-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat AMQ Broker 7.11.2 release and security update Advisory ID: RHSA-2023:5491-01 Product: Red Hat JBoss AMQ Advisory URL: https://access.redhat.com/errata/RHSA-2023:5491 Issue date: 2023-10-05 CVE Names: CVE-2023-1664 CVE-2023-2976 CVE-2023-33008 ==================================================================== 1. Summary: Red Hat AMQ Broker 7.11.2 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.11.2 includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Security Fix(es): * guava: insecure temporary directory creation (CVE-2023-2976) * apache-johnzon: Prevent inefficient internal conversion from BigDecimal at large scale (CVE-2023-33008) * keycloak: Untrusted Certificate Validation (CVE-2023-1664) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings. The References section of this erratum contains a download link (you must log in to download the update). 4. Bugs fixed (https://bugzilla.redhat.com/): 2182196 - CVE-2023-1664 keycloak: Untrusted Certificate Validation 2215229 - CVE-2023-2976 guava: insecure temporary directory creation 2221135 - CVE-2023-33008 apache-johnzon: Prevent inefficient internal conversion from BigDecimal at large scale 5. References: https://access.redhat.com/security/cve/CVE-2023-1664 https://access.redhat.com/security/cve/CVE-2023-2976 https://access.redhat.com/security/cve/CVE-2023-33008 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=jboss.amq.broker&version=7.11.2 https://access.redhat.com/documentation/en-us/red_hat_amq_broker/7.11 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJlH36NAAoJENzjgjWX9erEVxwP/1MyEktwZRr4Jr79b9GfJckx /3Fy4Ve+nskZ3egyy/k6rw2YB2iBtAOE4OdmuTZbHHgcCqze837Tc45IDP0rChDl wVvLtLjtNbRKnOtCPIQSh3K0RL+/ADTXsB56ubq3dlg8sKtFF4aYstz8d0cjfrTI fWOXR/jKakz00AVv8HgNW6aGFuKusKxEGLt2HVo4aP+5r/gmLjgbFczuE0Byf0pe kElHL7EWn2Zrbx5mEMpSHA6zQDUOxIuE+SILWU853PDV663dqA+8ldR8Kdc5pMhu EkmXZYE4nUQW5qOy9XV7U2lmYXo81m1lr3uHgd5OoRempAYRJSNO+pb3wLwLTryP bwIplNRmdW+d5XqL4J5DcZdNxPVr7i/ITaOmXESZaboJBrfsaR4IoWcmHM9keEgW mvvxiEE3kRAQ+PbDlVVk9Q5TPRzF63FJKjfOiWFpN6rkNd+YulbMpuFxOM9eq5UQ Mu9NgCmWFISDtVFdbjcPcvzxfIrv0vfTJLdWR5p2SDMgt6LlSm+jtHVvMN+xGnGj zAQhX9wcU8TiRC2buYzm14mrgS/QugQHi71pPJ8fyqSn8JpG/lhVkqYgI0YqEIpg CzQYId+syLdB8eA37Z4sKRbdMes4t5xun0JFnmQao2yALvo9ozyJVU/i3698SHPY Ip8TWASLTyvzN8vvAdoq =pF6/ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce