First published: Mon Jun 19 2023(Updated: )
A security update for Camel Extensions for Quarkus 2.13.3 is now available. The purpose of this text-only errata is to inform you about the security issues fixed.<br> Red Hat Product Security has rated this update as having an impact of Important.<br>A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.<br>Security Fix(es):<br><li> CVE-2023-1436 jettison: Uncontrolled Recursion in JSONArray</li> <li> CVE-2021-37533 apache-commons-net: FTP client trusts the host from PASV response by default</li>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Integration - Camel Extensions for Quarkus |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2023:3667 is rated as having an Important impact.
To fix RHSA-2023:3667, you need to update your Camel Extensions for Quarkus to version 2.13.3 or later.
RHSA-2023:3667 affects the Camel Extensions for Quarkus.
RHSA-2023:3667 addresses several security vulnerabilities identified in Camel Extensions for Quarkus.
Yes, applying the update for RHSA-2023:3667 is necessary to mitigate the identified security risks.