-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: Service Registry (container images) release and security update [2.4.3 GA]
Advisory ID:       RHSA-2023:3815-01
Product:           Red Hat Integration
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:3815
Issue date:        2023-06-27
CVE Names:         CVE-2021-46877 CVE-2022-3509 CVE-2022-3510 
                   CVE-2022-3782 CVE-2022-4742 CVE-2022-25881 
                   CVE-2022-40152 CVE-2022-45787 CVE-2023-28867 
====================================================================
1. Summary:

An update to the images for Red Hat Integration - Service Registry is now
available from the Red Hat Container Catalog. The purpose of this text-only
errata is to inform you about the security issues fixed in this release.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

This release of Red Hat Integration - Service Registry 2.4.3 GA includes
the following security fixes.

Security Fix(es):

* keycloak: path traversal via double URL encoding (CVE-2022-3782)

* jackson-databind: Possible DoS if using JDK serialization to serialize
JsonNode (CVE-2021-46877)

* protobuf-java: Textformat parsing issue leads to DoS (CVE-2022-3509)

* protobuf-java: Message-Type Extensions parsing issue leads to DoS
(CVE-2022-3510)

* json-pointer: prototype pollution in json-pointer (CVE-2022-4742)

* http-cache-semantics: Regular Expression Denial of Service (ReDoS)
vulnerability (CVE-2022-25881)

* woodstox-core: woodstox to serialise XML data was vulnerable to Denial of
Service attacks (CVE-2022-40152)

* apache-james-mime4j: Temporary File Information Disclosure in MIME4J
TempFileStorageProvider (CVE-2022-45787)

* graphql-java: crafted GraphQL query causes stack consumption
(CVE-2023-28867)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2134291 - CVE-2022-40152 woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks
2138971 - CVE-2022-3782 keycloak: path traversal via double URL encoding
2156333 - CVE-2022-4742 json-pointer: prototype pollution in json-pointer
2158916 - CVE-2022-45787 apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider
2165824 - CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability
2181977 - CVE-2023-28867 graphql-java: crafted GraphQL query causes stack consumption
2184161 - CVE-2022-3509 protobuf-java: Textformat parsing issue leads to DoS
2184176 - CVE-2022-3510 protobuf-java: Message-Type Extensions parsing issue leads to DoS
2185707 - CVE-2021-46877 jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode

5. References:

https://access.redhat.com/security/cve/CVE-2021-46877
https://access.redhat.com/security/cve/CVE-2022-3509
https://access.redhat.com/security/cve/CVE-2022-3510
https://access.redhat.com/security/cve/CVE-2022-3782
https://access.redhat.com/security/cve/CVE-2022-4742
https://access.redhat.com/security/cve/CVE-2022-25881
https://access.redhat.com/security/cve/CVE-2022-40152
https://access.redhat.com/security/cve/CVE-2022-45787
https://access.redhat.com/security/cve/CVE-2023-28867
https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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lmeY
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-3815:01 Important: Service Registry (container images)

An update to the images for Red Hat Integration - Service Registry is now available from the Red Hat Container Catalog

Summary

This release of Red Hat Integration - Service Registry 2.4.3 GA includes the following security fixes.
Security Fix(es):
* keycloak: path traversal via double URL encoding (CVE-2022-3782)
* jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode (CVE-2021-46877)
* protobuf-java: Textformat parsing issue leads to DoS (CVE-2022-3509)
* protobuf-java: Message-Type Extensions parsing issue leads to DoS (CVE-2022-3510)
* json-pointer: prototype pollution in json-pointer (CVE-2022-4742)
* http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881)
* woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40152)
* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)
* graphql-java: crafted GraphQL query causes stack consumption (CVE-2023-28867)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2021-46877 https://access.redhat.com/security/cve/CVE-2022-3509 https://access.redhat.com/security/cve/CVE-2022-3510 https://access.redhat.com/security/cve/CVE-2022-3782 https://access.redhat.com/security/cve/CVE-2022-4742 https://access.redhat.com/security/cve/CVE-2022-25881 https://access.redhat.com/security/cve/CVE-2022-40152 https://access.redhat.com/security/cve/CVE-2022-45787 https://access.redhat.com/security/cve/CVE-2023-28867 https://access.redhat.com/security/updates/classification/#important

Package List


Severity
Advisory ID: RHSA-2023:3815-01
Product: Red Hat Integration
Advisory URL: https://access.redhat.com/errata/RHSA-2023:3815
Issued Date: : 2023-06-27
CVE Names: CVE-2021-46877 CVE-2022-3509 CVE-2022-3510 CVE-2022-3782 CVE-2022-4742 CVE-2022-25881 CVE-2022-40152 CVE-2022-45787 CVE-2023-28867

Topic

An update to the images for Red Hat Integration - Service Registry is nowavailable from the Red Hat Container Catalog. The purpose of this text-onlyerrata is to inform you about the security issues fixed in this release.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

2134291 - CVE-2022-40152 woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks

2138971 - CVE-2022-3782 keycloak: path traversal via double URL encoding

2156333 - CVE-2022-4742 json-pointer: prototype pollution in json-pointer

2158916 - CVE-2022-45787 apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider

2165824 - CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability

2181977 - CVE-2023-28867 graphql-java: crafted GraphQL query causes stack consumption

2184161 - CVE-2022-3509 protobuf-java: Textformat parsing issue leads to DoS

2184176 - CVE-2022-3510 protobuf-java: Message-Type Extensions parsing issue leads to DoS

2185707 - CVE-2021-46877 jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode


Related News