First published: Tue Nov 19 2024(Updated: )
An update for Red Hat Build of Apache Camel 4.4 for Quarkus 3.8 update is now available (RHBQ 3.8.6.SP2).<br>The purpose of this text-only errata is to inform you about the enhancements that improve your developer experience and ensure the security and stability of your products:<br><li> [Minor Incident] CVE-2024-51132 ca.uhn.hapi.fhir/org.hl7.fhir.dstu3: FHIR arbitrary code execution via specially-crafted request</li> <li> [Minor Incident] CVE-2024-51132 ca.uhn.hapi.fhir/org.hl7.fhir.dstu2: FHIR arbitrary code execution via specially-crafted request</li> <li> [Minor Incident] CVE-2024-51132 ca.uhn.hapi.fhir/org.hl7.fhir.r5: FHIR arbitrary code execution via specially-crafted request</li> <li> [Minor Incident] CVE-2024-51132 ca.uhn.hapi.fhir/org.hl7.fhir.r4: FHIR arbitrary code execution via specially-crafted request</li> <li> [Minor Incident] CVE-2024-51132 ca.uhn.hapi.fhir/org.hl7.fhir.dstu2016may: FHIR arbitrary code execution via specially-crafted request</li> <li> [Minor Incident] CVE-2024-51132 ca.uhn.hapi.fhir-org.hl7.fhir.utilities: FHIR arbitrary code execution via specially-crafted request</li> <li> CVE-2024-9621 io.quarkiverse.cxf/quarkus-cxf: Quarkus CXF may log user password and secret to application log</li>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Build of Apache Camel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:10035 has not been explicitly mentioned in the advisory.
To fix RHSA-2024:10035, you need to update to Red Hat Build of Apache Camel 4.4 for Quarkus 3.8.6.SP2.
RHSA-2024:10035 affects Red Hat Build of Apache Camel 4.4 for Quarkus.
RHSA-2024:10035 includes enhancements that improve developer experience and ensure security and stability.
No specific workaround for RHSA-2024:10035 has been provided in the advisory.