-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat Integration Camel for Spring Boot 3.18.3.2 release and security update
Advisory ID:       RHSA-2023:5147-01
Product:           Red Hat Integration
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:5147
Issue date:        2023-09-13
CVE Names:         CVE-2021-46877 CVE-2023-20873 CVE-2023-33201 
                   CVE-2023-34455 
=====================================================================

1. Summary:

Red Hat Integration Camel for Spring Boot 3.18.3.2 release and security
update is now available. The purpose of this text-only errata is to inform
you about the security issues fixed in this release.

Red Hat Product Security has rated this update as having an impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

A security update for Camel for Spring Boot 3.18.3.2 is now available. The
purpose of this text-only errata is to inform you about the security issues
fixed in this release.

* spring-boot: Security Bypass With Wildcard Pattern Matching on Cloud
Foundry (CVE-2023-20873)

* jackson-databind: Possible DoS if using JDK serialization to serialize
JsonNode (CVE-2021-46877)

* bouncycastle: potential blind LDAP injection attack using a self-signed
certificate (CVE-2023-33201)

* snappy-java: Unchecked chunk length leads to DoS (CVE-2023-34455)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2185707 - CVE-2021-46877 jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
2215445 - CVE-2023-34455 snappy-java: Unchecked chunk length leads to DoS
2215465 - CVE-2023-33201 bouncycastle: potential  blind LDAP injection attack using a self-signed certificate
2231491 - CVE-2023-20873 spring-boot: Security Bypass With Wildcard Pattern Matching on Cloud Foundry

5. References:

https://access.redhat.com/security/cve/CVE-2021-46877
https://access.redhat.com/security/cve/CVE-2023-20873
https://access.redhat.com/security/cve/CVE-2023-33201
https://access.redhat.com/security/cve/CVE-2023-34455
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=red.hat.integration&version=2023-Q3
https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=HZ7/
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-5147:01 Important: Red Hat Integration Camel for Spring

Red Hat Integration Camel for Spring Boot 3.18.3.2 release and security update is now available

Summary

A security update for Camel for Spring Boot 3.18.3.2 is now available. The purpose of this text-only errata is to inform you about the security issues fixed in this release.
* spring-boot: Security Bypass With Wildcard Pattern Matching on Cloud Foundry (CVE-2023-20873)
* jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode (CVE-2021-46877)
* bouncycastle: potential blind LDAP injection attack using a self-signed certificate (CVE-2023-33201)
* snappy-java: Unchecked chunk length leads to DoS (CVE-2023-34455)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to: https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2021-46877 https://access.redhat.com/security/cve/CVE-2023-20873 https://access.redhat.com/security/cve/CVE-2023-33201 https://access.redhat.com/security/cve/CVE-2023-34455 https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=red.hat.integration&version=2023-Q3 https://access.redhat.com/security/updates/classification/#important

Package List


Severity
Advisory ID: RHSA-2023:5147-01
Product: Red Hat Integration
Advisory URL: https://access.redhat.com/errata/RHSA-2023:5147
Issued Date: : 2023-09-13
CVE Names: CVE-2021-46877 CVE-2023-20873 CVE-2023-33201 CVE-2023-34455

Topic

Red Hat Integration Camel for Spring Boot 3.18.3.2 release and securityupdate is now available. The purpose of this text-only errata is to informyou about the security issues fixed in this release.Red Hat Product Security has rated this update as having an impact ofImportant. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

2185707 - CVE-2021-46877 jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode

2215445 - CVE-2023-34455 snappy-java: Unchecked chunk length leads to DoS

2215465 - CVE-2023-33201 bouncycastle: potential blind LDAP injection attack using a self-signed certificate

2231491 - CVE-2023-20873 spring-boot: Security Bypass With Wildcard Pattern Matching on Cloud Foundry


Related News