Red Hat 8889 Published by

A Red Hat Camel for Spring Boot 3.14.5 Patch 1 release and security update has been released.



RHSA-2023:0544-01: Important: Red Hat Camel for Spring Boot 3.14.5 Patch 1 release and security update



=====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat Camel for Spring Boot 3.14.5 Patch 1 release and security update
Advisory ID: RHSA-2023:0544-01
Product: Red Hat Integration
Advisory URL:   https://access.redhat.com/errata/RHSA-2023:0544
Issue date: 2023-01-30
CVE Names: CVE-2022-40149 CVE-2022-45693 CVE-2022-46363
CVE-2022-46364
=====================================================================

1. Summary:

A patch is now available for Camel for Spring Boot 3.14.5. The purpose of
this text-only errata is to inform you about the security issues fixed in
this release.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

This patch, Camel for Spring Boot 3.14.5 Patch 1, serves as a replacement
for the previous release of Camel for Spring Boot 3.14.5 and includes bug
fixes and enhancements, which are documented in the Release Notes document
linked in the References. This release of Camel for Spring Boot includes
CXF artifacts that were missing from the previous 3.14.5 release.

Security Fix(es):

* CXF: Apache CXF: SSRF Vulnerability (CVE-2022-46364)

* jettison: parser crash by stackoverflow (CVE-2022-40149)

* jettison: If the value in map is the map's self, the new JSONObject(map)
cause StackOverflowError which may lead to dos (CVE-2022-45693)

* CXF: Apache CXF: directory listing / code exfiltration (CVE-2022-46363)

For more details about the security issues, including the impact, CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

Installation instructions are available from the Camel for Spring Boot
3.14.5 product documentation page.

  https://access.redhat.com/documentation/en-us/red_hat_integration/2023.q1/html/getting_started_with_camel_spring_boot/index

  https://access.redhat.com/documentation/en-us/red_hat_integration/2023.q1/html/camel_spring_boot_reference/index

4. Bugs fixed (  https://bugzilla.redhat.com/):

2135771 - CVE-2022-40149 jettison: parser crash by stackoverflow
2155681 - CVE-2022-46363 Apache CXF: directory listing / code exfiltration
2155682 - CVE-2022-46364 Apache CXF: SSRF Vulnerability
2155970 - CVE-2022-45693 jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos

5. References:

  https://access.redhat.com/security/cve/CVE-2022-40149
  https://access.redhat.com/security/cve/CVE-2022-45693
  https://access.redhat.com/security/cve/CVE-2022-46363
  https://access.redhat.com/security/cve/CVE-2022-46364
  https://access.redhat.com/security/updates/classification/#important
  https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=red.hat.integration&version=2023-Q1

6. Contact:

The Red Hat security contact is . More contact
details at   https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.