First published: Mon May 02 2022(Updated: )
The Apache Maven Shared Utils project aims to be an improved functional replacement for plexus-utils in Maven.<br>Security Fix(es):<br><li> maven-shared-utils: Command injection via Commandline class (CVE-2022-29599)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-maven36-maven-shared-utils | <3.2.1-0.2.3.el7 | 3.2.1-0.2.3.el7 |
redhat/rh-maven36-maven-shared-utils | <3.2.1-0.2.3.el7 | 3.2.1-0.2.3.el7 |
redhat/rh-maven36-maven-shared-utils-javadoc | <3.2.1-0.2.3.el7 | 3.2.1-0.2.3.el7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2022:1662 is classified as important severity due to the command injection vulnerability.
To fix RHSA-2022:1662, upgrade to rh-maven36-maven-shared-utils version 3.2.1-0.2.3.el7 or later.
RHSA-2022:1662 addresses a command injection vulnerability in the Commandline class (CVE-2022-29599).
RHSA-2022:1662 affects versions of rh-maven36-maven-shared-utils prior to 3.2.1-0.2.3.el7.
Yes, the command injection vulnerability in RHSA-2022:1662 is tied to the Commandline class.