Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-0482 (GCVE-0-2023-0482)
Vulnerability from cvelistv5 – Published: 2023-02-17 00:00 – Updated: 2025-03-18 16:02{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:10:56.348Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20230427-0001/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-0482",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-18T16:02:39.109651Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-378",
"description": "CWE-378 Creation of Temporary File With Insecure Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-18T16:02:42.237Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "RESTEasy",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Fixed in RESTEasy 4.7.8.Final"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-378",
"description": "CWE-378",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-04-27T00:00:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"url": "https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230427-0001/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2023-0482",
"datePublished": "2023-02-17T00:00:00.000Z",
"dateReserved": "2023-01-24T00:00:00.000Z",
"dateUpdated": "2025-03-18T16:02:42.237Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.7.8\", \"matchCriteriaId\": \"234D50BA-2D9E-45E0-9CD5-5F9FBD29E6EA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.\"}]",
"id": "CVE-2023-0482",
"lastModified": "2024-11-21T07:37:16.017",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
"published": "2023-02-17T22:15:11.957",
"references": "[{\"url\": \"https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230427-0001/\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230427-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"secalert@redhat.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-378\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-0482\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2023-02-17T22:15:11.957\",\"lastModified\":\"2025-03-18T16:15:15.277\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-378\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-378\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:3.15.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EC7F357-F788-45EA-9EC8-1827E0C3C3F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:4.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1127722-44D1-4E06-BDD8-979BFD6E3301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E3A6FBC-A883-42F6-84D3-FCBC7A5DC5B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:resteasy:6.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7E6BA5D-DE79-45FE-B033-7E9CB458CE3C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*\",\"matchCriteriaId\":\"F3E0B672-3E06-4422-B2A4-0BD073AEC2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*\",\"matchCriteriaId\":\"E8F29E19-3A64-4426-A2AA-F169440267CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*\",\"matchCriteriaId\":\"B55E8D50-99B4-47EC-86F9-699B67D473CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5735E553-9731-4AAC-BCFF-989377F817B3\"}]}]}],\"references\":[{\"url\":\"https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20230427-0001/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20230427-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2023-04-27T00:00:00.000Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.\"}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"RESTEasy\", \"versions\": [{\"version\": \"Fixed in RESTEasy 4.7.8.Final\", \"status\": \"affected\"}]}], \"references\": [{\"url\": \"https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230427-0001/\"}], \"problemTypes\": [{\"descriptions\": [{\"type\": \"CWE\", \"lang\": \"en\", \"description\": \"CWE-378\", \"cweId\": \"CWE-378\"}]}]}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T05:10:56.348Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230427-0001/\", \"tags\": [\"x_transferred\"]}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-0482\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-18T16:02:39.109651Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-378\", \"description\": \"CWE-378 Creation of Temporary File With Insecure Permissions\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-18T16:02:31.158Z\"}}]}",
"cveMetadata": "{\"state\": \"PUBLISHED\", \"cveId\": \"CVE-2023-0482\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"assignerShortName\": \"redhat\", \"dateUpdated\": \"2025-03-18T16:02:42.237Z\", \"dateReserved\": \"2023-01-24T00:00:00.000Z\", \"datePublished\": \"2023-02-17T00:00:00.000Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
RHSA-2023:2710
Vulnerability from csaf_redhat - Published: 2023-05-10 14:30 - Updated: 2025-11-21 18:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A new image is available for Red Hat Single Sign-On 7.6.3, running on Red\nHat OpenShift Container Platform from the release of 3.11 up to the release\nof 4.12.0.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Single Sign-On is an integrated sign-on solution, available as a\nRed Hat JBoss Middleware for OpenShift containerized image. The Red Hat\nSingle Sign-On for OpenShift image provides an authentication server that\nyou can use to log in centrally, log out, and register. You can also manage\nuser accounts for web applications, mobile applications, and RESTful web\nservices.\n\nThis erratum releases a new image for Red Hat Single Sign-On 7.6.3 for use within the Red Hat OpenShift Container Platform (from the release of 3.11\nup to the release of 4.12.0) cloud computing Platform-as-a-Service (PaaS)\nfor on-premise or private cloud deployments, aligning with the standalone\nproduct release.\n\nSecurity Fix(es):\n\n* okhttp: information disclosure via improperly used cryptographic function (CVE-2021-0341)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2710",
"url": "https://access.redhat.com/errata/RHSA-2023:2710"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "RHSSO-1883",
"url": "https://issues.redhat.com/browse/RHSSO-1883"
},
{
"category": "external",
"summary": "RHSSO-2313",
"url": "https://issues.redhat.com/browse/RHSSO-2313"
},
{
"category": "external",
"summary": "RHSSO-2346",
"url": "https://issues.redhat.com/browse/RHSSO-2346"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2710.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.3 for OpenShift image security update",
"tracking": {
"current_release_date": "2025-11-21T18:40:14+00:00",
"generator": {
"date": "2025-11-21T18:40:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:2710",
"initial_release_date": "2023-05-10T14:30:46+00:00",
"revision_history": [
{
"date": "2023-05-10T14:30:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-10T14:30:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:40:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Middleware Containers for OpenShift",
"product": {
"name": "Middleware Containers for OpenShift",
"product_id": "8Base-RHOSE-Middleware",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhosemc:1.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x",
"product": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x",
"product_id": "rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5?arch=s390x\u0026repository_url=registry.redhat.io/rh-sso-7/sso76-openshift-rhel8\u0026tag=7.6-22"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"product": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"product_id": "rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568?arch=ppc64le\u0026repository_url=registry.redhat.io/rh-sso-7/sso76-openshift-rhel8\u0026tag=7.6-22"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"product": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"product_id": "rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"product_identification_helper": {
"purl": "pkg:oci/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275?arch=amd64\u0026repository_url=registry.redhat.io/rh-sso-7/sso76-openshift-rhel8\u0026tag=7.6-22"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64 as a component of Middleware Containers for OpenShift",
"product_id": "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64"
},
"product_reference": "rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"relates_to_product_reference": "8Base-RHOSE-Middleware"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le as a component of Middleware Containers for OpenShift",
"product_id": "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le"
},
"product_reference": "rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-Middleware"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x as a component of Middleware Containers for OpenShift",
"product_id": "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
},
"product_reference": "rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x",
"relates_to_product_reference": "8Base-RHOSE-Middleware"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0341",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2154086"
}
],
"notes": [
{
"category": "description",
"text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "okhttp: information disclosure via improperly used cryptographic function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0341"
},
{
"category": "external",
"summary": "RHBZ#2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0341"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341"
},
{
"category": "external",
"summary": "https://source.android.com/security/bulletin/2021-02-01",
"url": "https://source.android.com/security/bulletin/2021-02-01"
}
],
"release_date": "2021-02-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T14:30:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "okhttp: information disclosure via improperly used cryptographic function"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T14:30:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T14:30:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T14:30:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T14:30:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T14:30:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T14:30:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
}
]
}
RHSA-2023:6305
Vulnerability from csaf_redhat - Published: 2023-11-06 11:24 - Updated: 2025-12-05 12:19Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for MTA-6.1-RHEL-8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Migration Toolkit for Applications 6.1.4 Images.\n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) (CVE-2023-39325)\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:6305",
"url": "https://access.redhat.com/errata/RHSA-2023:6305"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6305.json"
}
],
"title": "Red Hat Security Advisory: Migration Toolkit for Applications security update",
"tracking": {
"current_release_date": "2025-12-05T12:19:39+00:00",
"generator": {
"date": "2025-12-05T12:19:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2023:6305",
"initial_release_date": "2023-11-06T11:24:51+00:00",
"revision_history": [
{
"date": "2023-11-06T11:24:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-06T11:24:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-05T12:19:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "MTA 6.1 for RHEL 8",
"product": {
"name": "MTA 6.1 for RHEL 8",
"product_id": "8Base-MTA-6.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:migration_toolkit_applications:6.1::el8"
}
}
}
],
"category": "product_family",
"name": "Migration Toolkit for Applications"
},
{
"branches": [
{
"category": "product_version",
"name": "mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"product": {
"name": "mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"product_id": "mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-hub-rhel8\u0026tag=6.1.4-2"
}
}
},
{
"category": "product_version",
"name": "mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"product": {
"name": "mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"product_id": "mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-operator-bundle\u0026tag=6.1.4-3"
}
}
},
{
"category": "product_version",
"name": "mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"product": {
"name": "mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"product_id": "mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-rhel8-operator\u0026tag=6.1.4-3"
}
}
},
{
"category": "product_version",
"name": "mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"product": {
"name": "mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"product_id": "mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-pathfinder-rhel8\u0026tag=6.1.4-1"
}
}
},
{
"category": "product_version",
"name": "mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"product": {
"name": "mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"product_id": "mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-ui-rhel8\u0026tag=6.1.4-2"
}
}
},
{
"category": "product_version",
"name": "mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64",
"product": {
"name": "mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64",
"product_id": "mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-windup-addon-rhel8\u0026tag=6.1.4-2"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64 as a component of MTA 6.1 for RHEL 8",
"product_id": "8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64"
},
"product_reference": "mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"relates_to_product_reference": "8Base-MTA-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64 as a component of MTA 6.1 for RHEL 8",
"product_id": "8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64"
},
"product_reference": "mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"relates_to_product_reference": "8Base-MTA-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64 as a component of MTA 6.1 for RHEL 8",
"product_id": "8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64"
},
"product_reference": "mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"relates_to_product_reference": "8Base-MTA-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64 as a component of MTA 6.1 for RHEL 8",
"product_id": "8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64"
},
"product_reference": "mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"relates_to_product_reference": "8Base-MTA-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64 as a component of MTA 6.1 for RHEL 8",
"product_id": "8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64"
},
"product_reference": "mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"relates_to_product_reference": "8Base-MTA-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64 as a component of MTA 6.1 for RHEL 8",
"product_id": "8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
},
"product_reference": "mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64",
"relates_to_product_reference": "8Base-MTA-6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-06T11:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nAs go-lang vendors its dependencies, a package may contain a library with a known vulnerability, solely because of lower tier libraries including it as a part of its dependencies, but the vulnerable code is not reachable at runtime. In such cases the issue is not exploitable. We classify these situations as \u201cNot affected\u201d or \u201cWill not fix,\u201d depending on the risk of breaking other unrelated packages.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-06T11:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6305"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-06T11:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6305"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023_1513
Vulnerability from csaf_redhat - Published: 2023-03-29 11:44 - Updated: 2024-12-17 23:01Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.4.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.10 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)\n\n* hsqldb: Untrusted input may lead to RCE attack (CVE-2022-41853)\n\n* Undertow: Infinite loop in SslConduit during close (CVE-2023-1108)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1513",
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2136141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141"
},
{
"category": "external",
"summary": "2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "2174246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
},
{
"category": "external",
"summary": "JBEAP-23572",
"url": "https://issues.redhat.com/browse/JBEAP-23572"
},
{
"category": "external",
"summary": "JBEAP-24121",
"url": "https://issues.redhat.com/browse/JBEAP-24121"
},
{
"category": "external",
"summary": "JBEAP-24172",
"url": "https://issues.redhat.com/browse/JBEAP-24172"
},
{
"category": "external",
"summary": "JBEAP-24182",
"url": "https://issues.redhat.com/browse/JBEAP-24182"
},
{
"category": "external",
"summary": "JBEAP-24220",
"url": "https://issues.redhat.com/browse/JBEAP-24220"
},
{
"category": "external",
"summary": "JBEAP-24254",
"url": "https://issues.redhat.com/browse/JBEAP-24254"
},
{
"category": "external",
"summary": "JBEAP-24292",
"url": "https://issues.redhat.com/browse/JBEAP-24292"
},
{
"category": "external",
"summary": "JBEAP-24339",
"url": "https://issues.redhat.com/browse/JBEAP-24339"
},
{
"category": "external",
"summary": "JBEAP-24341",
"url": "https://issues.redhat.com/browse/JBEAP-24341"
},
{
"category": "external",
"summary": "JBEAP-24363",
"url": "https://issues.redhat.com/browse/JBEAP-24363"
},
{
"category": "external",
"summary": "JBEAP-24372",
"url": "https://issues.redhat.com/browse/JBEAP-24372"
},
{
"category": "external",
"summary": "JBEAP-24380",
"url": "https://issues.redhat.com/browse/JBEAP-24380"
},
{
"category": "external",
"summary": "JBEAP-24383",
"url": "https://issues.redhat.com/browse/JBEAP-24383"
},
{
"category": "external",
"summary": "JBEAP-24384",
"url": "https://issues.redhat.com/browse/JBEAP-24384"
},
{
"category": "external",
"summary": "JBEAP-24385",
"url": "https://issues.redhat.com/browse/JBEAP-24385"
},
{
"category": "external",
"summary": "JBEAP-24395",
"url": "https://issues.redhat.com/browse/JBEAP-24395"
},
{
"category": "external",
"summary": "JBEAP-24507",
"url": "https://issues.redhat.com/browse/JBEAP-24507"
},
{
"category": "external",
"summary": "JBEAP-24535",
"url": "https://issues.redhat.com/browse/JBEAP-24535"
},
{
"category": "external",
"summary": "JBEAP-24574",
"url": "https://issues.redhat.com/browse/JBEAP-24574"
},
{
"category": "external",
"summary": "JBEAP-24588",
"url": "https://issues.redhat.com/browse/JBEAP-24588"
},
{
"category": "external",
"summary": "JBEAP-24605",
"url": "https://issues.redhat.com/browse/JBEAP-24605"
},
{
"category": "external",
"summary": "JBEAP-24618",
"url": "https://issues.redhat.com/browse/JBEAP-24618"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1513.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 on RHEL 8 security update",
"tracking": {
"current_release_date": "2024-12-17T23:01:56+00:00",
"generator": {
"date": "2024-12-17T23:01:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:1513",
"initial_release_date": "2023-03-29T11:44:32+00:00",
"revision_history": [
{
"date": "2023-03-29T11:44:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-03-29T11:44:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T23:01:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 8",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan@11.0.17-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.86-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata@13.4.0-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.8-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.5-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.86-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"product": {
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"product_id": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-client@1.1.16-1.Final_redhat_00002.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.50-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"product": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"product_id": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.11-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"product_id": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-wildfly-integration@1.0.7-1.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.14-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"product_id": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-mime4j@0.8.9-1.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-el-api_3.0_spec@2.0.1-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-spi@3.4.0-2.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"product_id": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-snakeyaml@1.33.0-2.SP1_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"product_id": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-26.Final_redhat_00025.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"product_id": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.23-1.SP2_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"product_id": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-native@1.0.2-3.redhat_00004.1.el8eap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"product_id": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native@1.0.2-4.redhat_00004.1.el8eap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"product_id": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.10-6.GA_redhat_00002.1.el8eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-cachestore-jdbc@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-cachestore-remote@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-client-hotrod@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-commons@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-component-annotations@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-core@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-commons@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-spi@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-v53@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-all@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-buffer@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-dns@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-haproxy@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http2@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-memcache@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-mqtt@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-redis@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-smtp@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-socks@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-stomp@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-xml@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-common@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler-proxy@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns-classes-macos@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-epoll@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-kqueue@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-unix-common@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-rxtx@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-sctp@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-udt@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata@13.4.0-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-appclient@13.4.0-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-common@13.4.0-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-ear@13.4.0-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-ejb@13.4.0-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-web@13.4.0-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-client@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-client-common@1.1.16-1.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-ejb-client@1.1.16-1.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-naming-client@1.1.16-1.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-transaction-client@1.1.16-1.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.50-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product": {
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_id": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-api@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product": {
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_id": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-common@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product": {
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_id": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-config@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_id": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product": {
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_id": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-api@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product": {
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_id": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-impl@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product": {
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-simple-schema@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product": {
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_id": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-impl@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-wildfly-integration@1.0.7-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.14-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-mime4j@0.8.9-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-el-api_3.0_spec@2.0.1-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-spi@3.4.0-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-snakeyaml@1.33.0-2.SP1_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product_id": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-26.Final_redhat_00025.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product_id": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-26.Final_redhat_00025.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product_id": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-26.Final_redhat_00025.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.23-1.SP2_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-native@1.0.2-3.redhat_00004.1.el8eap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.10-6.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.10-6.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.10-6.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.10-6.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.10-6.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.10-6.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.86-1.Final_redhat_00001.1.el8eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll-debuginfo@4.1.86-1.Final_redhat_00001.1.el8eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"product": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"product_id": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native@1.0.2-4.redhat_00004.1.el8eap?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"product": {
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"product_id": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native-wildfly@1.0.2-4.redhat_00004.1.el8eap?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64"
