drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in Red Hat Integration
Name: |
Ausführen beliebiger Kommandos in Red Hat Integration |
|
ID: |
RHSA-2022:1306-01 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat Integration |
|
Datum: |
Mo, 11. April 2022, 20:25 |
|
Referenzen: |
https://access.redhat.com/security/vulnerabilities/RHSB-2022-003
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=red.hat.integration&version=2022-Q1
https://access.redhat.com/security/cve/CVE-2022-22965 |
|
Applikationen: |
Red Hat Integration |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Low: Red Hat Integration Camel Extensions for Quarkus 2.2.1-1 security update Advisory ID: RHSA-2022:1306-01 Product: Red Hat Integration Advisory URL: https://access.redhat.com/errata/RHSA-2022:1306 Issue date: 2022-04-11 CVE Names: CVE-2022-22965 =====================================================================
1. Summary:
A security update to Red Hat Integration Camel Extensions for Quarkus 2.2.1 is now available. The purpose of this text-only errata is to inform you about the security issues fixed.
Red Hat Product Security has rated this update as having an impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
2. Description:
Red Hat Integration - Camel Extensions for Quarkus 2.2.1-1 serves as a replacement for 2.2.1 and includes the following security Fix(es):
Security Fix(es):
* spring-beans: spring-framework: RCE via Data Binding on JDK 9+ (CVE-2022-22965)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
3. Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
4. Bugs fixed (https://bugzilla.redhat.com/):
2070348 - CVE-2022-22965 spring-framework: RCE via Data Binding on JDK 9+
5. References:
https://access.redhat.com/security/cve/CVE-2022-22965 https://access.redhat.com/security/updates/classification/#low https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=red.hat.integration&version=2022-Q1 https://access.redhat.com/security/vulnerabilities/RHSB-2022-003 https://access.redhat.com/documentation/en-us/red_hat_integration/2022.q1
6. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYlRiO9zjgjWX9erEAQiMJg//aYiC8A0lTO9YPQdqrTMYmCxqPDiT0FiE xr2yyRIVUvDAc9z+dwFRiCgISdqF1DJIZ+bN0e2Cf94pgP6Z45T+E9XdzF5AO17U AmHdCWu+XXREvYqCeKoPUYV2ZS+aJ5k0k3NIFizL64PQQlNmgTgjly3KMKJt3t9V ocobNYxstaW8hdAvSPFWjry80T0WiVAbtabku8Tl6eg8laQ8WfMP+foTXRkoMrhI mgNQoL2q+jIeLnOLD6dnKwmx3F1O/L/5/hI6Qic7BmzNQ0fPjwn4Igf3Y+XysOAZ w2DkrCRx/w1qogYks0iopIoOtHUjYrRwH3ePme7lNPs6Lpfbh/heb5/qTa3VHyQm XdMTXw2epd30Nz+bNSkZ6+omP3M0Rsi1jmDvbbTKkl2dklsIQhN1gV0GUBClOWtR Y11fCpZck6MN05lvbEQlAFusEwg/McmxCrlp1rQC5/YC+GS5nTQmUAs8OcCjv/Tu 8BVX0PdBLF8HrzapiQXQ7KdEoW97bSMU98SMFNQFe2AoY4anDYxiXRPCdXV1jZsP 40ybw/zVH2gh5lhWS0l6FPp1tGYy8lMzzhBDl+CjPhxvLMv2VWC510XxerAQDSBb MgcUvZ3gz8pTtbqXyB+71Z3gkahBrJC3FUwORCA/Qf7WcJP8K4EbFsbiD8xOfMz4 EZh5RL6Mil8= =TNXa -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce
|
|
|
|