Important: Red Hat Integration Camel K 1.10.5 release and security update

Related Vulnerabilities: CVE-2023-5072   CVE-2023-34455   CVE-2023-34462  

Synopsis

Important: Red Hat Integration Camel K 1.10.5 release and security update

Type/Severity

Security Advisory: Important

Topic

Red Hat Integration Camel K 1.10.5 release and security update is now available.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

A security update for Camel K 1.10.5 is now available.

The purpose of this text-only errata is to inform you about the security issues fixed.

Security Fix(es):

  • JSON-java: parser confusion leads to OOM [rhint-camel-k-1.10] (CVE-2023-5072)
  • Snappy-java: Unchecked chunk length leads to DoS [rhint-camel-k-1] (CVE-2023-34455)
  • Netty: SniHandler 16MB allocation leads to OOM [rhint-camel-k-1] (CVE-2023-34462)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE moderatepage(s) listed in the References section.

Solution

Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.

The References section of this erratum contains a download link (you must log in to download the update).

Affected Products

  • Red Hat Integration - Camel K 1 x86_64

Fixes

  • BZ - 2215445 - CVE-2023-34455 snappy-java: Unchecked chunk length leads to DoS
  • BZ - 2216888 - CVE-2023-34462 netty: SniHandler 16MB allocation leads to OOM
  • BZ - 2246417 - CVE-2023-5072 JSON-java: parser confusion leads to OOM