},
"product_reference": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64"
},
"product_reference": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch"
},
"product_reference": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch"
},
"product_reference": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch"
},
"product_reference": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch"
},
"product_reference": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src"
},
"product_reference": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch"
},
"product_reference": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch"
},
"product_reference": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch"
},
"product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch"
},
"product_reference": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src"
},
"product_reference": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-12-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150009"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SnakeYaml: Constructor Deserialization Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml\u0027s SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker\u0027s control. Due to that the impact for RHPAM is reduced to Low.\n\nRed Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml\u0027s Constructor class nor pass untrusted data to this class. When this class is used, it\u2019s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src"
],
"known_not_affected": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1471"
},
{
"category": "external",
"summary": "RHBZ#2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2",
"url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2"
}
],
"release_date": "2022-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "SnakeYaml: Constructor Deserialization Remote Code Execution"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src"
],
"known_not_affected": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src"
],
"known_not_affected": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41853",
"cwe": {
"id": "CWE-470",
"name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)"
},
"discovery_date": "2022-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2136141"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the HSQLDB package. This flaw allows untrusted inputs to execute remote code due to any static method of any Java class in the classpath, resulting in code execution by default.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hsqldb: Untrusted input may lead to RCE attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41853"
},
{
"category": "external",
"summary": "RHBZ#2136141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41853"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853"
},
{
"category": "external",
"summary": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control",
"url": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-77xx-rxvh-q682",
"url": "https://github.com/advisories/GHSA-77xx-rxvh-q682"
}
],
"release_date": "2022-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
},
{
"category": "workaround",
"details": "By default, the static methods of any class that is on the classpath are available for use and can compromise security in some systems. The optional Java system property, hsqldb.method_class_names, allows preventing access to classes other than java.lang.Math or specifying a semicolon-separated list of allowed classes. A property value that ends with .* is treated as a wild card and allows access to all class or method names formed by substitution of the * (asterisk).\n\nIn the example below, the property has been included as an argument to the Java command.\n\n java -Dhsqldb.method_class_names=\"org.me.MyClass;org.you.YourClass;org.you.lib.*\" [the rest of the command line]\n\nThe above example allows access to the methods in the two classes: org.me.MyClass and org.you.YourClass together with all the classes in the org.you.lib package. Note that if the property is not defined, no access control is performed at this level.\n\nThe user who creates a Java routine must have the relevant access privileges on the tables that are used inside the Java method.\n\nOnce the routine has been defined, the normal database access control applies to its user. The routine can be executed only by those users who have been granted EXECUTE privileges on it. Access to routines can be granted to users with GRANT EXECUTE or GRANT ALL. For example, GRANT EXECUTE ON myroutine TO PUBLIC.\n\nIn hsqldb 2.7.1, all classes by default are not accessible, except those in java.lang.Math and need to be manually enabled.",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "hsqldb: Untrusted input may lead to RCE attack"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src"
],
"known_not_affected": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-1108",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2174246"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Undertow: Infinite loop in SslConduit during close",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src"
],
"known_not_affected": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1108"
},
{
"category": "external",
"summary": "RHBZ#2174246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-m4mm-pg93-fv78",
"url": "https://github.com/advisories/GHSA-m4mm-pg93-fv78"
}
],
"release_date": "2023-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Undertow: Infinite loop in SslConduit during close"
}
]
}
RHSA-2023_2705
Vulnerability from csaf_redhat - Published: 2023-05-10 11:25 - Updated: 2024-12-17 21:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "New Red Hat Single Sign-On 7.6.3 packages are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.6.3 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.6.2, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* okhttp: information disclosure via improperly used cryptographic function (CVE-2021-0341)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2705",
"url": "https://access.redhat.com/errata/RHSA-2023:2705"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2705.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.3 security update on RHEL 7",
"tracking": {
"current_release_date": "2024-12-17T21:16:36+00:00",
"generator": {
"date": "2024-12-17T21:16:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:2705",
"initial_release_date": "2023-05-10T11:25:19+00:00",
"revision_history": [
{
"date": "2023-05-10T11:25:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-10T11:25:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:16:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Single Sign-On 7.6 for RHEL 7 Server",
"product": {
"name": "Red Hat Single Sign-On 7.6 for RHEL 7 Server",
"product_id": "7Server-RHSSO-7.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Single Sign-On"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"product": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"product_id": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.7-1.redhat_00001.1.el7sso?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"product": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"product_id": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.7-1.redhat_00001.1.el7sso?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"product": {
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"product_id": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak-server@18.0.7-1.redhat_00001.1.el7sso?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 7 Server",
"product_id": "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
},
"product_reference": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"relates_to_product_reference": "7Server-RHSSO-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src as a component of Red Hat Single Sign-On 7.6 for RHEL 7 Server",
"product_id": "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src"
},
"product_reference": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"relates_to_product_reference": "7Server-RHSSO-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 7 Server",
"product_id": "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
},
"product_reference": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"relates_to_product_reference": "7Server-RHSSO-7.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0341",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2154086"
}
],
"notes": [
{
"category": "description",
"text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "okhttp: information disclosure via improperly used cryptographic function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0341"
},
{
"category": "external",
"summary": "RHBZ#2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0341"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341"
},
{
"category": "external",
"summary": "https://source.android.com/security/bulletin/2021-02-01",
"url": "https://source.android.com/security/bulletin/2021-02-01"
}
],
"release_date": "2021-02-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2705"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "okhttp: information disclosure via improperly used cryptographic function"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2705"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2705"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2705"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2705"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2705"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2705"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
}
]
}
RHSA-2023:2707
Vulnerability from csaf_redhat - Published: 2023-05-10 11:25 - Updated: 2025-11-21 18:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "New Red Hat Single Sign-On 7.6.3 packages are now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.6.3 on RHEL 9 serves as a replacement for Red Hat Single Sign-On 7.6.2, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* okhttp: information disclosure via improperly used cryptographic function (CVE-2021-0341)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2707",
"url": "https://access.redhat.com/errata/RHSA-2023:2707"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2707.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.3 security update on RHEL 9",
"tracking": {
"current_release_date": "2025-11-21T18:40:14+00:00",
"generator": {
"date": "2025-11-21T18:40:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:2707",
"initial_release_date": "2023-05-10T11:25:29+00:00",
"revision_history": [
{
"date": "2023-05-10T11:25:29+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-10T11:25:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:40:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Single Sign-On 7.6 for RHEL 9",
"product": {
"name": "Red Hat Single Sign-On 7.6 for RHEL 9",
"product_id": "9Base-RHSSO-7.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.6::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Single Sign-On"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"product": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"product_id": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.7-1.redhat_00001.1.el9sso?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"product": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"product_id": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.7-1.redhat_00001.1.el9sso?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"product": {
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"product_id": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak-server@18.0.7-1.redhat_00001.1.el9sso?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 9",
"product_id": "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
},
"product_reference": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"relates_to_product_reference": "9Base-RHSSO-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src as a component of Red Hat Single Sign-On 7.6 for RHEL 9",
"product_id": "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src"
},
"product_reference": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"relates_to_product_reference": "9Base-RHSSO-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 9",
"product_id": "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
},
"product_reference": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"relates_to_product_reference": "9Base-RHSSO-7.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0341",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2154086"
}
],
"notes": [
{
"category": "description",
"text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "okhttp: information disclosure via improperly used cryptographic function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0341"
},
{
"category": "external",
"summary": "RHBZ#2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0341"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341"
},
{
"category": "external",
"summary": "https://source.android.com/security/bulletin/2021-02-01",
"url": "https://source.android.com/security/bulletin/2021-02-01"
}
],
"release_date": "2021-02-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2707"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "okhttp: information disclosure via improperly used cryptographic function"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2707"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2707"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2707"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2707"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2707"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2707"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
}
]
}
RHSA-2023:1512
Vulnerability from csaf_redhat - Published: 2023-03-29 11:44 - Updated: 2025-11-21 18:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.4.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.9 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.10 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)\n\n* hsqldb: Untrusted input may lead to RCE attack (CVE-2022-41853)\n\n* Undertow: Infinite loop in SslConduit during close (CVE-2023-1108)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1512",
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2136141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141"
},
{
"category": "external",
"summary": "2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "2174246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
},
{
"category": "external",
"summary": "JBEAP-23572",
"url": "https://issues.redhat.com/browse/JBEAP-23572"
},
{
"category": "external",
"summary": "JBEAP-24120",
"url": "https://issues.redhat.com/browse/JBEAP-24120"
},
{
"category": "external",
"summary": "JBEAP-24172",
"url": "https://issues.redhat.com/browse/JBEAP-24172"
},
{
"category": "external",
"summary": "JBEAP-24182",
"url": "https://issues.redhat.com/browse/JBEAP-24182"
},
{
"category": "external",
"summary": "JBEAP-24220",
"url": "https://issues.redhat.com/browse/JBEAP-24220"
},
{
"category": "external",
"summary": "JBEAP-24254",
"url": "https://issues.redhat.com/browse/JBEAP-24254"
},
{
"category": "external",
"summary": "JBEAP-24292",
"url": "https://issues.redhat.com/browse/JBEAP-24292"
},
{
"category": "external",
"summary": "JBEAP-24339",
"url": "https://issues.redhat.com/browse/JBEAP-24339"
},
{
"category": "external",
"summary": "JBEAP-24341",
"url": "https://issues.redhat.com/browse/JBEAP-24341"
},
{
"category": "external",
"summary": "JBEAP-24363",
"url": "https://issues.redhat.com/browse/JBEAP-24363"
},
{
"category": "external",
"summary": "JBEAP-24372",
"url": "https://issues.redhat.com/browse/JBEAP-24372"
},
{
"category": "external",
"summary": "JBEAP-24380",
"url": "https://issues.redhat.com/browse/JBEAP-24380"
},
{
"category": "external",
"summary": "JBEAP-24383",
"url": "https://issues.redhat.com/browse/JBEAP-24383"
},
{
"category": "external",
"summary": "JBEAP-24384",
"url": "https://issues.redhat.com/browse/JBEAP-24384"
},
{
"category": "external",
"summary": "JBEAP-24385",
"url": "https://issues.redhat.com/browse/JBEAP-24385"
},
{
"category": "external",
"summary": "JBEAP-24395",
"url": "https://issues.redhat.com/browse/JBEAP-24395"
},
{
"category": "external",
"summary": "JBEAP-24507",
"url": "https://issues.redhat.com/browse/JBEAP-24507"
},
{
"category": "external",
"summary": "JBEAP-24574",
"url": "https://issues.redhat.com/browse/JBEAP-24574"
},
{
"category": "external",
"summary": "JBEAP-24588",
"url": "https://issues.redhat.com/browse/JBEAP-24588"
},
{
"category": "external",
"summary": "JBEAP-24605",
"url": "https://issues.redhat.com/browse/JBEAP-24605"
},
{
"category": "external",
"summary": "JBEAP-24618",
"url": "https://issues.redhat.com/browse/JBEAP-24618"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1512.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 on RHEL 7 security update",
"tracking": {
"current_release_date": "2025-11-21T18:38:51+00:00",
"generator": {
"date": "2025-11-21T18:38:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:1512",
"initial_release_date": "2023-03-29T11:44:44+00:00",
"revision_history": [
{
"date": "2023-03-29T11:44:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-03-29T11:44:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:38:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.86-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.86-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.5-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan@11.0.17-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata@13.4.0-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.8-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"product": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"product_id": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.50-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"product": {
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"product_id": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-client@1.1.16-1.Final_redhat_00002.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.11-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"product_id": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-wildfly-integration@1.0.7-1.redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.14-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"product_id": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-mime4j@0.8.9-1.redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-el-api_3.0_spec@2.0.1-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-spi@3.4.0-2.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"product_id": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-26.Final_redhat_00025.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"product_id": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-snakeyaml@1.33.0-2.SP1_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"product_id": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.23-1.SP2_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"product_id": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-native@1.0.2-3.redhat_00004.1.el7eap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"product_id": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native@1.0.2-4.redhat_00004.1.el7eap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"product_id": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.10-6.GA_redhat_00002.1.el7eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-all@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-buffer@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-dns@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-haproxy@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http2@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-memcache@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-mqtt@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-redis@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-smtp@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-socks@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-stomp@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-xml@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-common@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler-proxy@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns-classes-macos@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-epoll@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-kqueue@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-unix-common@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-rxtx@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-sctp@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-udt@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-client@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-cachestore-jdbc@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-cachestore-remote@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-client-hotrod@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-commons@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-component-annotations@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-core@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-commons@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-spi@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-v53@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata@13.4.0-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-appclient@13.4.0-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-common@13.4.0-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-ear@13.4.0-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-ejb@13.4.0-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-web@13.4.0-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product": {
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_id": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-api@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product": {
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_id": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-common@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product": {
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_id": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-config@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_id": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product": {
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_id": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-api@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product": {
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_id": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-impl@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product": {
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-simple-schema@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product": {
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_id": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-impl@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.50-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-client-common@1.1.16-1.Final_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-ejb-client@1.1.16-1.Final_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-naming-client@1.1.16-1.Final_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-transaction-client@1.1.16-1.Final_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"product_id": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-wildfly-integration@1.0.7-1.redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.14-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"product_id": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-mime4j@0.8.9-1.redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-el-api_3.0_spec@2.0.1-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-spi@3.4.0-2.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-26.Final_redhat_00025.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-26.Final_redhat_00025.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-26.Final_redhat_00025.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-snakeyaml@1.33.0-2.SP1_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.23-1.SP2_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-native@1.0.2-3.redhat_00004.1.el7eap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.10-6.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.10-6.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.10-6.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.10-6.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.10-6.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.86-1.Final_redhat_00001.1.el7eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll-debuginfo@4.1.86-1.Final_redhat_00001.1.el7eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product_id": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native@1.0.2-4.redhat_00004.1.el7eap?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product": {
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product_id": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native-wildfly@1.0.2-4.redhat_00004.1.el7eap?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product": {
"name": "eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product_id": "eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native-debuginfo@1.0.2-4.redhat_00004.1.el7eap?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64"
},
"product_reference": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64"
},
"product_reference": "eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64"
},
"product_reference": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch"
},
"product_reference": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch"
},
"product_reference": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch"
},
"product_reference": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch"
},
"product_reference": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src"
},
"product_reference": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch"
},
"product_reference": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch"
},
"product_reference": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch"
},
"product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch"
},
"product_reference": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src"
},
"product_reference": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-12-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150009"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SnakeYaml: Constructor Deserialization Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml\u0027s SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker\u0027s control. Due to that the impact for RHPAM is reduced to Low.\n\nRed Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml\u0027s Constructor class nor pass untrusted data to this class. When this class is used, it\u2019s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1471"
},
{
"category": "external",
"summary": "RHBZ#2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2",
"url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2"
}
],
"release_date": "2022-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "SnakeYaml: Constructor Deserialization Remote Code Execution"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41853",
"cwe": {
"id": "CWE-470",
