First published: Tue Nov 23 2021(Updated: )
This release of Red Hat Integration - Camel Extensions for Quarkus - 2.2 GA serves as a replacement for tech-preview 2, and includes bug fixes and<br>enhancements, which are documented in the Release Notes document linked to in the References.<br>Security Fix(es):<br><li> jetty (CVE-2021-28163, CVE-2020-27218, CVE-2020-27223, CVE-2021-28164, CVE-2021-28169, CVE-2021-28165, CVE-2021-34428, CVE-2021-34428)</li> <li> undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)</li> <li> xstream (CVE-2021-39144, CVE-2021-39141, CVE-2021-39154, CVE-2021-39153, CVE-2021-39152, CVE-2021-39151, CVE-2021-39150, CVE-2021-39149, CVE-2021-39148, CVE-2021-39147, CVE-2021-39146, CVE-2021-39145, CVE-2021-39140, CVE-2021-39139, CVE-2021-21351, CVE-2021-21350, CVE-2021-21349, CVE-2021-21348, CVE-2021-21347, CVE-2021-21346, CVE-2021-21345, CVE-2021-21344, CVE-2021-21343, CVE-2021-21342, CVE-2021-21341, CVE-2021-29505, CVE-2020-26259, CVE-2020-26258, CVE-2020-26217) </li> <li> wildfly-elytron: possible timing attack in ScramServer (CVE-2021-3642)</li> <li> RESTEasy: Caching routes in RootNode may result in DoS (CVE-2020-14326)</li> <li> resteasy-core: resteasy: Error message exposes endpoint class information (CVE-2021-20289)</li> <li> velocity: arbitrary code execution when attacker is able to modify templates (CVE-2020-13936)</li> <li> undertow: buffer leak on incoming websocket PONG message may lead to DoS (CVE-2021-3690)</li> <li> mongodb-driver: mongo-java-driver: client-side field level encryption not verifying KMS host name (CVE-2021-20328)</li> <li> gradle: information disclosure through temporary directory permissions (CVE-2021-29429)</li> <li> json-smart: uncaught exception may lead to crash or information disclosure (CVE-2021-27568)</li> <li> bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible (CVE-2020-28052)</li> <li> jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception (CVE-2020-28491)</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.