- Issued:
- 2023-01-26
- Updated:
- 2023-01-26
RHSA-2023:0471 - Security Advisory
Synopsis
Important: Migration Toolkit for Runtimes security update
Type/Severity
Security Advisory: Important
Topic
An update is now available for Migration Toolkit for Runtimes (v1.0.1).
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
Description
Security Fix(es):
- jib-core: RCE via the isDockerInstalled (CVE-2022-25914)
- Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing (CVE-2022-42920)
- nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
- loader-utils: Regular expression denial of service (CVE-2022-37603)
- jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)
- jackson-databind: use of deeply nested arrays (CVE-2022-42004)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page listed in the References section.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Migration Toolkit for Runtimes Advisory Metadata x86_64
Fixes
- BZ - 2134344 - CVE-2022-25914 jib-core: RCE via the isDockerInstalled
- BZ - 2134609 - CVE-2022-3517 nodejs-minimatch: ReDoS via the braceExpand function
- BZ - 2135244 - CVE-2022-42003 jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
- BZ - 2135247 - CVE-2022-42004 jackson-databind: use of deeply nested arrays
- BZ - 2140597 - CVE-2022-37603 loader-utils:Regular expression denial of service
- BZ - 2142707 - CVE-2022-42920 Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.