Data center: Ashburn, VA

Telegram Chat : MBHH_x86

Email Us: Help@mobilehackerforhire.com

Mobile Hacker For Hire

Red Hat Security Advisory 2022-8957-01 ≈ Mobile Hacker For Hire

Table of Contents

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat build of Quarkus Platform 2.7.6.SP3 and security update
Advisory ID: RHSA-2022:8957-01
Product: Red Hat build of Quarkus
Advisory URL: https://access.redhat.com/errata/RHSA-2022:8957
Issue date: 2022-12-13
CVE Names: CVE-2022-4116 CVE-2022-4147 CVE-2022-45047
====================================================================
1. Summary:

An update is now available for Red Hat build of Quarkus Platform. Red Hat
Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability. For
more information, see the CVE links in the References section.

2. Description:

This release of Red Hat build of Quarkus 2.7.6.SP3 includes security
updates, bug fixes, and enhancements. For more information, see the release
notes page listed in the References section.

Security Fix(es):

* CVE-2022-4147 quarkus-vertx-http: Security misconfiguration of CORS :
OWASP A05_2021 level in Quarkus

* CVE-2022-4116 quarkus_dev_ui: Dev UI Config Editor is vulnerable to
drive-by localhost attacks leading to RCE

* CVE-2022-45047 mina-sshd: Java unsafe deserialization vulnerability

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s)
listed in the References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2144748 – CVE-2022-4116 quarkus_dev_ui: Dev UI Config Editor is vulnerable to drive-by localhost attacks leading to RCE
2145194 – CVE-2022-45047 mina-sshd: Java unsafe deserialization vulnerability
2148867 – CVE-2022-4147 quarkus-vertx-http: Security misconfiguration of CORS : OWASP A05_2021 level in Quarkus

5. References:

https://access.redhat.com/security/cve/CVE-2022-4116
https://access.redhat.com/security/cve/CVE-2022-4147
https://access.redhat.com/security/cve/CVE-2022-45047
https://access.redhat.com/articles/4966181
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=redhat.quarkus&version=2.7.6.SP3
https://access.redhat.com/documentation/en-us/red_hat_build_of_quarkus/2.7
https://bugzilla.redhat.com/show_bug.cgi?id!48867
https://bugzilla.redhat.com/show_bug.cgi?id!44748
https://bugzilla.redhat.com/show_bug.cgi?id!45194
https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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xC3s
—–END PGP SIGNATURE—–

RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Leave a Reply

Your email address will not be published. Required fields are marked *

error: Content is protected !!