-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.3174
              Migration Toolkit for Runtimes security update
                                5 June 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Migration Toolkit for Runtimes
Publisher:         Red Hat
Operating System:  Red Hat
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-28617 CVE-2023-27535 CVE-2023-21968
                   CVE-2023-21967 CVE-2023-21954 CVE-2023-21939
                   CVE-2023-21938 CVE-2023-21937 CVE-2023-21930
                   CVE-2023-0361 CVE-2022-41881 CVE-2022-41854
                   CVE-2022-36227 CVE-2021-46877 

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2023:3373

Comment: CVSS (Max):  7.8 CVE-2023-28617 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
         CVSS Source: Red Hat
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Migration Toolkit for Runtimes security update
Advisory ID:       RHSA-2023:3373-02
Product:           Migration Toolkit for Runtimes
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:3373
Issue date:        2023-05-31
Updated on:        2023-06-02
CVE Names:         CVE-2021-46877 CVE-2022-36227 CVE-2022-41854 
                   CVE-2022-41881 CVE-2023-0361 CVE-2023-21930 
                   CVE-2023-21937 CVE-2023-21938 CVE-2023-21939 
                   CVE-2023-21954 CVE-2023-21967 CVE-2023-21968 
                   CVE-2023-27535 CVE-2023-28617 
=====================================================================

1. Summary:

An update for mtr-operator-bundle-container, mtr-operator-container,
mtr-web-container, and mtr-web-executor-container is now available for
Migration Toolkit for Runtimes 1 on RHEL 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Migration Toolkit for Runtimes 1.1.0 Images

Security Fix(es):

* jackson-databind: Possible DoS if using JDK serialization to serialize
JsonNode (CVE-2021-46877)

* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)

* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS
(CVE-2022-41881)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2151988 - CVE-2022-41854 dev-java/snakeyaml: DoS via stack overflow
2153379 - CVE-2022-41881 codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS
2185707 - CVE-2021-46877 jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode

5. References:

https://access.redhat.com/security/cve/CVE-2021-46877
https://access.redhat.com/security/cve/CVE-2022-36227
https://access.redhat.com/security/cve/CVE-2022-41854
https://access.redhat.com/security/cve/CVE-2022-41881
https://access.redhat.com/security/cve/CVE-2023-0361
https://access.redhat.com/security/cve/CVE-2023-21930
https://access.redhat.com/security/cve/CVE-2023-21937
https://access.redhat.com/security/cve/CVE-2023-21938
https://access.redhat.com/security/cve/CVE-2023-21939
https://access.redhat.com/security/cve/CVE-2023-21954
https://access.redhat.com/security/cve/CVE-2023-21967
https://access.redhat.com/security/cve/CVE-2023-21968
https://access.redhat.com/security/cve/CVE-2023-27535
https://access.redhat.com/security/cve/CVE-2023-28617
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=9mf1
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=CvS6
-----END PGP SIGNATURE-----