First published: Wed Aug 11 2021(Updated: )
This release of Red Hat Fuse 7.9.0 serves as a replacement for Red Hat Fuse 7.8, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.<br>Security Fix(es):<br><li> hawtio-osgi (CVE-2017-5645)</li> <li> prometheus-jmx-exporter: snakeyaml (CVE-2017-18640)</li> <li> apache-commons-compress (CVE-2019-12402)</li> <li> karaf-transaction-manager-narayana: netty (CVE-2019-16869, CVE-2019-20445)</li> <li> tomcat (CVE-2020-1935, CVE-2020-1938, CVE-2020-9484, CVE-2020-13934, CVE-2020-13935, CVE-2020-11996)</li> <li> spring-cloud-config-server (CVE-2020-5410)</li> <li> velocity (CVE-2020-13936)</li> <li> httpclient: apache-httpclient (CVE-2020-13956)</li> <li> shiro-core: shiro (CVE-2020-17510)</li> <li> hibernate-core (CVE-2020-25638)</li> <li> wildfly-openssl (CVE-2020-25644)</li> <li> jetty (CVE-2020-27216, CVE-2021-28165)</li> <li> bouncycastle (CVE-2020-28052)</li> <li> wildfly (CVE-2019-14887, CVE-2020-25640)</li> <li> resteasy-jaxrs: resteasy (CVE-2020-1695)</li> <li> camel-olingo4 (CVE-2020-1925)</li> <li> springframework (CVE-2020-5421)</li> <li> jsf-impl: Mojarra (CVE-2020-6950)</li> <li> resteasy (CVE-2020-10688)</li> <li> hibernate-validator (CVE-2020-10693)</li> <li> wildfly-elytron (CVE-2020-10714)</li> <li> undertow (CVE-2020-10719)</li> <li> activemq (CVE-2020-13920)</li> <li> cxf-core: cxf (CVE-2020-13954)</li> <li> fuse-apicurito-operator-container: golang.org/x/text (CVE-2020-14040)</li> <li> jboss-ejb-client: wildfly (CVE-2020-14297)</li> <li> xercesimpl: wildfly (CVE-2020-14338)</li> <li> xnio (CVE-2020-14340)</li> <li> flink: apache-flink (CVE-2020-17518)</li> <li> resteasy-client (CVE-2020-25633)</li> <li> xstream (CVE-2020-26258)</li> <li> mybatis (CVE-2020-26945)</li> <li> pdfbox (CVE-2021-27807, CVE-2021-27906)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.