First published: Tue Mar 22 2022(Updated: )
Red Hat Integration - Camel Extensions for Quarkus 2.2.1 serves as a replacement for 2.2 and includes the following security Fix(es):<br>Security Fix(es):<br><li> cron-utils: template Injection leading to unauthenticated Remote Code Execution (CVE-2021-41269)</li> <li> maven: Block repositories using http by default (CVE-2021-26291)</li> <li> bouncycastle: Timing issue within the EC math library (CVE-2020-15522)</li> <li> mysql-connector-java: unauthorized access to critical (CVE-2021-2471)</li> <li> kubernetes-client: Insecure deserialization in unmarshalYaml method (CVE-2021-4178)</li> <li> protobuf-java: potential DoS in the parsing procedure for binary data (CVE-2021-22569)</li> <li> jersey: Local information disclosure via system temporary directory (CVE-2021-28168)</li> <li> jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate (CVE-2021-28170)</li> <li> mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server (CVE-2021-30129)</li> <li> netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data (CVE-2021-37136)</li> <li> netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way (CVE-2021-37137)</li> <li> xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)</li> <li> h2: Remote Code Execution in Console (CVE-2021-42392)</li> <li> guava: local information disclosure via temporary directory created with unsafe permissions (CVE-2020-8908)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Quarkus |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:1013 is considered critical due to the potential for unauthenticated remote code execution.
To fix RHSA-2022:1013, upgrade to the latest version of Red Hat Integration - Camel Extensions for Quarkus as recommended in the advisory.
RHSA-2022:1013 addresses a template injection vulnerability leading to unauthenticated remote code execution, identified as CVE-2021-41269.
RHSA-2022:1013 affects Red Hat Integration - Camel Extensions for Quarkus versions prior to 2.2.1.
The recommended mitigation for RHSA-2022:1013 is to upgrade, as there are no alternative fixes for the vulnerabilities.