Red Hat 8944 Published by

A Red Hat Integration Camel Extensions for Quarkus 2.13.3 security update has been released.



[RHSA-2023:3667-01] Moderate: Red Hat Integration Camel Extensions for Quarkus 2.13.3 security update


=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat Integration Camel Extensions for Quarkus 2.13.3 security update
Advisory ID: RHSA-2023:3667-01
Product: Red Hat Integration
Advisory URL: https://access.redhat.com/errata/RHSA-2023:3667
Issue date: 2023-06-19
CVE Names: CVE-2021-37533 CVE-2023-1436
=====================================================================

1. Summary:

Red Hat Integration Camel Extensions for Quarkus 2.13.3 release and
security update is now available. The purpose of this text-only errata is
to inform you about the security issues fixed.

Red Hat Product Security has rated this update as having an impact of
Important.
A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

2. Description:

A security update for Camel Extensions for Quarkus 2.13.3 is now available.
The purpose of this text-only errata is to inform you about the security
issues fixed.
Red Hat Product Security has rated this update as having an impact of
Important.

A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

Security Fix(es):

* CVE-2023-1436 jettison: Uncontrolled Recursion in JSONArray
* CVE-2021-37533 apache-commons-net: FTP client trusts the host from
PASV response by default

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed ( https://bugzilla.redhat.com/):

2169924 - CVE-2021-37533 apache-commons-net: FTP client trusts the host from PASV response by default
2182788 - CVE-2023-1436 jettison: Uncontrolled Recursion in JSONArray

5. References:

https://access.redhat.com/security/cve/CVE-2021-37533
https://access.redhat.com/security/cve/CVE-2023-1436
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/security/cve/cve-2023-1436
https://access.redhat.com/security/cve/cve-2021-37533

6. Contact:

The Red Hat security contact is [secalert@redhat.com]. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.

--