postgresql: postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions (CVE-2022-41946)
* Apache CXF: directory listing / code exfiltration (CVE-2022-46363)
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.



Summary


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2022-4244 https://access.redhat.com/security/cve/CVE-2022-4245 https://access.redhat.com/security/cve/CVE-2022-39368 https://access.redhat.com/security/cve/CVE-2022-41946 https://access.redhat.com/security/cve/CVE-2022-46363 https://access.redhat.com/security/cve/CVE-2023-1370 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=red.hat.integration&version=2023-Q2

Package List


Severity
Advisory ID: RHSA-2023:3906-01
Product: Red Hat Integration
Advisory URL: https://access.redhat.com/errata/RHSA-2023:3906
Issued Date: : 2023-06-28
CVE Names: CVE-2022-4244 CVE-2022-4245 CVE-2022-39368 CVE-2022-41946 CVE-2022-46363 CVE-2023-1370

Topic

Red Hat Integration Camel K 1.10.1 release and security update is nowavailable. The purpose of this text-only errata is to inform you about thesecurity issues fixed. Red Hat Product Security has rated this update ashaving an impact of Important.


Topic


 

Relevant Releases Architectures


Bugs Fixed

2145205 - CVE-2022-39368 scandium: Failing DTLS handshakes may cause throttling to block processing of records

2149841 - CVE-2022-4244 codehaus-plexus: Directory Traversal

2149843 - CVE-2022-4245 codehaus-plexus: XML External Entity (XXE) Injection

2153399 - CVE-2022-41946 postgresql-jdbc: Information leak of prepared statement data due to insecure temporary file permissions

2155681 - CVE-2022-46363 Apache CXF: directory listing / code exfiltration

2188542 - CVE-2023-1370 json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion)


Related News