"name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)"
},
"discovery_date": "2022-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2136141"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the HSQLDB package. This flaw allows untrusted inputs to execute remote code due to any static method of any Java class in the classpath, resulting in code execution by default.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hsqldb: Untrusted input may lead to RCE attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41853"
},
{
"category": "external",
"summary": "RHBZ#2136141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41853"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853"
},
{
"category": "external",
"summary": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control",
"url": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-77xx-rxvh-q682",
"url": "https://github.com/advisories/GHSA-77xx-rxvh-q682"
}
],
"release_date": "2022-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
},
{
"category": "workaround",
"details": "By default, the static methods of any class that is on the classpath are available for use and can compromise security in some systems. The optional Java system property, hsqldb.method_class_names, allows preventing access to classes other than java.lang.Math or specifying a semicolon-separated list of allowed classes. A property value that ends with .* is treated as a wild card and allows access to all class or method names formed by substitution of the * (asterisk).\n\nIn the example below, the property has been included as an argument to the Java command.\n\n java -Dhsqldb.method_class_names=\"org.me.MyClass;org.you.YourClass;org.you.lib.*\" [the rest of the command line]\n\nThe above example allows access to the methods in the two classes: org.me.MyClass and org.you.YourClass together with all the classes in the org.you.lib package. Note that if the property is not defined, no access control is performed at this level.\n\nThe user who creates a Java routine must have the relevant access privileges on the tables that are used inside the Java method.\n\nOnce the routine has been defined, the normal database access control applies to its user. The routine can be executed only by those users who have been granted EXECUTE privileges on it. Access to routines can be granted to users with GRANT EXECUTE or GRANT ALL. For example, GRANT EXECUTE ON myroutine TO PUBLIC.\n\nIn hsqldb 2.7.1, all classes by default are not accessible, except those in java.lang.Math and need to be manually enabled.",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "hsqldb: Untrusted input may lead to RCE attack"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-1108",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2174246"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Undertow: Infinite loop in SslConduit during close",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1108"
},
{
"category": "external",
"summary": "RHBZ#2174246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-m4mm-pg93-fv78",
"url": "https://github.com/advisories/GHSA-m4mm-pg93-fv78"
}
],
"release_date": "2023-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Undertow: Infinite loop in SslConduit during close"
}
]
}
RHSA-2024:1353
Vulnerability from csaf_redhat - Published: 2024-03-18 09:47 - Updated: 2025-11-21 18:57Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Process Automation Manager.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which provides a detailed severity rating, is available for each vulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services.\n\nThis asynchronous security patch is an update to Red Hat Process Automation Manager 7.\n\nSecurity Fixes:\n\n* JSON-java: parser confusion leads to OOM (CVE-2023-5072)\n\n* okio: GzipSource class improper exception handling (CVE-2023-3635)\n\n* xstream: Denial of Service by injecting recursive collections or maps based on element\u0027s hash values raising a stack overflow (CVE-2022-41966)\n\n* batik: Server-Side Request Forgery vulnerability (CVE-2022-44729)\n\n* batik: Server-Side Request Forgery vulnerability (CVE-2022-44730)\n\n* bouncycastle: potential blind LDAP injection attack using a self-signed certificate (CVE-2023-33201)\n\n* xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40151)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\n* snakeyaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)\n\nFor more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1353",
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2134292",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134292"
},
{
"category": "external",
"summary": "2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "2170431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170431"
},
{
"category": "external",
"summary": "2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "2229295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229295"
},
{
"category": "external",
"summary": "2233889",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233889"
},
{
"category": "external",
"summary": "2233899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233899"
},
{
"category": "external",
"summary": "2246417",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246417"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1353.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.5 security update",
"tracking": {
"current_release_date": "2025-11-21T18:57:21+00:00",
"generator": {
"date": "2025-11-21T18:57:21+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:1353",
"initial_release_date": "2024-03-18T09:47:51+00:00",
"revision_history": [
{
"date": "2024-03-18T09:47:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-18T09:47:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:57:21+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHPAM 7.13.5 async",
"product": {
"name": "RHPAM 7.13.5 async",
"product_id": "RHPAM 7.13.5 async",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13"
}
}
}
],
"category": "product_family",
"name": "Red Hat Process Automation Manager"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150009"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SnakeYaml: Constructor Deserialization Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml\u0027s SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker\u0027s control. Due to that the impact for RHPAM is reduced to Low.\n\nRed Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml\u0027s Constructor class nor pass untrusted data to this class. When this class is used, it\u2019s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1471"
},
{
"category": "external",
"summary": "RHBZ#2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2",
"url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2"
}
],
"release_date": "2022-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "SnakeYaml: Constructor Deserialization Remote Code Execution"
},
{
"cve": "CVE-2022-40151",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134292"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the XStream package. This flaw allows an attacker to cause a denial of service (DoS) in its target via XML serialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-40151"
},
{
"category": "external",
"summary": "RHBZ#2134292",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134292"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-40151",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40151"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40151",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40151"
}
],
"release_date": "2022-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks"
},
{
"cve": "CVE-2022-41966",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2023-02-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2170431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the xstream package. This flaw allows an attacker to cause a denial of service by injecting recursive collections or maps, raising a stack overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Denial of Service by injecting recursive collections or maps based on element\u0027s hash values raising a stack overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Fuse 7 ships an affected version of XStream. No endpoint in any flavor of Fuse is accepting by default an unverified input stream passed directly to XStream unmarshaller. Documentation always recommend all the endpoints (TCP/UDP/HTTP(S)/other listeners) to have at least one layer of authentication/authorization and Fuse in general itself in particular has a lot of mechanisms to protect the endpoints.\n\nRed Hat Single Sign-On contains XStream as a transitive dependency from Infinispan and the same is not affected as NO_REFERENCE is in use.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41966"
},
{
"category": "external",
"summary": "RHBZ#2170431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41966"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-j563-grx4-pjpv",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-j563-grx4-pjpv"
}
],
"release_date": "2022-12-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xstream: Denial of Service by injecting recursive collections or maps based on element\u0027s hash values raising a stack overflow"
},
{
"cve": "CVE-2022-44729",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"discovery_date": "2023-08-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2233889"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Batik 1.0 - 1.16. This issue occurs due to a malicious SVG triggering external resources loading by default, causing resource consumption or in some cases information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "batik: Server-Side Request Forgery vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-44729"
},
{
"category": "external",
"summary": "RHBZ#2233889",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233889"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-44729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-44729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44729"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-gq5f-xv48-2365",
"url": "https://github.com/advisories/GHSA-gq5f-xv48-2365"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2",
"url": "https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2"
}
],
"release_date": "2023-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "batik: Server-Side Request Forgery vulnerability"
},
{
"cve": "CVE-2022-44730",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"discovery_date": "2023-08-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2233899"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Batik, where a malicious SVG can probe user profile data and send it directly as parameter to a URL. This issue can allow an attacker to conduct SSRF attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "batik: Server-Side Request Forgery vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-44730"
},
{
"category": "external",
"summary": "RHBZ#2233899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233899"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-44730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44730"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-44730",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44730"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-2474-2566-3qxp",
"url": "https://github.com/advisories/GHSA-2474-2566-3qxp"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/58m5817jr059f4v1zogh0fngj9pwjyj0",
"url": "https://lists.apache.org/thread/58m5817jr059f4v1zogh0fngj9pwjyj0"
}
],
"release_date": "2023-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "batik: Server-Side Request Forgery vulnerability"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-3635",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2023-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2229295"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in SquareUp Okio. A class GzipSource does not handle an exception that might be raised when parsing a malformed gzip buffer. This issue may allow a malicious user to start processing a malformed file, which can result in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "okio: GzipSource class improper exception handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss Enterprise Application Platform XP does contain Okio package but is not using GzipSource.java, which is the affected class.\nRed Hat support for Spring Boot is considered low impact as it\u0027s used by Dekorate during compilation process and not included in the resulting Jar.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3635"
},
{
"category": "external",
"summary": "RHBZ#2229295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229295"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3635"
}
],
"release_date": "2023-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "okio: GzipSource class improper exception handling"
},
{
"cve": "CVE-2023-5072",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-10-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246417"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the org.json package. A bug in the parser exists, and an input string may lead to undefined usage of memory, leading to an out-of-memory error, causing a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JSON-java: parser confusion leads to OOM",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability may cause denial of service with a small string input, causing the server to be unresponsive easily, hence the Important impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5072"
},
{
"category": "external",
"summary": "RHBZ#2246417",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246417"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5072"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5072",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5072"
},
{
"category": "external",
"summary": "https://github.com/stleary/JSON-java/issues/758",
"url": "https://github.com/stleary/JSON-java/issues/758"
},
{
"category": "external",
"summary": "https://github.com/stleary/JSON-java/issues/771",
"url": "https://github.com/stleary/JSON-java/issues/771"
}
],
"release_date": "2023-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
},
{
"category": "workaround",
"details": "No current mitigation is available for this flaw.",
"product_ids": [
"RHPAM 7.13.5 async"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JSON-java: parser confusion leads to OOM"
},
{
"cve": "CVE-2023-6481",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2252956"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the logback package. Affected versions of this package are vulnerable to Uncontrolled Resource Consumption (\u0027Resource Exhaustion\u0027) via the logback receiver component. This flaw allows an attacker to mount a denial-of-service attack by sending poisoned data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "logback: A serialization vulnerability in logback receiver",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The security vulnerability in the logback package is considered of moderate severity due to its potential for facilitating a denial-of-service (DoS) attack. While a DoS attack can disrupt service availability, this vulnerability may not lead to more severe consequences such as unauthorized access or data breaches.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6481"
},
{
"category": "external",
"summary": "RHBZ#2252956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252956"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6481",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6481"
}
],
"release_date": "2023-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"RHPAM 7.13.5 async"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "logback: A serialization vulnerability in logback receiver"
},
{
"cve": "CVE-2023-6717",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-12-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253952"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow a malicious admin in one realm or a client with registration access to target users in different realms or applications, executing arbitrary JavaScript in their contexts upon form submission. This can enable unauthorized access and harmful actions, compromising the confidentiality, integrity, and availability of the complete KC instance.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "keycloak: XSS via assertion consumer service URL in SAML POST-binding flow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6717"
},
{
"category": "external",
"summary": "RHBZ#2253952",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253952"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6717"
}
],
"release_date": "2024-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "keycloak: XSS via assertion consumer service URL in SAML POST-binding flow"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-06-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Bouncy Castle 1.73. This issue targets the fix of LDAP wild cards. Before the fix there was no validation for the X.500 name of any certificate, subject, or issuer, so the presence of a wild card may lead to information disclosure. This could allow a malicious user to obtain unauthorized information via blind LDAP Injection, exploring the environment and enumerating data. The exploit depends on the structure of the target LDAP directory as well as what kind of errors are exposed to the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-33201"
},
{
"category": "external",
"summary": "RHBZ#2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201"
},
{
"category": "external",
"summary": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201",
"url": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201"
}
],
"release_date": "2023-06-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate"
}
]
}
RHSA-2023_2706
Vulnerability from csaf_redhat - Published: 2023-05-10 11:25 - Updated: 2024-12-17 21:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "New Red Hat Single Sign-On 7.6.3 packages are now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.6.3 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.6.2, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* okhttp: information disclosure via improperly used cryptographic function (CVE-2021-0341)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2706",
"url": "https://access.redhat.com/errata/RHSA-2023:2706"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2706.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.3 security update on RHEL 8",
"tracking": {
"current_release_date": "2024-12-17T21:16:47+00:00",
"generator": {
"date": "2024-12-17T21:16:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:2706",
"initial_release_date": "2023-05-10T11:25:30+00:00",
"revision_history": [
{
"date": "2023-05-10T11:25:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-10T11:25:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:16:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Single Sign-On 7.6 for RHEL 8",
"product": {
"name": "Red Hat Single Sign-On 7.6 for RHEL 8",
"product_id": "8Base-RHSSO-7.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Single Sign-On"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"product": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"product_id": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.7-1.redhat_00001.1.el8sso?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"product": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"product_id": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.7-1.redhat_00001.1.el8sso?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"product": {
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"product_id": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak-server@18.0.7-1.redhat_00001.1.el8sso?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 8",
"product_id": "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
},
"product_reference": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"relates_to_product_reference": "8Base-RHSSO-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src as a component of Red Hat Single Sign-On 7.6 for RHEL 8",
"product_id": "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src"
},
"product_reference": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"relates_to_product_reference": "8Base-RHSSO-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 8",
"product_id": "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
},
"product_reference": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"relates_to_product_reference": "8Base-RHSSO-7.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0341",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2154086"
}
],
"notes": [
{
"category": "description",
"text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "okhttp: information disclosure via improperly used cryptographic function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0341"
},
{
"category": "external",
"summary": "RHBZ#2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0341"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341"
},
{
"category": "external",
"summary": "https://source.android.com/security/bulletin/2021-02-01",
"url": "https://source.android.com/security/bulletin/2021-02-01"
}
],
"release_date": "2021-02-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:30+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "okhttp: information disclosure via improperly used cryptographic function"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:30+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:30+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:30+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:30+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:30+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:30+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
}
]
}
RHSA-2023_2713
Vulnerability from csaf_redhat - Published: 2023-05-10 11:59 - Updated: 2024-12-17 21:17Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat Single Sign-On 7.6 from the Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.6.3 serves as a replacement for Red Hat Single Sign-On 7.6.2, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* okhttp: information disclosure via improperly used cryptographic function (CVE-2021-0341)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2713",
"url": "https://access.redhat.com/errata/RHSA-2023:2713"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso\u0026downloadType=securityPatches\u0026version=7.6",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso\u0026downloadType=securityPatches\u0026version=7.6"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2713.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.3 security update",
"tracking": {
"current_release_date": "2024-12-17T21:17:16+00:00",
"generator": {
"date": "2024-12-17T21:17:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:2713",
"initial_release_date": "2023-05-10T11:59:30+00:00",
"revision_history": [
{
"date": "2023-05-10T11:59:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-10T11:59:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:17:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Single Sign-On 7",
"product": {
"name": "Red Hat Single Sign-On 7",
"product_id": "Red Hat Single Sign-On 7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.6.3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Single Sign-On"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0341",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2154086"
}
],
"notes": [
{
"category": "description",
"text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "okhttp: information disclosure via improperly used cryptographic function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Single Sign-On 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0341"
},
{
"category": "external",
"summary": "RHBZ#2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0341"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341"
},
{
"category": "external",
"summary": "https://source.android.com/security/bulletin/2021-02-01",
"url": "https://source.android.com/security/bulletin/2021-02-01"
}
],
"release_date": "2021-02-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:59:30+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Single Sign-On 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Single Sign-On 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "okhttp: information disclosure via improperly used cryptographic function"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Single Sign-On 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:59:30+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Single Sign-On 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Single Sign-On 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Single Sign-On 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:59:30+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Single Sign-On 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Single Sign-On 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Single Sign-On 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:59:30+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Single Sign-On 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Single Sign-On 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Single Sign-On 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:59:30+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Single Sign-On 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Single Sign-On 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Single Sign-On 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:59:30+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Single Sign-On 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Single Sign-On 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Single Sign-On 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:59:30+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Single Sign-On 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Single Sign-On 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
}
]
}
RHSA-2023_1514
Vulnerability from csaf_redhat - Published: 2023-03-29 11:43 - Updated: 2024-12-17 23:02Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.4.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.10 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)\n\n* hsqldb: Untrusted input may lead to RCE attack (CVE-2022-41853)\n\n* Undertow: Infinite loop in SslConduit during close (CVE-2023-1108)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1514",
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2136141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141"
},
{
"category": "external",
"summary": "2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "2174246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
},
{
"category": "external",
"summary": "JBEAP-23572",
"url": "https://issues.redhat.com/browse/JBEAP-23572"
},
{
"category": "external",
"summary": "JBEAP-24122",
"url": "https://issues.redhat.com/browse/JBEAP-24122"
},
{
"category": "external",
"summary": "JBEAP-24172",
"url": "https://issues.redhat.com/browse/JBEAP-24172"
},
{
"category": "external",
"summary": "JBEAP-24182",
"url": "https://issues.redhat.com/browse/JBEAP-24182"
},
{
