Critical: Red Hat Fuse 7.11.1.P1 security update

Related Vulnerabilities: CVE-2022-36437   CVE-2022-46363   CVE-2022-46364  

Synopsis

Critical: Red Hat Fuse 7.11.1.P1 security update

Type/Severity

Security Advisory: Critical

Topic

A security update for Fuse 7.11.1 is now available for Red Hat Fuse on Karaf and Red Hat Fuse on Spring Boot. The purpose of this text-only errata is to inform you about the security issues fixed in this release.

Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

This asynchronous update (7.11.1.P1) patches Red Hat Fuse 7.11.1 on Karaf and Red Hat Fuse 7.11.1 on Spring Boot and several includes security fixes, which are documented in the Release Notes document linked to in the References.

Security Fix(es):

  • hazelcast: Hazelcast connection caching (CVE-2022-36437)
  • CXF: Apache CXF: SSRF Vulnerability (CVE-2022-46364)
  • CXF: Apache CXF: directory listing / code exfiltration (CVE-2022-46363)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.

Installation instructions are available from the Fuse 7.11 product documentation page: https://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/

Affected Products

  • Red Hat Fuse 1 x86_64

Fixes

  • BZ - 2155681 - CVE-2022-46363 Apache CXF: directory listing / code exfiltration
  • BZ - 2155682 - CVE-2022-46364 Apache CXF: SSRF Vulnerability
  • BZ - 2162053 - CVE-2022-36437 hazelcast: Hazelcast connection caching