First published: Mon Jan 30 2023(Updated: )
This patch, Camel for Spring Boot 3.14.5 Patch 1, serves as a replacement for the previous release of Camel for Spring Boot 3.14.5 and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References. This release of Camel for Spring Boot includes CXF artifacts that were missing from the previous 3.14.5 release.<br>Security Fix(es):<br><li> CXF: Apache CXF: SSRF Vulnerability (CVE-2022-46364)</li> <li> jettison: parser crash by stackoverflow (CVE-2022-40149)</li> <li> jettison: If the value in map is the map's self, the new JSONObject(map) cause StackOverflowError which may lead to dos (CVE-2022-45693)</li> <li> CXF: Apache CXF: directory listing / code exfiltration (CVE-2022-46363)</li> For more details about the security issues, including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Integration - Camel for Spring Boot |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2023:0544 addresses vulnerabilities that have been classified with moderate severity.
To fix RHSA-2023:0544, you should update to the latest version of Camel for Spring Boot as provided in the advisory.
RHSA-2023:0544 includes fixes for several bugs and enhancements that improve the stability of Camel for Spring Boot.
All users of Red Hat Integration - Camel for Spring Boot version 3.14.5 are affected by RHSA-2023:0544.
Yes, the release notes for RHSA-2023:0544 are documented and provide details on the fixes and enhancements.