"category": "external",
"summary": "JBEAP-24220",
"url": "https://issues.redhat.com/browse/JBEAP-24220"
},
{
"category": "external",
"summary": "JBEAP-24254",
"url": "https://issues.redhat.com/browse/JBEAP-24254"
},
{
"category": "external",
"summary": "JBEAP-24292",
"url": "https://issues.redhat.com/browse/JBEAP-24292"
},
{
"category": "external",
"summary": "JBEAP-24339",
"url": "https://issues.redhat.com/browse/JBEAP-24339"
},
{
"category": "external",
"summary": "JBEAP-24341",
"url": "https://issues.redhat.com/browse/JBEAP-24341"
},
{
"category": "external",
"summary": "JBEAP-24363",
"url": "https://issues.redhat.com/browse/JBEAP-24363"
},
{
"category": "external",
"summary": "JBEAP-24372",
"url": "https://issues.redhat.com/browse/JBEAP-24372"
},
{
"category": "external",
"summary": "JBEAP-24380",
"url": "https://issues.redhat.com/browse/JBEAP-24380"
},
{
"category": "external",
"summary": "JBEAP-24383",
"url": "https://issues.redhat.com/browse/JBEAP-24383"
},
{
"category": "external",
"summary": "JBEAP-24384",
"url": "https://issues.redhat.com/browse/JBEAP-24384"
},
{
"category": "external",
"summary": "JBEAP-24385",
"url": "https://issues.redhat.com/browse/JBEAP-24385"
},
{
"category": "external",
"summary": "JBEAP-24395",
"url": "https://issues.redhat.com/browse/JBEAP-24395"
},
{
"category": "external",
"summary": "JBEAP-24507",
"url": "https://issues.redhat.com/browse/JBEAP-24507"
},
{
"category": "external",
"summary": "JBEAP-24535",
"url": "https://issues.redhat.com/browse/JBEAP-24535"
},
{
"category": "external",
"summary": "JBEAP-24574",
"url": "https://issues.redhat.com/browse/JBEAP-24574"
},
{
"category": "external",
"summary": "JBEAP-24588",
"url": "https://issues.redhat.com/browse/JBEAP-24588"
},
{
"category": "external",
"summary": "JBEAP-24605",
"url": "https://issues.redhat.com/browse/JBEAP-24605"
},
{
"category": "external",
"summary": "JBEAP-24618",
"url": "https://issues.redhat.com/browse/JBEAP-24618"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1514.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 on RHEL 9 security update",
"tracking": {
"current_release_date": "2024-12-17T23:02:06+00:00",
"generator": {
"date": "2024-12-17T23:02:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:1514",
"initial_release_date": "2023-03-29T11:43:38+00:00",
"revision_history": [
{
"date": "2023-03-29T11:43:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-03-29T11:43:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T23:02:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 9",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan@11.0.17-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.86-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.8-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata@13.4.0-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.5-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.86-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.50-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"product": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"product_id": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"product": {
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"product_id": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-client@1.1.16-1.Final_redhat_00002.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.11-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"product_id": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-wildfly-integration@1.0.7-1.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.14-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"product_id": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-mime4j@0.8.9-1.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-el-api_3.0_spec@2.0.1-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-spi@3.4.0-2.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"product_id": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-26.Final_redhat_00025.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"product_id": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-snakeyaml@1.33.0-2.SP1_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"product_id": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.23-1.SP2_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"product_id": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-native@1.0.2-3.redhat_00004.1.el9eap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"product_id": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native@1.0.2-4.redhat_00004.1.el9eap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"product_id": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.10-6.GA_redhat_00002.1.el9eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-cachestore-jdbc@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-cachestore-remote@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-client-hotrod@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-commons@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-component-annotations@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-core@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-commons@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-spi@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-v53@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-buffer@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-dns@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-haproxy@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http2@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-memcache@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-mqtt@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-redis@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-smtp@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-socks@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-stomp@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-xml@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-common@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler-proxy@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns-classes-macos@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-epoll@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-kqueue@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-unix-common@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-rxtx@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-sctp@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-udt@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata@13.4.0-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-appclient@13.4.0-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-common@13.4.0-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-ear@13.4.0-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-ejb@13.4.0-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-web@13.4.0-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-client@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.50-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product": {
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_id": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-api@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product": {
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_id": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-common@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product": {
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_id": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-config@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_id": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product": {
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_id": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-api@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product": {
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_id": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-impl@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product": {
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-simple-schema@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product": {
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_id": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-impl@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-client-common@1.1.16-1.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-ejb-client@1.1.16-1.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-naming-client@1.1.16-1.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-transaction-client@1.1.16-1.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-wildfly-integration@1.0.7-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.14-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-mime4j@0.8.9-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-el-api_3.0_spec@2.0.1-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-spi@3.4.0-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product_id": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-26.Final_redhat_00025.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product_id": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-26.Final_redhat_00025.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product_id": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-26.Final_redhat_00025.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-snakeyaml@1.33.0-2.SP1_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.23-1.SP2_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-native@1.0.2-3.redhat_00004.1.el9eap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.10-6.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.10-6.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.10-6.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.10-6.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.10-6.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.10-6.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.86-1.Final_redhat_00001.1.el9eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll-debuginfo@4.1.86-1.Final_redhat_00001.1.el9eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"product": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"product_id": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native@1.0.2-4.redhat_00004.1.el9eap?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"product": {
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"product_id": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native-wildfly@1.0.2-4.redhat_00004.1.el9eap?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64"
},
"product_reference": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64"
},
"product_reference": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch"
},
"product_reference": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch"
},
"product_reference": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch"
},
"product_reference": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch"
},
"product_reference": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src"
},
"product_reference": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch"
},
"product_reference": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch"
},
"product_reference": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch"
},
"product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch"
},
"product_reference": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src"
},
"product_reference": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-12-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150009"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SnakeYaml: Constructor Deserialization Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml\u0027s SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker\u0027s control. Due to that the impact for RHPAM is reduced to Low.\n\nRed Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml\u0027s Constructor class nor pass untrusted data to this class. When this class is used, it\u2019s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src"
],
"known_not_affected": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1471"
},
{
"category": "external",
"summary": "RHBZ#2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2",
"url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2"
}
],
"release_date": "2022-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "SnakeYaml: Constructor Deserialization Remote Code Execution"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src"
],
"known_not_affected": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src"
],
"known_not_affected": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41853",
"cwe": {
"id": "CWE-470",
"name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)"
},
"discovery_date": "2022-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2136141"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the HSQLDB package. This flaw allows untrusted inputs to execute remote code due to any static method of any Java class in the classpath, resulting in code execution by default.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hsqldb: Untrusted input may lead to RCE attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41853"
},
{
"category": "external",
"summary": "RHBZ#2136141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41853"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853"
},
{
"category": "external",
"summary": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control",
"url": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-77xx-rxvh-q682",
"url": "https://github.com/advisories/GHSA-77xx-rxvh-q682"
}
],
"release_date": "2022-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
},
{
"category": "workaround",
"details": "By default, the static methods of any class that is on the classpath are available for use and can compromise security in some systems. The optional Java system property, hsqldb.method_class_names, allows preventing access to classes other than java.lang.Math or specifying a semicolon-separated list of allowed classes. A property value that ends with .* is treated as a wild card and allows access to all class or method names formed by substitution of the * (asterisk).\n\nIn the example below, the property has been included as an argument to the Java command.\n\n java -Dhsqldb.method_class_names=\"org.me.MyClass;org.you.YourClass;org.you.lib.*\" [the rest of the command line]\n\nThe above example allows access to the methods in the two classes: org.me.MyClass and org.you.YourClass together with all the classes in the org.you.lib package. Note that if the property is not defined, no access control is performed at this level.\n\nThe user who creates a Java routine must have the relevant access privileges on the tables that are used inside the Java method.\n\nOnce the routine has been defined, the normal database access control applies to its user. The routine can be executed only by those users who have been granted EXECUTE privileges on it. Access to routines can be granted to users with GRANT EXECUTE or GRANT ALL. For example, GRANT EXECUTE ON myroutine TO PUBLIC.\n\nIn hsqldb 2.7.1, all classes by default are not accessible, except those in java.lang.Math and need to be manually enabled.",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "hsqldb: Untrusted input may lead to RCE attack"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src"
],
"known_not_affected": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
],
"known_not_affected": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
],
"known_not_affected": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-1108",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2174246"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Undertow: Infinite loop in SslConduit during close",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src"
],
"known_not_affected": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1108"
},
{
"category": "external",
"summary": "RHBZ#2174246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-m4mm-pg93-fv78",
"url": "https://github.com/advisories/GHSA-m4mm-pg93-fv78"
}
],
"release_date": "2023-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Undertow: Infinite loop in SslConduit during close"
}
]
}
RHSA-2023:1516
Vulnerability from csaf_redhat - Published: 2023-03-29 11:45 - Updated: 2025-11-21 18:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.4.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.10 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)\n\n* hsqldb: Untrusted input may lead to RCE attack (CVE-2022-41853)\n\n* Undertow: Infinite loop in SslConduit during close (CVE-2023-1108)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1516",
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=appplatform\u0026version=7.4",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=appplatform\u0026version=7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2136141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141"
},
{
"category": "external",
"summary": "2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "2174246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
},
{
"category": "external",
"summary": "JBEAP-23572",
"url": "https://issues.redhat.com/browse/JBEAP-23572"
},
{
"category": "external",
"summary": "JBEAP-24172",
"url": "https://issues.redhat.com/browse/JBEAP-24172"
},
{
"category": "external",
"summary": "JBEAP-24182",
"url": "https://issues.redhat.com/browse/JBEAP-24182"
},
{
"category": "external",
"summary": "JBEAP-24220",
"url": "https://issues.redhat.com/browse/JBEAP-24220"
},
{
"category": "external",
"summary": "JBEAP-24254",
"url": "https://issues.redhat.com/browse/JBEAP-24254"
},
{
"category": "external",
"summary": "JBEAP-24292",
"url": "https://issues.redhat.com/browse/JBEAP-24292"
},
{
"category": "external",
"summary": "JBEAP-24339",
"url": "https://issues.redhat.com/browse/JBEAP-24339"
},
{
"category": "external",
"summary": "JBEAP-24341",
"url": "https://issues.redhat.com/browse/JBEAP-24341"
},
{
"category": "external",
"summary": "JBEAP-24363",
"url": "https://issues.redhat.com/browse/JBEAP-24363"
},
{
"category": "external",
"summary": "JBEAP-24372",
"url": "https://issues.redhat.com/browse/JBEAP-24372"
},
{
"category": "external",
"summary": "JBEAP-24380",
"url": "https://issues.redhat.com/browse/JBEAP-24380"
},
{
"category": "external",
"summary": "JBEAP-24383",
"url": "https://issues.redhat.com/browse/JBEAP-24383"
},
{
"category": "external",
"summary": "JBEAP-24384",
"url": "https://issues.redhat.com/browse/JBEAP-24384"
},
{
"category": "external",
"summary": "JBEAP-24385",
"url": "https://issues.redhat.com/browse/JBEAP-24385"
},
{
"category": "external",
"summary": "JBEAP-24395",
"url": "https://issues.redhat.com/browse/JBEAP-24395"
},
{
"category": "external",
"summary": "JBEAP-24507",
"url": "https://issues.redhat.com/browse/JBEAP-24507"
},
{
"category": "external",
"summary": "JBEAP-24574",
"url": "https://issues.redhat.com/browse/JBEAP-24574"
},
{
"category": "external",
"summary": "JBEAP-24588",
"url": "https://issues.redhat.com/browse/JBEAP-24588"
},
{
"category": "external",
"summary": "JBEAP-24605",
"url": "https://issues.redhat.com/browse/JBEAP-24605"
},
{
"category": "external",
"summary": "JBEAP-24618",
"url": "https://issues.redhat.com/browse/JBEAP-24618"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1516.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 security update",
"tracking": {
"current_release_date": "2025-11-21T18:38:52+00:00",
"generator": {
"date": "2025-11-21T18:38:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:1516",
"initial_release_date": "2023-03-29T11:45:38+00:00",
"revision_history": [
{
"date": "2023-03-29T11:45:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-23T23:09:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:38:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 7",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 7",
"product_id": "Red Hat JBoss Enterprise Application Platform 7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150009"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SnakeYaml: Constructor Deserialization Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml\u0027s SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker\u0027s control. Due to that the impact for RHPAM is reduced to Low.\n\nRed Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml\u0027s Constructor class nor pass untrusted data to this class. When this class is used, it\u2019s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1471"
},
{
"category": "external",
"summary": "RHBZ#2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2",
"url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2"
}
],
"release_date": "2022-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "SnakeYaml: Constructor Deserialization Remote Code Execution"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41853",
"cwe": {
"id": "CWE-470",
"name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)"
},
"discovery_date": "2022-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2136141"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the HSQLDB package. This flaw allows untrusted inputs to execute remote code due to any static method of any Java class in the classpath, resulting in code execution by default.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hsqldb: Untrusted input may lead to RCE attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41853"
},
{
"category": "external",
"summary": "RHBZ#2136141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41853"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853"
},
{
"category": "external",
"summary": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control",
"url": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-77xx-rxvh-q682",
"url": "https://github.com/advisories/GHSA-77xx-rxvh-q682"
}
],
"release_date": "2022-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
},
{
"category": "workaround",
"details": "By default, the static methods of any class that is on the classpath are available for use and can compromise security in some systems. The optional Java system property, hsqldb.method_class_names, allows preventing access to classes other than java.lang.Math or specifying a semicolon-separated list of allowed classes. A property value that ends with .* is treated as a wild card and allows access to all class or method names formed by substitution of the * (asterisk).\n\nIn the example below, the property has been included as an argument to the Java command.\n\n java -Dhsqldb.method_class_names=\"org.me.MyClass;org.you.YourClass;org.you.lib.*\" [the rest of the command line]\n\nThe above example allows access to the methods in the two classes: org.me.MyClass and org.you.YourClass together with all the classes in the org.you.lib package. Note that if the property is not defined, no access control is performed at this level.\n\nThe user who creates a Java routine must have the relevant access privileges on the tables that are used inside the Java method.\n\nOnce the routine has been defined, the normal database access control applies to its user. The routine can be executed only by those users who have been granted EXECUTE privileges on it. Access to routines can be granted to users with GRANT EXECUTE or GRANT ALL. For example, GRANT EXECUTE ON myroutine TO PUBLIC.\n\nIn hsqldb 2.7.1, all classes by default are not accessible, except those in java.lang.Math and need to be manually enabled.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "hsqldb: Untrusted input may lead to RCE attack"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-1108",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2174246"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Undertow: Infinite loop in SslConduit during close",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1108"
},
{
"category": "external",
"summary": "RHBZ#2174246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-m4mm-pg93-fv78",
"url": "https://github.com/advisories/GHSA-m4mm-pg93-fv78"
}
],
"release_date": "2023-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Undertow: Infinite loop in SslConduit during close"
}
]
}
RHSA-2023:2706
Vulnerability from csaf_redhat - Published: 2023-05-10 11:25 - Updated: 2025-11-21 18:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "New Red Hat Single Sign-On 7.6.3 packages are now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.6.3 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.6.2, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* okhttp: information disclosure via improperly used cryptographic function (CVE-2021-0341)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2706",
"url": "https://access.redhat.com/errata/RHSA-2023:2706"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2706.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.3 security update on RHEL 8",
"tracking": {
"current_release_date": "2025-11-21T18:40:14+00:00",
"generator": {
"date": "2025-11-21T18:40:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:2706",
"initial_release_date": "2023-05-10T11:25:30+00:00",
"revision_history": [
{
"date": "2023-05-10T11:25:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-10T11:25:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:40:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Single Sign-On 7.6 for RHEL 8",
"product": {
"name": "Red Hat Single Sign-On 7.6 for RHEL 8",
"product_id": "8Base-RHSSO-7.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.6::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Single Sign-On"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"product": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"product_id": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.7-1.redhat_00001.1.el8sso?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"product": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"product_id": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.7-1.redhat_00001.1.el8sso?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"product": {
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"product_id": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak-server@18.0.7-1.redhat_00001.1.el8sso?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 8",
"product_id": "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
},
"product_reference": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"relates_to_product_reference": "8Base-RHSSO-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src as a component of Red Hat Single Sign-On 7.6 for RHEL 8",
"product_id": "8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src"
},
"product_reference": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"relates_to_product_reference": "8Base-RHSSO-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 8",
"product_id": "8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
},
"product_reference": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"relates_to_product_reference": "8Base-RHSSO-7.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0341",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2154086"
}
],
"notes": [
{
"category": "description",
"text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "okhttp: information disclosure via improperly used cryptographic function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0341"
},
{
"category": "external",
"summary": "RHBZ#2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0341"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341"
},
{
"category": "external",
