-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Service Registry (container images) release and security update [2.4.3 GA] Advisory ID: RHSA-2023:3815-01 Product: Red Hat Integration Advisory URL: https://access.redhat.com/errata/RHSA-2023:3815 Issue date: 2023-06-27 CVE Names: CVE-2021-46877 CVE-2022-3509 CVE-2022-3510 CVE-2022-3782 CVE-2022-4742 CVE-2022-25881 CVE-2022-40152 CVE-2022-45787 CVE-2023-28867 ===================================================================== 1. Summary: An update to the images for Red Hat Integration - Service Registry is now available from the Red Hat Container Catalog. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: This release of Red Hat Integration - Service Registry 2.4.3 GA includes the following security fixes. Security Fix(es): * keycloak: path traversal via double URL encoding (CVE-2022-3782) * jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode (CVE-2021-46877) * protobuf-java: Textformat parsing issue leads to DoS (CVE-2022-3509) * protobuf-java: Message-Type Extensions parsing issue leads to DoS (CVE-2022-3510) * json-pointer: prototype pollution in json-pointer (CVE-2022-4742) * http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881) * woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40152) * apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787) * graphql-java: crafted GraphQL query causes stack consumption (CVE-2023-28867) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2134291 - CVE-2022-40152 woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks 2138971 - CVE-2022-3782 keycloak: path traversal via double URL encoding 2156333 - CVE-2022-4742 json-pointer: prototype pollution in json-pointer 2158916 - CVE-2022-45787 apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider 2165824 - CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability 2181977 - CVE-2023-28867 graphql-java: crafted GraphQL query causes stack consumption 2184161 - CVE-2022-3509 protobuf-java: Textformat parsing issue leads to DoS 2184176 - CVE-2022-3510 protobuf-java: Message-Type Extensions parsing issue leads to DoS 2185707 - CVE-2021-46877 jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode 5. References: https://access.redhat.com/security/cve/CVE-2021-46877 https://access.redhat.com/security/cve/CVE-2022-3509 https://access.redhat.com/security/cve/CVE-2022-3510 https://access.redhat.com/security/cve/CVE-2022-3782 https://access.redhat.com/security/cve/CVE-2022-4742 https://access.redhat.com/security/cve/CVE-2022-25881 https://access.redhat.com/security/cve/CVE-2022-40152 https://access.redhat.com/security/cve/CVE-2022-45787 https://access.redhat.com/security/cve/CVE-2023-28867 https://access.redhat.com/security/updates/classification/#important 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZJsFgtzjgjWX9erEAQhjSxAAkdZcVQ40k/RGIbaO43BZYsPXzr3F47f9 kR7ddrW/LgLw6N2oHPx+T7zSMJM6oGnWjTi1Mqw6XUmDaSXSnLf2ADx3NEmrH//T 8Ti9UjN6oKuBtJb5sejU9ra2FBX9g3rJP6nb6QeeUi6v/a1aw3kwMp/mCC7Sp1U3 RxLOs9O4/CKA5NBSJnPjFqp1rXPLpmHLwOKdomABrOEoyIairtCey3GpLfOcLRMg +rNwtcjGrfMVQTC0d+2Gl4oNL7oqG6/fG/hRUFSO8LRzq+pEzEPA7bqgYi9wbbiX hEooNDJfAoUSbRljoYwqSpAROuyPft32+PhemRkX8/OUij213ouA9BFY14pf3X1y 5bmJI59ipH67tl8gO1naNlHDTbyZBr2wWxmjGadVOR9aJK5YDyosoUEk/gjokQbn 31sBfBHx2P9xCHTLZjDDNQBF9MgI1zh6dUId7pBNvcshcLLM5+7kbMGEf6l+elfm D89TciTpHROFfNLP6ejNzw/iE7Mm3pSb1UfEwamyvl/KSpoO39aMzxmRAy35ZV2A CrVPnrzEj2rCH3MvJTCc8CVz0p58zxrbBKJ6lLEecaEbAIvHeuKBmsWjDzf2DoLm ixoYo2VaKXPTYFpKon6HqR9ln4lL+VCMNiDyHk3AulBtkcgFzpMlfzeaHGlx9dRl IzcckdicBSE= =lmeY -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce