First published: Thu Jan 20 2022(Updated: )
This update of Red Hat Integration - Camel Extensions for Quarkus serves as a replacement for 2.2 GA and includes the following security Fix(es):<br>Security Fix(es):<br><li> log4j-core: remote code execution via JDBC Appender (CVE-2021-44832)</li> <li> log4j-core: DoS in log4j 2.x with thread context message pattern and context lookup pattern (incomplete fix for CVE-2021-44228) (CVE-2021-45046)</li> <li> log4j-core: DoS in log4j 2.x with Thread Context Map (MDC) input data contains a recursive lookup and context lookup pattern (CVE-2021-45105)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Integration - Camel Extensions for Quarkus |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:0222 is categorized as critical due to the remote code execution vulnerability associated with log4j-core.
To fix RHSA-2022:0222, update Red Hat Integration - Camel Extensions for Quarkus to the latest version that addresses the identified security issues.
RHSA-2022:0222 addresses vulnerabilities including remote code execution via JDBC Appender (CVE-2021-44832) and denial of service in log4j 2.x.
RHSA-2022:0222 affects versions of Red Hat Integration - Camel Extensions for Quarkus prior to the latest patched release.
No specific workaround is suggested for RHSA-2022:0222; the recommended action is to apply the security update provided.