"summary": "https://source.android.com/security/bulletin/2021-02-01",
"url": "https://source.android.com/security/bulletin/2021-02-01"
}
],
"release_date": "2021-02-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:30+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "okhttp: information disclosure via improperly used cryptographic function"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:30+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:30+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:30+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:30+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:30+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:30+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2706"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.noarch",
"8Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el8sso.src",
"8Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el8sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
}
]
}
RHSA-2023_5165
Vulnerability from csaf_redhat - Published: 2023-09-14 09:51 - Updated: 2024-12-17 23:02Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat AMQ Streams 2.5.0 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat AMQ Streams, based on the Apache Kafka project, offers a distributed backbone that allows microservices and other applications to share data with extremely high throughput and extremely low latency.\n\nSecurity Fix(es):\n\n* snakeyaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)\n \n* scala: deserialization gadget chain (CVE-2022-36944)\n\n* DoS of the Okio client when handling a crafted GZIP archive (CVE-2023-3635)\n \n* netty-codec: Bzip2Decoder doesn\u0027t allow setting size restrictions for decompressed data (CVE-2021-37136)\n\n* netty-codec: SnappyFrameDecoder doesn\u0027t restrict chunk length and may buffer skippable chunks in an unnecessary way (CVE-2021-37137)\n\n* netty: world readable temporary file containing sensitive data (CVE-2022-24823)\n\n* guava: insecure temporary directory creation (CVE-2023-2976)\n\n* Jetty servlets with multipart support may cause OOM error with client requests (CVE-2023-26048)\n\n* Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies (CVE-2023-26049)\n\n* bouncycastle: potential blind LDAP injection attack using a self-signed certificate (CVE-2023-33201)\n\n* snappy-java: Integer overflow in shuffle leads to DoS (CVE-2023-34453)\n\n* snappy-java: Integer overflow in compress leads to DoS (CVE-2023-34454)\n\n* snappy-java: Unchecked chunk length leads to DoS (CVE-2023-34455)\n\n* Flaw in Netty\u0027s SniHandler while navigating TLS handshake; DoS (CVE-2023-34462)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5165",
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.streams\u0026version=2.5.0",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.streams\u0026version=2.5.0"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_amq_streams/2.5",
"url": "https://access.redhat.com/documentation/en-us/red_hat_amq_streams/2.5"
},
{
"category": "external",
"summary": "2004133",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004133"
},
{
"category": "external",
"summary": "2004135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004135"
},
{
"category": "external",
"summary": "2087186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087186"
},
{
"category": "external",
"summary": "2129809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129809"
},
{
"category": "external",
"summary": "2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "2215229",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215229"
},
{
"category": "external",
"summary": "2215393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215393"
},
{
"category": "external",
"summary": "2215394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215394"
},
{
"category": "external",
"summary": "2215445",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215445"
},
{
"category": "external",
"summary": "2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "2216888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216888"
},
{
"category": "external",
"summary": "2229295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229295"
},
{
"category": "external",
"summary": "2236340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236340"
},
{
"category": "external",
"summary": "2236341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236341"
},
{
"category": "external",
"summary": "ENTMQST-5081",
"url": "https://issues.redhat.com/browse/ENTMQST-5081"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5165.json"
}
],
"title": "Red Hat Security Advisory: Red Hat AMQ Streams 2.5.0 release and security update",
"tracking": {
"current_release_date": "2024-12-17T23:02:10+00:00",
"generator": {
"date": "2024-12-17T23:02:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:5165",
"initial_release_date": "2023-09-14T09:51:43+00:00",
"revision_history": [
{
"date": "2023-09-14T09:51:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-09-14T09:51:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T23:02:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat AMQ Streams 2.5.0",
"product": {
"name": "Red Hat AMQ Streams 2.5.0",
"product_id": "Red Hat AMQ Streams 2.5.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:amq_streams:2"
}
}
}
],
"category": "product_family",
"name": "Streams for Apache Kafka"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-37136",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2004133"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty\u0027s netty-codec due to size restrictions for decompressed data in the Bzip2Decoder. By sending a specially-crafted input, a remote attacker could cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty-codec: Bzip2Decoder doesn\u0027t allow setting size restrictions for decompressed data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack ship the vulnerable version of netty-codec package. Since the release of OCP 4.6, the Metering product has been deprecated [1], so the affected components are marked as wontfix. This may be fixed in the future.\n\nStarting in OCP 4.7, the elasticsearch component is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37136"
},
{
"category": "external",
"summary": "RHBZ#2004133",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004133"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37136"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37136",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37136"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv",
"url": "https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv"
}
],
"release_date": "2021-09-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty-codec: Bzip2Decoder doesn\u0027t allow setting size restrictions for decompressed data"
},
{
"cve": "CVE-2021-37137",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2004135"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Netty\u0027s netty-codec due to unrestricted chunk lengths in the SnappyFrameDecoder. By sending a specially-crafted input, a remote attacker could cause excessive memory usage resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty-codec: SnappyFrameDecoder doesn\u0027t restrict chunk length and may buffer skippable chunks in an unnecessary way",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of netty-codec package.\nSince the release of OCP 4.6, the Metering product has been deprecated [1], hence the affected components are marked as wontfix.\nThis may be fixed in the future.\n\nStarting in OCP 4.7, the elasticsearch component is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37137"
},
{
"category": "external",
"summary": "RHBZ#2004135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37137",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37137"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv",
"url": "https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv"
}
],
"release_date": "2021-09-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty-codec: SnappyFrameDecoder doesn\u0027t restrict chunk length and may buffer skippable chunks in an unnecessary way"
},
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150009"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SnakeYaml: Constructor Deserialization Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml\u0027s SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker\u0027s control. Due to that the impact for RHPAM is reduced to Low.\n\nRed Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml\u0027s Constructor class nor pass untrusted data to this class. When this class is used, it\u2019s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1471"
},
{
"category": "external",
"summary": "RHBZ#2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2",
"url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2"
}
],
"release_date": "2022-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "SnakeYaml: Constructor Deserialization Remote Code Execution"
},
{
"cve": "CVE-2022-24823",
"cwe": {
"id": "CWE-379",
"name": "Creation of Temporary File in Directory with Insecure Permissions"
},
"discovery_date": "2022-05-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2087186"
}
],
"notes": [
{
"category": "description",
"text": "CVE-2021-21290 contains an incomplete fix, and this addresses the issue found in netty. When using multipart decoders in netty, local information disclosure can occur via the local system temporary directory if temporary storing of uploads on the disk is enabled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: world readable temporary file containing sensitive data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users.\n\nRed Hat Satellite 6 is not affected as is using netty 3.6.7 version which is not impacted by this vulnerability.\n\nRed Hat Fuse 7 is now in Maintenance Support Phase and should be fixed soon. However, Red Hat Fuse Online (Syndesis) does will not contain the fix for this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24823"
},
{
"category": "external",
"summary": "RHBZ#2087186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087186"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24823"
}
],
"release_date": "2022-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
},
{
"category": "workaround",
"details": "As a workaround, specify one\u0027s own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty: world readable temporary file containing sensitive data"
},
{
"cve": "CVE-2022-36944",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129809"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Scala\u0027s LazyList that permits code execution during deserialization. This issue could allow an attacker to craft a LazyList containing a malicious Function0 call to execute arbitrary code on a server that deserializes untrusted data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "scala: deserialization gadget chain",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-36944"
},
{
"category": "external",
"summary": "RHBZ#2129809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-36944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36944"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36944",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36944"
},
{
"category": "external",
"summary": "https://github.com/scala/scala/pull/10118",
"url": "https://github.com/scala/scala/pull/10118"
}
],
"release_date": "2022-09-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
},
{
"category": "workaround",
"details": "Users of Scala\u0027s LazyList should never permit deserialization of untrusted data.",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "scala: deserialization gadget chain"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-2976",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"discovery_date": "2023-06-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215229"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Guava. The methodology for temporary directories and files can allow other local users or apps with accordant permissions to access the temp files, possibly leading to information exposure or tampering in the files created in the directory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "guava: insecure temporary directory creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Single Sign-On 7 ships the affected component as a layered product of Red Hat JBoss Enterprise Application 7, and as such is affected by this flaw. However, Single Sign-On 7 does not use the affected code and is not vulnerable to exploit.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-2976"
},
{
"category": "external",
"summary": "RHBZ#2215229",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215229"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2976",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2976"
}
],
"release_date": "2023-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
},
{
"category": "workaround",
"details": "Temp files should be created with sufficiently non-predictable names and in a secure-permissioned, dedicated temp folder.",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "guava: insecure temporary directory creation"
},
{
"cve": "CVE-2023-3635",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2023-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2229295"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in SquareUp Okio. A class GzipSource does not handle an exception that might be raised when parsing a malformed gzip buffer. This issue may allow a malicious user to start processing a malformed file, which can result in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "okio: GzipSource class improper exception handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss Enterprise Application Platform XP does contain Okio package but is not using GzipSource.java, which is the affected class.\nRed Hat support for Spring Boot is considered low impact as it\u0027s used by Dekorate during compilation process and not included in the resulting Jar.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3635"
},
{
"category": "external",
"summary": "RHBZ#2229295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229295"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3635"
}
],
"release_date": "2023-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "okio: GzipSource class improper exception handling"
},
{
"cve": "CVE-2023-26048",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-08-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236340"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the jetty-server package. A servlet with multipart support could get an OutOfMemorryError when the client sends a part that has a name but no filename and substantial content. This flaw allows a malicious user to jeopardize the environment by leaving the JVM in an unreliable state.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26048"
},
{
"category": "external",
"summary": "RHBZ#2236340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26048",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26048"
},
{
"category": "external",
"summary": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-qw69-rqj8-6qw8",
"url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-qw69-rqj8-6qw8"
}
],
"release_date": "2023-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()"
},
{
"cve": "CVE-2023-26049",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2023-08-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236341"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the jetty-server package. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies or otherwise perform unintended behavior by tampering with the cookie parsing mechanism.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26049"
},
{
"category": "external",
"summary": "RHBZ#2236341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236341"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26049",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26049"
},
{
"category": "external",
"summary": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-p26g-97m4-6q7c",
"url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-p26g-97m4-6q7c"
}
],
"release_date": "2023-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-06-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Bouncy Castle 1.73. This issue targets the fix of LDAP wild cards. Before the fix there was no validation for the X.500 name of any certificate, subject, or issuer, so the presence of a wild card may lead to information disclosure. This could allow a malicious user to obtain unauthorized information via blind LDAP Injection, exploring the environment and enumerating data. The exploit depends on the structure of the target LDAP directory as well as what kind of errors are exposed to the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-33201"
},
{
"category": "external",
"summary": "RHBZ#2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201"
},
{
"category": "external",
"summary": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201",
"url": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201"
}
],
"release_date": "2023-06-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate"
},
{
"cve": "CVE-2023-34453",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2023-06-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Snappy-java\u0027s shuffle function, which does not check input sizes before beginning operations. This issue could allow an attacker to send malicious input to trigger an overflow error that crashes the program, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snappy-java: Integer overflow in shuffle leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-34453"
},
{
"category": "external",
"summary": "RHBZ#2215393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-34453",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34453"
}
],
"release_date": "2023-06-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snappy-java: Integer overflow in shuffle leads to DoS"
},
{
"cve": "CVE-2023-34454",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2023-06-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215394"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Snappy-java\u0027s shuffle function, which does not check input sizes before beginning operations. This issue could allow an attacker to send malicious input to trigger an overflow error that crashes the program, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snappy-java: Integer overflow in compress leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-34454"
},
{
"category": "external",
"summary": "RHBZ#2215394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215394"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-34454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-34454",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34454"
}
],
"release_date": "2023-06-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snappy-java: Integer overflow in compress leads to DoS"
},
{
"cve": "CVE-2023-34455",
"cwe": {
"id": "CWE-1285",
"name": "Improper Validation of Specified Index, Position, or Offset in Input"
},
"discovery_date": "2023-06-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215445"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Snappy-java\u0027s fileSnappyInputStream hasNextChunk function, which does not sufficiently evaluate input bytes before beginning operations. This issue could allow an attacker to send malicious input to trigger an out of memory error that crashes the program, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snappy-java: Unchecked chunk length leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-34455"
},
{
"category": "external",
"summary": "RHBZ#2215445",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215445"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-34455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-34455",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34455"
}
],
"release_date": "2023-06-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snappy-java: Unchecked chunk length leads to DoS"
},
{
"cve": "CVE-2023-34462",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216888"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty\u0027s SniHandler while navigating TLS handshake which may permit a large heap allocation if the handler did not have a timeout configured. This issue may allow an attacker to send a client hello packet which would cause the server to buffer large amounts of data per connection, potentially causing an out of memory error, resulting in Denial of Service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: SniHandler 16MB allocation leads to OOM",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-34462"
},
{
"category": "external",
"summary": "RHBZ#2216888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216888"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-34462",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34462"
}
],
"release_date": "2023-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
},
{
"category": "workaround",
"details": "Configuration of SniHandler with an idle timeout will mitigate this issue.",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty: SniHandler 16MB allocation leads to OOM"
}
]
}
RHSA-2023_4983
Vulnerability from csaf_redhat - Published: 2023-09-05 18:37 - Updated: 2024-12-17 22:56Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Process Automation Manager.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which provides a detailed severity rating, is available for each vulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services.\n\nThis asynchronous security patch is an update to Red Hat Process Automation Manager 7.\n\nSecurity Fixes:\n\n* apache-bcel: Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing (CVE-2022-42920)\n\n* decode-uri-component: improper input validation resulting in DoS (CVE-2022-38900)\n\n* mina-sshd: Java unsafe deserialization vulnerability (CVE-2022-45047)\n\n* spring-boot: Spring Boot Welcome Page DoS Vulnerability (CVE-2023-20883)\n\n* springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern (CVE-2023-20860)\n\n* loader-utils: regular expression denial of service in interpolateName.js (CVE-2022-37599)\n\n* protobuf-java: timeout in parser leads to DoS (CVE-2022-3171)\n\n* snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857)\n\n* woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40152)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\n* sshd-core: mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server (CVE-2021-30129)\n\nFor more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:4983",
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1981527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981527"
},
{
"category": "external",
"summary": "2126789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789"
},
{
"category": "external",
"summary": "2134291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134291"
},
{
"category": "external",
"summary": "2134872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134872"
},
{
"category": "external",
"summary": "2137645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137645"
},
{
"category": "external",
"summary": "2142707",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142707"
},
{
"category": "external",
"summary": "2145194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "2170644",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170644"
},
{
"category": "external",
"summary": "2180528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180528"
},
{
"category": "external",
"summary": "2209342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209342"
},
{
"category": "external",
"summary": "RHPAM-4639",
"url": "https://issues.redhat.com/browse/RHPAM-4639"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4983.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.4 security update",
"tracking": {
"current_release_date": "2024-12-17T22:56:41+00:00",
"generator": {
"date": "2024-12-17T22:56:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:4983",
"initial_release_date": "2023-09-05T18:37:03+00:00",
"revision_history": [
{
"date": "2023-09-05T18:37:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-09-05T18:37:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T22:56:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHPAM 7.13.4 async",
"product": {
"name": "RHPAM 7.13.4 async",
"product_id": "RHPAM 7.13.4 async",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13"
}
}
}
],
"category": "product_family",
"name": "Red Hat Process Automation Manager"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-30129",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1981527"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in sshd-core of Apache Mina SSHD allows an attacker to overflow the server causing an OutOfMemory error. This issue affects the SFTP and port forwarding features of Apache Mina SSHD version 2.0.0 and later versions. It was addressed in Apache Mina SSHD 2.7.0",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30129"
},
{
"category": "external",
"summary": "RHBZ#1981527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981527"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30129"
}
],
"release_date": "2021-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server"
},
{
"cve": "CVE-2022-3143",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124682"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Wildfly-elytron. Wildfly-elytron uses java.util.Arrays.equals in several places, which is unsafe and vulnerable to timing attacks. To compare values securely, use java.security.MessageDigest.isEqual instead. This flaw allows an attacker to access secure information or impersonate an authed user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wildfly-elytron: possible timing attacks via use of unsafe comparator",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3143"
},
{
"category": "external",
"summary": "RHBZ#2124682",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124682"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3143"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "wildfly-elytron: possible timing attacks via use of unsafe comparator"
},
{
"cve": "CVE-2022-3171",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2022-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2137645"
}
],
"notes": [
{
"category": "description",
"text": "A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "protobuf-java: timeout in parser leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3171"
},
{
"category": "external",
"summary": "RHBZ#2137645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3171",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3171"
},
{
"category": "external",
"summary": "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2",
"url": "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2"
}
],
"release_date": "2022-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "protobuf-java: timeout in parser leads to DoS"
},
{
"cve": "CVE-2022-3509",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2022-12-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2184161"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Textformat in protobuf-java core that can lead to a denial of service. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields can cause objects to convert between mutable and immutable forms, resulting in long garbage collection pauses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "protobuf-java: Textformat parsing issue leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3509"
},
{
"category": "external",
"summary": "RHBZ#2184161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3509",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3509"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "protobuf-java: Textformat parsing issue leads to DoS"
},
{
"cve": "CVE-2022-3510",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2022-12-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2184176"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Message-Type Extensions in protobuf-java core that can lead to a denial of service. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields can cause objects to convert between mutable and immutable forms, resulting in long garbage collection pauses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "protobuf-java: Message-Type Extensions parsing issue leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3510"
},
{
"category": "external",
"summary": "RHBZ#2184176",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184176"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3510",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3510"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "protobuf-java: Message-Type Extensions parsing issue leads to DoS"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-25857",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2126789"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the org.yaml.snakeyaml package. This flaw allows an attacker to cause a denial of service (DoS) due to missing nested depth limitation for collections.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Denial of Service due to missing nested depth limitation for collections",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For RHEL-8 it\u0027s downgraded to moderate because \"snakeyaml\" itself in RHEL 8 or RHEL-9 isn\u0027t shipped and \"prometheus-jmx-exporter\" is needed as build dependency. And it\u0027s not directly exploitable, hence severity marked as moderate.\nRed Hat Integration and AMQ products are not vulnerable to this flaw, so their severity has been lowered to moderate.\nRed Hat Single Sign-On uses snakeyaml from liquibase-core and is only used when performing migrations and would require administrator privileges to execute, hence severity marked as Low.\nRed Hat Fuse 7 is now in Maintenance Support Phase and details about its fix should be present soon. However, Red Hat Fuse Online (Syndesis) does will not contain the fix for this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25857"
},
{
"category": "external",
"summary": "RHBZ#2126789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525"
}
],
"release_date": "2022-08-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Denial of Service due to missing nested depth limitation for collections"
},
{
"cve": "CVE-2022-37599",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the interpolateName function in interpolateName.js in the webpack loader-utils 2.0.0 via the resourcePath variable in interpolateName.js. This flaw can lead to a regular expression denial of service (ReDoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "loader-utils: regular expression denial of service in interpolateName.js",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat OpenShift Logging the openshift-logging/kibana6-rhel8 container and openshift-logging/logging-view-plugin-rhel8 bundles many nodejs packages as a build time dependencies, including loader-utils package. The vulnerable code is not used hence the impact to OpenShift Logging by this vulnerability is Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-37599"
},
{
"category": "external",
"summary": "RHBZ#2134872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-37599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37599"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-37599",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37599"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hhq3-ff78-jv3g",
"url": "https://github.com/advisories/GHSA-hhq3-ff78-jv3g"
},
{
"category": "external",
"summary": "https://github.com/webpack/loader-utils/issues/211",
"url": "https://github.com/webpack/loader-utils/issues/211"
}
],
"release_date": "2022-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"RHPAM 7.13.4 async"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "loader-utils: regular expression denial of service in interpolateName.js"
},
{
"cve": "CVE-2022-38900",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-02-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2170644"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in decode-uri-component. This issue occurs due to a specially crafted input, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "decode-uri-component: improper input validation resulting in DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For OpenShift Container Platform (OCP), Advanced Clusters Management for Kubernetes (ACM) and Advanced Cluster Security (ACS), the NPM decode-uri-component package is only present in source repositories as a development dependency, it is not used in production. Therefore this vulnerability is rated Low for OCP and ACS.\n\nIn Red Hat OpenShift Logging the openshift-logging/kibana6-rhel8 container bundles many nodejs packages as a build time dependencies, including the decode-uri-component package. \nThe vulnerable code is not used, hence the impact to OpenShift Logging by this vulnerability is Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38900"
},
{
"category": "external",
"summary": "RHBZ#2170644",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170644"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38900",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38900"
},
{
"category": "external",
"summary": "https://github.com/SamVerschueren/decode-uri-component/issues/5",
"url": "https://github.com/SamVerschueren/decode-uri-component/issues/5"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-w573-4hg7-7wgq",
"url": "https://github.com/advisories/GHSA-w573-4hg7-7wgq"
}
],
"release_date": "2022-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "decode-uri-component: improper input validation resulting in DoS"
},
{
"cve": "CVE-2022-40152",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the FasterXML/woodstox package. This flaw allows an attacker to cause a denial of service (DoS) in its target via XML serialization. An attacker may benefit from the parser sending a malicious input that may cause a crash. This vulnerability is only relevant for users using the DTD parsing functionality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-40152"
},
{
"category": "external",
"summary": "RHBZ#2134291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40152"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40152",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40152"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-3f7h-mf4q-vrm4",
"url": "https://github.com/advisories/GHSA-3f7h-mf4q-vrm4"
}
],
"release_date": "2022-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-42920",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2142707"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) write flaw was found in Apache Commons BCEL API. This flaw can be used to produce arbitrary bytecode and may abuse applications that pass attacker-controlled data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Fuse 7 ships the code in question but does not utilize it in the product, so it is affected at a reduced impact of Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42920"
},
{
"category": "external",
"summary": "RHBZ#2142707",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142707"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42920",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42920"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/lfxk7q8qmnh5bt9jm6nmjlv5hsxjhrz4",
"url": "https://lists.apache.org/thread/lfxk7q8qmnh5bt9jm6nmjlv5hsxjhrz4"
}
],
"release_date": "2022-11-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing"
},
{
"cve": "CVE-2022-45047",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-11-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2145194"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache MINA SSHD, when using Java deserialization to load a serialized java.security.PrivateKey. An attacker could benefit from unsafe deserialization by inserting unsecured data that may affect the application or server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mina-sshd: Java unsafe deserialization vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Impact as High as there\u0027s a mitigation for minimizing the impact which the flaw requires org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to be impacted, which would require an external/public API for an attacker to benefit from it. \n\nRed Hat Fuse 7 and Red Hat JBoss Enterprise Application Platform 7 have a lower rate (moderate) as it\u0027s very unlikely to be exploited since those are for internal usage or use a custom implementation in their case.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45047"
},
{
"category": "external",
"summary": "RHBZ#2145194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45047"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047"
},
{
"category": "external",
"summary": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html",
"url": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html"
}
],
"release_date": "2022-11-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
},
{
"category": "workaround",
"details": "From the maintainer:\n\nFor Apache MINA SSHD \u003c= 2.9.1, do not use org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to generate and later load your server\u0027s host key. Use separately generated host key files, for instance in OpenSSH format, and load them via a org.apache.sshd.common.keyprovider.FileKeyPairProvider instead. Or use a custom implementation instead of \nSimpleGeneratorHostKeyProvider that uses the OpenSSH format for storing and loading the host key (via classes OpenSSHKeyPairResourceWriter and OpenSSHKeyPairResourceParser).",
"product_ids": [
"RHPAM 7.13.4 async"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mina-sshd: Java unsafe deserialization vulnerability"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-20860",
"cwe": {
"id": "CWE-155",
"name": "Improper Neutralization of Wildcards or Matching Symbols"
},
"discovery_date": "2023-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2180528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Spring Framework. In this vulnerability, a security bypass is possible due to the behavior of the wildcard pattern.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-20860"
},
{
"category": "external",
"summary": "RHBZ#2180528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-20860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20860"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-20860",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20860"
},
{
"category": "external",
"summary": "https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861",
"url": "https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861"
}
],
"release_date": "2023-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern"
},
{
"cve": "CVE-2023-20861",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2180530"
}
],
"notes": [
{
"category": "description",
"text": "A flaw found was found in Spring Framework. This flaw allows a malicious user to use a specially crafted SpEL expression that causes a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "springframework: Spring Expression DoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-20861"
},
{
"category": "external",
"summary": "RHBZ#2180530",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180530"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-20861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20861"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-20861",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20861"
},
{
"category": "external",
"summary": "https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861",
"url": "https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861"
}
],
"release_date": "2023-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "springframework: Spring Expression DoS Vulnerability"
},
{
"cve": "CVE-2023-20883",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-05-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2209342"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Spring Boot, occurring prominently in Spring MVC with a reverse proxy cache. This issue requires Spring MVC to have auto-configuration enabled and the application to use Spring Boot\u0027s welcome page support, either static or templated, resulting in the application being deployed behind a proxy that caches 404 responses. This issue may cause a denial of service (DoS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-boot: Spring Boot Welcome Page DoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-20883"
},
{
"category": "external",
"summary": "RHBZ#2209342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-20883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20883"
}
],
"release_date": "2023-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-boot: Spring Boot Welcome Page DoS Vulnerability"
},
{
"cve": "CVE-2023-24998",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-02-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2172298"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Commons FileUpload, where it does not limit the number of parts being processed in a request. This issue may allow an attacker to use a malicious upload or series of uploads to trigger a denial of service.\r\n\r\nWhile Red Hat Satellite relies upon Apache Tomcat, it does not directly ship it. Tomcat is shipped with Red Hat Enterprise Linux and consumed by the Candlepin component of Satellite. Red Hat Satellite users are therefore advised to check the impact state of Red Hat Enterprise Linux, since any necessary fixes will be distributed through the platform.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "FileUpload: FileUpload DoS with excessive parts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-24998"
},
{
"category": "external",
"summary": "RHBZ#2172298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172298"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24998",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24998"
},
{
"category": "external",
"summary": "https://commons.apache.org/proper/commons-fileupload/security-reports.html#Fixed_in_Apache_Commons_FileUpload_1.5",
"url": "https://commons.apache.org/proper/commons-fileupload/security-reports.html#Fixed_in_Apache_Commons_FileUpload_1.5"
}
],
"release_date": "2023-02-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "FileUpload: FileUpload DoS with excessive parts"
}
]
}
RHSA-2023:2705
Vulnerability from csaf_redhat - Published: 2023-05-10 11:25 - Updated: 2025-11-21 18:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "New Red Hat Single Sign-On 7.6.3 packages are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.6.3 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.6.2, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* okhttp: information disclosure via improperly used cryptographic function (CVE-2021-0341)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2705",
"url": "https://access.redhat.com/errata/RHSA-2023:2705"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2705.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.3 security update on RHEL 7",
"tracking": {
"current_release_date": "2025-11-21T18:40:14+00:00",
"generator": {
"date": "2025-11-21T18:40:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:2705",
"initial_release_date": "2023-05-10T11:25:19+00:00",
"revision_history": [
{
"date": "2023-05-10T11:25:19+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-10T11:25:19+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:40:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Single Sign-On 7.6 for RHEL 7 Server",
"product": {
"name": "Red Hat Single Sign-On 7.6 for RHEL 7 Server",
"product_id": "7Server-RHSSO-7.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.6::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Single Sign-On"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"product": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"product_id": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.7-1.redhat_00001.1.el7sso?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"product": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"product_id": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.7-1.redhat_00001.1.el7sso?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"product": {
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"product_id": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak-server@18.0.7-1.redhat_00001.1.el7sso?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 7 Server",
"product_id": "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
},
"product_reference": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"relates_to_product_reference": "7Server-RHSSO-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src as a component of Red Hat Single Sign-On 7.6 for RHEL 7 Server",
"product_id": "7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src"
},
"product_reference": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"relates_to_product_reference": "7Server-RHSSO-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 7 Server",
"product_id": "7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
},
"product_reference": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"relates_to_product_reference": "7Server-RHSSO-7.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0341",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2154086"
}
],
"notes": [
{
"category": "description",
"text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "okhttp: information disclosure via improperly used cryptographic function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0341"
},
{
"category": "external",
"summary": "RHBZ#2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0341"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341"
},
{
"category": "external",
"summary": "https://source.android.com/security/bulletin/2021-02-01",
"url": "https://source.android.com/security/bulletin/2021-02-01"
}
],
"release_date": "2021-02-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2705"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "okhttp: information disclosure via improperly used cryptographic function"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2705"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2705"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2705"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2705"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2705"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:19+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2705"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.noarch",
"7Server-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el7sso.src",
"7Server-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el7sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
}
]
}
RHSA-2023_1512
Vulnerability from csaf_redhat - Published: 2023-03-29 11:44 - Updated: 2024-12-17 23:02Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.4.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.9 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.10 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)\n\n* hsqldb: Untrusted input may lead to RCE attack (CVE-2022-41853)\n\n* Undertow: Infinite loop in SslConduit during close (CVE-2023-1108)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1512",
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2136141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141"
},
{
"category": "external",
"summary": "2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "2174246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
},
{
"category": "external",
"summary": "JBEAP-23572",
"url": "https://issues.redhat.com/browse/JBEAP-23572"
},
{
"category": "external",
"summary": "JBEAP-24120",
"url": "https://issues.redhat.com/browse/JBEAP-24120"
},
{
"category": "external",
"summary": "JBEAP-24172",
"url": "https://issues.redhat.com/browse/JBEAP-24172"
},
{
"category": "external",
"summary": "JBEAP-24182",
"url": "https://issues.redhat.com/browse/JBEAP-24182"
},
{
"category": "external",
"summary": "JBEAP-24220",
"url": "https://issues.redhat.com/browse/JBEAP-24220"
},
{
"category": "external",
"summary": "JBEAP-24254",
"url": "https://issues.redhat.com/browse/JBEAP-24254"
},
{
"category": "external",
"summary": "JBEAP-24292",
"url": "https://issues.redhat.com/browse/JBEAP-24292"
},
{
"category": "external",
"summary": "JBEAP-24339",
"url": "https://issues.redhat.com/browse/JBEAP-24339"
},
{
"category": "external",
"summary": "JBEAP-24341",
"url": "https://issues.redhat.com/browse/JBEAP-24341"
},
{
"category": "external",
"summary": "JBEAP-24363",
"url": "https://issues.redhat.com/browse/JBEAP-24363"
},
{
"category": "external",
"summary": "JBEAP-24372",
"url": "https://issues.redhat.com/browse/JBEAP-24372"
},
{
"category": "external",
"summary": "JBEAP-24380",
"url": "https://issues.redhat.com/browse/JBEAP-24380"
},
{
"category": "external",
"summary": "JBEAP-24383",
"url": "https://issues.redhat.com/browse/JBEAP-24383"
},
{
"category": "external",
"summary": "JBEAP-24384",
"url": "https://issues.redhat.com/browse/JBEAP-24384"
},
{
"category": "external",
"summary": "JBEAP-24385",
"url": "https://issues.redhat.com/browse/JBEAP-24385"
},
{
"category": "external",
"summary": "JBEAP-24395",
"url": "https://issues.redhat.com/browse/JBEAP-24395"
},
{
"category": "external",
"summary": "JBEAP-24507",
"url": "https://issues.redhat.com/browse/JBEAP-24507"
},
{
"category": "external",
"summary": "JBEAP-24535",
"url": "https://issues.redhat.com/browse/JBEAP-24535"
},
{
"category": "external",
"summary": "JBEAP-24574",
"url": "https://issues.redhat.com/browse/JBEAP-24574"
},
{
"category": "external",
"summary": "JBEAP-24588",
"url": "https://issues.redhat.com/browse/JBEAP-24588"
},
{
"category": "external",
"summary": "JBEAP-24605",
"url": "https://issues.redhat.com/browse/JBEAP-24605"
},
{
"category": "external",
"summary": "JBEAP-24618",
"url": "https://issues.redhat.com/browse/JBEAP-24618"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1512.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 on RHEL 7 security update",
"tracking": {
"current_release_date": "2024-12-17T23:02:49+00:00",
"generator": {
"date": "2024-12-17T23:02:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:1512",
"initial_release_date": "2023-03-29T11:44:44+00:00",
"revision_history": [
{
"date": "2023-03-29T11:44:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-03-29T11:44:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T23:02:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.86-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.86-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.5-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan@11.0.17-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata@13.4.0-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.8-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"product": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"product_id": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.50-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"product": {
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"product_id": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-client@1.1.16-1.Final_redhat_00002.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.11-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"product_id": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-wildfly-integration@1.0.7-1.redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.14-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"product_id": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-mime4j@0.8.9-1.redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-el-api_3.0_spec@2.0.1-1.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"product_id": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-spi@3.4.0-2.Final_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"product_id": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-26.Final_redhat_00025.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"product_id": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-snakeyaml@1.33.0-2.SP1_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"product_id": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.23-1.SP2_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"product_id": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-native@1.0.2-3.redhat_00004.1.el7eap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"product_id": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native@1.0.2-4.redhat_00004.1.el7eap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"product_id": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.10-6.GA_redhat_00002.1.el7eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-all@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-buffer@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-dns@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-haproxy@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http2@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-memcache@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-mqtt@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-redis@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-smtp@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-socks@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-stomp@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-xml@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-common@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler-proxy@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns-classes-macos@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-epoll@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-kqueue@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-unix-common@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-rxtx@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-sctp@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-udt@4.1.86-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-client@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.15.5-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-cachestore-jdbc@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-cachestore-remote@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-client-hotrod@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-commons@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-component-annotations@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-core@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-commons@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-spi@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-v53@11.0.17-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata@13.4.0-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-appclient@13.4.0-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-common@13.4.0-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-ear@13.4.0-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-ejb@13.4.0-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-web@13.4.0-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.8-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product": {
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_id": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-api@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product": {
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_id": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-common@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product": {
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_id": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-config@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_id": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product": {
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_id": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-api@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product": {
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_id": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-impl@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product": {
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-simple-schema@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product": {
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_id": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-impl@2.5.5-22.SP12_redhat_00012.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.50-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-client-common@1.1.16-1.Final_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-ejb-client@1.1.16-1.Final_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-naming-client@1.1.16-1.Final_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-transaction-client@1.1.16-1.Final_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.11-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"product_id": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-wildfly-integration@1.0.7-1.redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.14-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"product_id": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-mime4j@0.8.9-1.redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-el-api_3.0_spec@2.0.1-1.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-spi@3.4.0-2.Final_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-26.Final_redhat_00025.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-26.Final_redhat_00025.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product_id": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-26.Final_redhat_00025.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-snakeyaml@1.33.0-2.SP1_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.23-1.SP2_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-native@1.0.2-3.redhat_00004.1.el7eap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.10-6.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.10-6.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.10-6.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.10-6.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.10-6.GA_redhat_00002.1.el7eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.86-1.Final_redhat_00001.1.el7eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll-debuginfo@4.1.86-1.Final_redhat_00001.1.el7eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product_id": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native@1.0.2-4.redhat_00004.1.el7eap?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product": {
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product_id": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native-wildfly@1.0.2-4.redhat_00004.1.el7eap?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product": {
"name": "eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product_id": "eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native-debuginfo@1.0.2-4.redhat_00004.1.el7eap?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64"
},
"product_reference": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64"
},
"product_reference": "eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64"
},
"product_reference": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch"
},
"product_reference": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch"
},
"product_reference": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch"
},
"product_reference": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch"
},
"product_reference": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src"
},
"product_reference": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch"
},
"product_reference": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch"
},
"product_reference": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch"
},
"product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch"
},
"product_reference": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src"
},
"product_reference": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-12-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150009"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SnakeYaml: Constructor Deserialization Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml\u0027s SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker\u0027s control. Due to that the impact for RHPAM is reduced to Low.\n\nRed Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml\u0027s Constructor class nor pass untrusted data to this class. When this class is used, it\u2019s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1471"
},
{
"category": "external",
"summary": "RHBZ#2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2",
"url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2"
}
],
"release_date": "2022-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "SnakeYaml: Constructor Deserialization Remote Code Execution"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41853",
"cwe": {
"id": "CWE-470",
"name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)"
},
"discovery_date": "2022-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2136141"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the HSQLDB package. This flaw allows untrusted inputs to execute remote code due to any static method of any Java class in the classpath, resulting in code execution by default.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hsqldb: Untrusted input may lead to RCE attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41853"
},
{
"category": "external",
"summary": "RHBZ#2136141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41853"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853"
},
{
"category": "external",
"summary": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control",
"url": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-77xx-rxvh-q682",
"url": "https://github.com/advisories/GHSA-77xx-rxvh-q682"
}
],
"release_date": "2022-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
},
{
"category": "workaround",
"details": "By default, the static methods of any class that is on the classpath are available for use and can compromise security in some systems. The optional Java system property, hsqldb.method_class_names, allows preventing access to classes other than java.lang.Math or specifying a semicolon-separated list of allowed classes. A property value that ends with .* is treated as a wild card and allows access to all class or method names formed by substitution of the * (asterisk).\n\nIn the example below, the property has been included as an argument to the Java command.\n\n java -Dhsqldb.method_class_names=\"org.me.MyClass;org.you.YourClass;org.you.lib.*\" [the rest of the command line]\n\nThe above example allows access to the methods in the two classes: org.me.MyClass and org.you.YourClass together with all the classes in the org.you.lib package. Note that if the property is not defined, no access control is performed at this level.\n\nThe user who creates a Java routine must have the relevant access privileges on the tables that are used inside the Java method.\n\nOnce the routine has been defined, the normal database access control applies to its user. The routine can be executed only by those users who have been granted EXECUTE privileges on it. Access to routines can be granted to users with GRANT EXECUTE or GRANT ALL. For example, GRANT EXECUTE ON myroutine TO PUBLIC.\n\nIn hsqldb 2.7.1, all classes by default are not accessible, except those in java.lang.Math and need to be manually enabled.",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "hsqldb: Untrusted input may lead to RCE attack"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-1108",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2174246"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Undertow: Infinite loop in SslConduit during close",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src"
],
"known_not_affected": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1108"
},
{
"category": "external",
"summary": "RHBZ#2174246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-m4mm-pg93-fv78",
"url": "https://github.com/advisories/GHSA-m4mm-pg93-fv78"
}
],
"release_date": "2023-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:44+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1512"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-debuginfo-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el7eap.x86_64",
"7Server-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el7eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Undertow: Infinite loop in SslConduit during close"
}
]
}
RHSA-2024_1353
Vulnerability from csaf_redhat - Published: 2024-03-18 09:47 - Updated: 2024-12-17 23:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Process Automation Manager.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which provides a detailed severity rating, is available for each vulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services.\n\nThis asynchronous security patch is an update to Red Hat Process Automation Manager 7.\n\nSecurity Fixes:\n\n* JSON-java: parser confusion leads to OOM (CVE-2023-5072)\n\n* okio: GzipSource class improper exception handling (CVE-2023-3635)\n\n* xstream: Denial of Service by injecting recursive collections or maps based on element\u0027s hash values raising a stack overflow (CVE-2022-41966)\n\n* batik: Server-Side Request Forgery vulnerability (CVE-2022-44729)\n\n* batik: Server-Side Request Forgery vulnerability (CVE-2022-44730)\n\n* bouncycastle: potential blind LDAP injection attack using a self-signed certificate (CVE-2023-33201)\n\n* xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40151)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\n* snakeyaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)\n\nFor more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1353",
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2134292",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134292"
},
{
"category": "external",
"summary": "2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "2170431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170431"
},
{
"category": "external",
"summary": "2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "2229295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229295"
},
{
"category": "external",
"summary": "2233889",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233889"
},
{
"category": "external",
"summary": "2233899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233899"
},
{
"category": "external",
"summary": "2246417",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246417"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1353.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.5 security update",
"tracking": {
"current_release_date": "2024-12-17T23:03:00+00:00",
"generator": {
"date": "2024-12-17T23:03:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2024:1353",
"initial_release_date": "2024-03-18T09:47:51+00:00",
"revision_history": [
{
"date": "2024-03-18T09:47:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-18T09:47:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T23:03:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHPAM 7.13.5 async",
"product": {
"name": "RHPAM 7.13.5 async",
"product_id": "RHPAM 7.13.5 async",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13"
}
}
}
],
"category": "product_family",
"name": "Red Hat Process Automation Manager"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150009"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SnakeYaml: Constructor Deserialization Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml\u0027s SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker\u0027s control. Due to that the impact for RHPAM is reduced to Low.\n\nRed Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml\u0027s Constructor class nor pass untrusted data to this class. When this class is used, it\u2019s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1471"
},
{
"category": "external",
"summary": "RHBZ#2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2",
"url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2"
}
],
"release_date": "2022-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "SnakeYaml: Constructor Deserialization Remote Code Execution"
},
{
"cve": "CVE-2022-40151",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134292"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the XStream package. This flaw allows an attacker to cause a denial of service (DoS) in its target via XML serialization.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-40151"
},
{
"category": "external",
"summary": "RHBZ#2134292",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134292"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-40151",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40151"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40151",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40151"
}
],
"release_date": "2022-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xstream: Xstream to serialise XML data was vulnerable to Denial of Service attacks"
},
{
"cve": "CVE-2022-41966",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2023-02-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2170431"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the xstream package. This flaw allows an attacker to cause a denial of service by injecting recursive collections or maps, raising a stack overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xstream: Denial of Service by injecting recursive collections or maps based on element\u0027s hash values raising a stack overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Fuse 7 ships an affected version of XStream. No endpoint in any flavor of Fuse is accepting by default an unverified input stream passed directly to XStream unmarshaller. Documentation always recommend all the endpoints (TCP/UDP/HTTP(S)/other listeners) to have at least one layer of authentication/authorization and Fuse in general itself in particular has a lot of mechanisms to protect the endpoints.\n\nRed Hat Single Sign-On contains XStream as a transitive dependency from Infinispan and the same is not affected as NO_REFERENCE is in use.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41966"
},
{
"category": "external",
"summary": "RHBZ#2170431",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170431"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41966"
},
{
"category": "external",
"summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-j563-grx4-pjpv",
"url": "https://github.com/x-stream/xstream/security/advisories/GHSA-j563-grx4-pjpv"
}
],
"release_date": "2022-12-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "xstream: Denial of Service by injecting recursive collections or maps based on element\u0027s hash values raising a stack overflow"
},
{
"cve": "CVE-2022-44729",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"discovery_date": "2023-08-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2233889"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Batik 1.0 - 1.16. This issue occurs due to a malicious SVG triggering external resources loading by default, causing resource consumption or in some cases information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "batik: Server-Side Request Forgery vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-44729"
},
{
"category": "external",
"summary": "RHBZ#2233889",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233889"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-44729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-44729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44729"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-gq5f-xv48-2365",
"url": "https://github.com/advisories/GHSA-gq5f-xv48-2365"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2",
"url": "https://lists.apache.org/thread/hco2nw1typoorz33qzs0fcdx0ws6d6j2"
}
],
"release_date": "2023-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "batik: Server-Side Request Forgery vulnerability"
},
{
"cve": "CVE-2022-44730",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"discovery_date": "2023-08-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2233899"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Batik, where a malicious SVG can probe user profile data and send it directly as parameter to a URL. This issue can allow an attacker to conduct SSRF attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "batik: Server-Side Request Forgery vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-44730"
},
{
"category": "external",
"summary": "RHBZ#2233899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233899"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-44730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44730"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-44730",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-44730"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-2474-2566-3qxp",
"url": "https://github.com/advisories/GHSA-2474-2566-3qxp"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/58m5817jr059f4v1zogh0fngj9pwjyj0",
"url": "https://lists.apache.org/thread/58m5817jr059f4v1zogh0fngj9pwjyj0"
}
],
"release_date": "2023-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "batik: Server-Side Request Forgery vulnerability"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-3635",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2023-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2229295"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in SquareUp Okio. A class GzipSource does not handle an exception that might be raised when parsing a malformed gzip buffer. This issue may allow a malicious user to start processing a malformed file, which can result in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "okio: GzipSource class improper exception handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss Enterprise Application Platform XP does contain Okio package but is not using GzipSource.java, which is the affected class.\nRed Hat support for Spring Boot is considered low impact as it\u0027s used by Dekorate during compilation process and not included in the resulting Jar.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3635"
},
{
"category": "external",
"summary": "RHBZ#2229295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229295"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3635"
}
],
"release_date": "2023-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "okio: GzipSource class improper exception handling"
},
{
"cve": "CVE-2023-5072",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-10-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246417"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the org.json package. A bug in the parser exists, and an input string may lead to undefined usage of memory, leading to an out-of-memory error, causing a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JSON-java: parser confusion leads to OOM",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability may cause denial of service with a small string input, causing the server to be unresponsive easily, hence the Important impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5072"
},
{
"category": "external",
"summary": "RHBZ#2246417",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246417"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5072"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5072",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5072"
},
{
"category": "external",
"summary": "https://github.com/stleary/JSON-java/issues/758",
"url": "https://github.com/stleary/JSON-java/issues/758"
},
{
"category": "external",
"summary": "https://github.com/stleary/JSON-java/issues/771",
"url": "https://github.com/stleary/JSON-java/issues/771"
}
],
"release_date": "2023-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
},
{
"category": "workaround",
"details": "No current mitigation is available for this flaw.",
"product_ids": [
"RHPAM 7.13.5 async"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JSON-java: parser confusion leads to OOM"
},
{
"cve": "CVE-2023-6481",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2252956"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the logback package. Affected versions of this package are vulnerable to Uncontrolled Resource Consumption (\u0027Resource Exhaustion\u0027) via the logback receiver component. This flaw allows an attacker to mount a denial-of-service attack by sending poisoned data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "logback: A serialization vulnerability in logback receiver",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The security vulnerability in the logback package is considered of moderate severity due to its potential for facilitating a denial-of-service (DoS) attack. While a DoS attack can disrupt service availability, this vulnerability may not lead to more severe consequences such as unauthorized access or data breaches.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6481"
},
{
"category": "external",
"summary": "RHBZ#2252956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252956"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6481",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6481"
}
],
"release_date": "2023-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"RHPAM 7.13.5 async"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "logback: A serialization vulnerability in logback receiver"
},
{
"cve": "CVE-2023-6717",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-12-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253952"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow a malicious admin in one realm or a client with registration access to target users in different realms or applications, executing arbitrary JavaScript in their contexts upon form submission. This can enable unauthorized access and harmful actions, compromising the confidentiality, integrity, and availability of the complete KC instance.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "keycloak: XSS via assertion consumer service URL in SAML POST-binding flow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6717"
},
{
"category": "external",
"summary": "RHBZ#2253952",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253952"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6717"
}
],
"release_date": "2024-04-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "keycloak: XSS via assertion consumer service URL in SAML POST-binding flow"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-06-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Bouncy Castle 1.73. This issue targets the fix of LDAP wild cards. Before the fix there was no validation for the X.500 name of any certificate, subject, or issuer, so the presence of a wild card may lead to information disclosure. This could allow a malicious user to obtain unauthorized information via blind LDAP Injection, exploring the environment and enumerating data. The exploit depends on the structure of the target LDAP directory as well as what kind of errors are exposed to the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.5 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-33201"
},
{
"category": "external",
"summary": "RHBZ#2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201"
},
{
"category": "external",
"summary": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201",
"url": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201"
}
],
"release_date": "2023-06-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-18T09:47:51+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.5 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"RHPAM 7.13.5 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate"
}
]
}
RHSA-2023_1516
Vulnerability from csaf_redhat - Published: 2023-03-29 11:45 - Updated: 2024-12-17 23:02Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.4.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.10 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)\n\n* hsqldb: Untrusted input may lead to RCE attack (CVE-2022-41853)\n\n* Undertow: Infinite loop in SslConduit during close (CVE-2023-1108)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1516",
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=appplatform\u0026version=7.4",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=appplatform\u0026version=7.4"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2136141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141"
},
{
"category": "external",
"summary": "2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "2174246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
},
{
"category": "external",
"summary": "JBEAP-23572",
"url": "https://issues.redhat.com/browse/JBEAP-23572"
},
{
"category": "external",
"summary": "JBEAP-24172",
"url": "https://issues.redhat.com/browse/JBEAP-24172"
},
{
"category": "external",
"summary": "JBEAP-24182",
"url": "https://issues.redhat.com/browse/JBEAP-24182"
},
{
"category": "external",
"summary": "JBEAP-24220",
"url": "https://issues.redhat.com/browse/JBEAP-24220"
},
{
"category": "external",
"summary": "JBEAP-24254",
"url": "https://issues.redhat.com/browse/JBEAP-24254"
},
{
"category": "external",
"summary": "JBEAP-24292",
"url": "https://issues.redhat.com/browse/JBEAP-24292"
},
{
"category": "external",
"summary": "JBEAP-24339",
"url": "https://issues.redhat.com/browse/JBEAP-24339"
},
{
"category": "external",
"summary": "JBEAP-24341",
"url": "https://issues.redhat.com/browse/JBEAP-24341"
},
{
"category": "external",
"summary": "JBEAP-24363",
"url": "https://issues.redhat.com/browse/JBEAP-24363"
},
{
"category": "external",
"summary": "JBEAP-24372",
"url": "https://issues.redhat.com/browse/JBEAP-24372"
},
{
"category": "external",
"summary": "JBEAP-24380",
"url": "https://issues.redhat.com/browse/JBEAP-24380"
},
{
"category": "external",
"summary": "JBEAP-24383",
"url": "https://issues.redhat.com/browse/JBEAP-24383"
},
{
"category": "external",
"summary": "JBEAP-24384",
"url": "https://issues.redhat.com/browse/JBEAP-24384"
},
{
"category": "external",
"summary": "JBEAP-24385",
