First published: Thu Feb 06 2025(Updated: )
Camel K 1.10.9 is now available.<br>The purpose of this text-only errata is to inform you about the security issues fixed.<br>Security Fix(es):<br><li> libsoup: buffer overflow via UTF-8 conversion in soup_header_parse_param_list_strict (CVE-2024-52531)</li> <li> JDK: Enhance array handling (Oracle CPU 2025-01) (CVE-2025-21502)</li> <li> bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail). (CVE-2019-12900)</li> <li> graalvm: Unauthorized Read Access (CVE-2024-20954)</li> <li> graalvm: unauthorized ability to cause a partial denial of service (CVE-2024-21098)</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE important page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Camel K |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2025:1154 addresses a buffer overflow vulnerability in libsoup that can occur during UTF-8 conversion in soup_header_parse_param_list_strict (CVE-2024-52531).
The severity of RHSA-2025:1154 is critical due to the potential for exploiting the buffer overflow vulnerability.
To fix RHSA-2025:1154, update your Red Hat Integration - Camel K to version 1.10.9 or later.
The affected product for RHSA-2025:1154 is Red Hat Integration - Camel K.
There are no documented workarounds for RHSA-2025:1154; the recommended action is to apply the security update.