"url": "https://issues.redhat.com/browse/JBEAP-24385"
},
{
"category": "external",
"summary": "JBEAP-24395",
"url": "https://issues.redhat.com/browse/JBEAP-24395"
},
{
"category": "external",
"summary": "JBEAP-24507",
"url": "https://issues.redhat.com/browse/JBEAP-24507"
},
{
"category": "external",
"summary": "JBEAP-24535",
"url": "https://issues.redhat.com/browse/JBEAP-24535"
},
{
"category": "external",
"summary": "JBEAP-24574",
"url": "https://issues.redhat.com/browse/JBEAP-24574"
},
{
"category": "external",
"summary": "JBEAP-24588",
"url": "https://issues.redhat.com/browse/JBEAP-24588"
},
{
"category": "external",
"summary": "JBEAP-24605",
"url": "https://issues.redhat.com/browse/JBEAP-24605"
},
{
"category": "external",
"summary": "JBEAP-24618",
"url": "https://issues.redhat.com/browse/JBEAP-24618"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1516.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 security update",
"tracking": {
"current_release_date": "2024-12-17T23:02:16+00:00",
"generator": {
"date": "2024-12-17T23:02:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:1516",
"initial_release_date": "2023-03-29T11:45:38+00:00",
"revision_history": [
{
"date": "2023-03-29T11:45:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-03-29T11:45:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T23:02:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "EAP 7.4.10 release",
"product": {
"name": "EAP 7.4.10 release",
"product_id": "EAP 7.4.10 release",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150009"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SnakeYaml: Constructor Deserialization Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml\u0027s SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker\u0027s control. Due to that the impact for RHPAM is reduced to Low.\n\nRed Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml\u0027s Constructor class nor pass untrusted data to this class. When this class is used, it\u2019s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"EAP 7.4.10 release"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1471"
},
{
"category": "external",
"summary": "RHBZ#2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2",
"url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2"
}
],
"release_date": "2022-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"EAP 7.4.10 release"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"EAP 7.4.10 release"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "SnakeYaml: Constructor Deserialization Remote Code Execution"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"EAP 7.4.10 release"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"EAP 7.4.10 release"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"EAP 7.4.10 release"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"EAP 7.4.10 release"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"EAP 7.4.10 release"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"EAP 7.4.10 release"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41853",
"cwe": {
"id": "CWE-470",
"name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)"
},
"discovery_date": "2022-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2136141"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the HSQLDB package. This flaw allows untrusted inputs to execute remote code due to any static method of any Java class in the classpath, resulting in code execution by default.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hsqldb: Untrusted input may lead to RCE attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"EAP 7.4.10 release"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41853"
},
{
"category": "external",
"summary": "RHBZ#2136141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41853"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853"
},
{
"category": "external",
"summary": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control",
"url": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-77xx-rxvh-q682",
"url": "https://github.com/advisories/GHSA-77xx-rxvh-q682"
}
],
"release_date": "2022-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"EAP 7.4.10 release"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
},
{
"category": "workaround",
"details": "By default, the static methods of any class that is on the classpath are available for use and can compromise security in some systems. The optional Java system property, hsqldb.method_class_names, allows preventing access to classes other than java.lang.Math or specifying a semicolon-separated list of allowed classes. A property value that ends with .* is treated as a wild card and allows access to all class or method names formed by substitution of the * (asterisk).\n\nIn the example below, the property has been included as an argument to the Java command.\n\n java -Dhsqldb.method_class_names=\"org.me.MyClass;org.you.YourClass;org.you.lib.*\" [the rest of the command line]\n\nThe above example allows access to the methods in the two classes: org.me.MyClass and org.you.YourClass together with all the classes in the org.you.lib package. Note that if the property is not defined, no access control is performed at this level.\n\nThe user who creates a Java routine must have the relevant access privileges on the tables that are used inside the Java method.\n\nOnce the routine has been defined, the normal database access control applies to its user. The routine can be executed only by those users who have been granted EXECUTE privileges on it. Access to routines can be granted to users with GRANT EXECUTE or GRANT ALL. For example, GRANT EXECUTE ON myroutine TO PUBLIC.\n\nIn hsqldb 2.7.1, all classes by default are not accessible, except those in java.lang.Math and need to be manually enabled.",
"product_ids": [
"EAP 7.4.10 release"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"EAP 7.4.10 release"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "hsqldb: Untrusted input may lead to RCE attack"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"EAP 7.4.10 release"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"EAP 7.4.10 release"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"EAP 7.4.10 release"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"EAP 7.4.10 release"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"EAP 7.4.10 release"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"EAP 7.4.10 release"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"EAP 7.4.10 release"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"EAP 7.4.10 release"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"EAP 7.4.10 release"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"EAP 7.4.10 release"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"EAP 7.4.10 release"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"EAP 7.4.10 release"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-1108",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2174246"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Undertow: Infinite loop in SslConduit during close",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"EAP 7.4.10 release"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1108"
},
{
"category": "external",
"summary": "RHBZ#2174246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-m4mm-pg93-fv78",
"url": "https://github.com/advisories/GHSA-m4mm-pg93-fv78"
}
],
"release_date": "2023-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:45:38+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"EAP 7.4.10 release"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1516"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"EAP 7.4.10 release"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Undertow: Infinite loop in SslConduit during close"
}
]
}
RHSA-2023:1513
Vulnerability from csaf_redhat - Published: 2023-03-29 11:44 - Updated: 2025-11-21 18:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.4.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.10 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)\n\n* hsqldb: Untrusted input may lead to RCE attack (CVE-2022-41853)\n\n* Undertow: Infinite loop in SslConduit during close (CVE-2023-1108)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1513",
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2136141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141"
},
{
"category": "external",
"summary": "2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "2174246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
},
{
"category": "external",
"summary": "JBEAP-23572",
"url": "https://issues.redhat.com/browse/JBEAP-23572"
},
{
"category": "external",
"summary": "JBEAP-24121",
"url": "https://issues.redhat.com/browse/JBEAP-24121"
},
{
"category": "external",
"summary": "JBEAP-24172",
"url": "https://issues.redhat.com/browse/JBEAP-24172"
},
{
"category": "external",
"summary": "JBEAP-24182",
"url": "https://issues.redhat.com/browse/JBEAP-24182"
},
{
"category": "external",
"summary": "JBEAP-24220",
"url": "https://issues.redhat.com/browse/JBEAP-24220"
},
{
"category": "external",
"summary": "JBEAP-24254",
"url": "https://issues.redhat.com/browse/JBEAP-24254"
},
{
"category": "external",
"summary": "JBEAP-24292",
"url": "https://issues.redhat.com/browse/JBEAP-24292"
},
{
"category": "external",
"summary": "JBEAP-24339",
"url": "https://issues.redhat.com/browse/JBEAP-24339"
},
{
"category": "external",
"summary": "JBEAP-24341",
"url": "https://issues.redhat.com/browse/JBEAP-24341"
},
{
"category": "external",
"summary": "JBEAP-24363",
"url": "https://issues.redhat.com/browse/JBEAP-24363"
},
{
"category": "external",
"summary": "JBEAP-24372",
"url": "https://issues.redhat.com/browse/JBEAP-24372"
},
{
"category": "external",
"summary": "JBEAP-24380",
"url": "https://issues.redhat.com/browse/JBEAP-24380"
},
{
"category": "external",
"summary": "JBEAP-24383",
"url": "https://issues.redhat.com/browse/JBEAP-24383"
},
{
"category": "external",
"summary": "JBEAP-24384",
"url": "https://issues.redhat.com/browse/JBEAP-24384"
},
{
"category": "external",
"summary": "JBEAP-24385",
"url": "https://issues.redhat.com/browse/JBEAP-24385"
},
{
"category": "external",
"summary": "JBEAP-24395",
"url": "https://issues.redhat.com/browse/JBEAP-24395"
},
{
"category": "external",
"summary": "JBEAP-24507",
"url": "https://issues.redhat.com/browse/JBEAP-24507"
},
{
"category": "external",
"summary": "JBEAP-24574",
"url": "https://issues.redhat.com/browse/JBEAP-24574"
},
{
"category": "external",
"summary": "JBEAP-24588",
"url": "https://issues.redhat.com/browse/JBEAP-24588"
},
{
"category": "external",
"summary": "JBEAP-24605",
"url": "https://issues.redhat.com/browse/JBEAP-24605"
},
{
"category": "external",
"summary": "JBEAP-24618",
"url": "https://issues.redhat.com/browse/JBEAP-24618"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1513.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 on RHEL 8 security update",
"tracking": {
"current_release_date": "2025-11-21T18:38:51+00:00",
"generator": {
"date": "2025-11-21T18:38:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:1513",
"initial_release_date": "2023-03-29T11:44:32+00:00",
"revision_history": [
{
"date": "2023-03-29T11:44:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-03-29T11:44:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:38:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 8",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan@11.0.17-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.86-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata@13.4.0-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.8-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.5-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.86-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"product": {
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"product_id": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-client@1.1.16-1.Final_redhat_00002.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.50-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"product": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"product_id": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.11-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"product_id": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-wildfly-integration@1.0.7-1.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.14-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"product_id": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-mime4j@0.8.9-1.redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-el-api_3.0_spec@2.0.1-1.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"product_id": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-spi@3.4.0-2.Final_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"product_id": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-snakeyaml@1.33.0-2.SP1_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"product_id": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-26.Final_redhat_00025.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"product_id": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.23-1.SP2_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"product_id": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-native@1.0.2-3.redhat_00004.1.el8eap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"product_id": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native@1.0.2-4.redhat_00004.1.el8eap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"product_id": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.10-6.GA_redhat_00002.1.el8eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-cachestore-jdbc@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-cachestore-remote@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-client-hotrod@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-commons@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-component-annotations@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-core@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-commons@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-spi@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-v53@11.0.17-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-all@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-buffer@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-dns@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-haproxy@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http2@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-memcache@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-mqtt@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-redis@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-smtp@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-socks@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-stomp@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-xml@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-common@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler-proxy@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns-classes-macos@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-epoll@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-kqueue@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-unix-common@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-rxtx@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-sctp@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-udt@4.1.86-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata@13.4.0-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-appclient@13.4.0-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-common@13.4.0-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-ear@13.4.0-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-ejb@13.4.0-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-web@13.4.0-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.8-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-client@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.15.5-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-client-common@1.1.16-1.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-ejb-client@1.1.16-1.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-naming-client@1.1.16-1.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-transaction-client@1.1.16-1.Final_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.50-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product": {
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_id": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-api@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product": {
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_id": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-common@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product": {
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_id": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-config@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_id": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product": {
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_id": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-api@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product": {
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_id": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-impl@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product": {
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-simple-schema@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product": {
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_id": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-impl@2.5.5-22.SP12_redhat_00012.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.11-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-wildfly-integration@1.0.7-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.14-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"product_id": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-mime4j@0.8.9-1.redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-el-api_3.0_spec@2.0.1-1.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-spi@3.4.0-2.Final_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-snakeyaml@1.33.0-2.SP1_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product_id": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-26.Final_redhat_00025.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product_id": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-26.Final_redhat_00025.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product_id": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-26.Final_redhat_00025.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.23-1.SP2_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-native@1.0.2-3.redhat_00004.1.el8eap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.10-6.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.10-6.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.10-6.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.10-6.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.10-6.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.10-6.GA_redhat_00002.1.el8eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.86-1.Final_redhat_00001.1.el8eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll-debuginfo@4.1.86-1.Final_redhat_00001.1.el8eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"product": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"product_id": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native@1.0.2-4.redhat_00004.1.el8eap?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"product": {
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"product_id": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native-wildfly@1.0.2-4.redhat_00004.1.el8eap?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64"
},
"product_reference": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64"
},
"product_reference": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch"
},
"product_reference": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch"
},
"product_reference": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch"
},
"product_reference": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch"
},
"product_reference": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src"
},
"product_reference": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch"
},
"product_reference": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch"
},
"product_reference": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch"
},
"product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch"
},
"product_reference": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src"
},
"product_reference": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-12-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150009"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SnakeYaml: Constructor Deserialization Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml\u0027s SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker\u0027s control. Due to that the impact for RHPAM is reduced to Low.\n\nRed Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml\u0027s Constructor class nor pass untrusted data to this class. When this class is used, it\u2019s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src"
],
"known_not_affected": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1471"
},
{
"category": "external",
"summary": "RHBZ#2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2",
"url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2"
}
],
"release_date": "2022-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "SnakeYaml: Constructor Deserialization Remote Code Execution"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src"
],
"known_not_affected": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src"
],
"known_not_affected": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41853",
"cwe": {
"id": "CWE-470",
"name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)"
},
"discovery_date": "2022-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2136141"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the HSQLDB package. This flaw allows untrusted inputs to execute remote code due to any static method of any Java class in the classpath, resulting in code execution by default.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hsqldb: Untrusted input may lead to RCE attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41853"
},
{
"category": "external",
"summary": "RHBZ#2136141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41853"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853"
},
{
"category": "external",
"summary": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control",
"url": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-77xx-rxvh-q682",
"url": "https://github.com/advisories/GHSA-77xx-rxvh-q682"
}
],
"release_date": "2022-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
},
{
"category": "workaround",
"details": "By default, the static methods of any class that is on the classpath are available for use and can compromise security in some systems. The optional Java system property, hsqldb.method_class_names, allows preventing access to classes other than java.lang.Math or specifying a semicolon-separated list of allowed classes. A property value that ends with .* is treated as a wild card and allows access to all class or method names formed by substitution of the * (asterisk).\n\nIn the example below, the property has been included as an argument to the Java command.\n\n java -Dhsqldb.method_class_names=\"org.me.MyClass;org.you.YourClass;org.you.lib.*\" [the rest of the command line]\n\nThe above example allows access to the methods in the two classes: org.me.MyClass and org.you.YourClass together with all the classes in the org.you.lib package. Note that if the property is not defined, no access control is performed at this level.\n\nThe user who creates a Java routine must have the relevant access privileges on the tables that are used inside the Java method.\n\nOnce the routine has been defined, the normal database access control applies to its user. The routine can be executed only by those users who have been granted EXECUTE privileges on it. Access to routines can be granted to users with GRANT EXECUTE or GRANT ALL. For example, GRANT EXECUTE ON myroutine TO PUBLIC.\n\nIn hsqldb 2.7.1, all classes by default are not accessible, except those in java.lang.Math and need to be manually enabled.",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "hsqldb: Untrusted input may lead to RCE attack"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src"
],
"known_not_affected": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
],
"known_not_affected": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-1108",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2174246"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Undertow: Infinite loop in SslConduit during close",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src"
],
"known_not_affected": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1108"
},
{
"category": "external",
"summary": "RHBZ#2174246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-m4mm-pg93-fv78",
"url": "https://github.com/advisories/GHSA-m4mm-pg93-fv78"
}
],
"release_date": "2023-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:44:32+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1513"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-all-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el8eap.x86_64",
"8Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el8eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Undertow: Infinite loop in SslConduit during close"
}
]
}
RHSA-2023:2713
Vulnerability from csaf_redhat - Published: 2023-05-10 11:59 - Updated: 2025-11-21 18:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat Single Sign-On 7.6 from the Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.6.3 serves as a replacement for Red Hat Single Sign-On 7.6.2, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* okhttp: information disclosure via improperly used cryptographic function (CVE-2021-0341)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2713",
"url": "https://access.redhat.com/errata/RHSA-2023:2713"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso\u0026downloadType=securityPatches\u0026version=7.6",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso\u0026downloadType=securityPatches\u0026version=7.6"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2713.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.3 security update",
"tracking": {
"current_release_date": "2025-11-21T18:40:15+00:00",
"generator": {
"date": "2025-11-21T18:40:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:2713",
"initial_release_date": "2023-05-10T11:59:30+00:00",
"revision_history": [
{
"date": "2023-05-10T11:59:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-10T11:59:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:40:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Single Sign-On 7",
"product": {
"name": "Red Hat Single Sign-On 7",
"product_id": "Red Hat Single Sign-On 7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.6.3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Single Sign-On"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0341",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2154086"
}
],
"notes": [
{
"category": "description",
"text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "okhttp: information disclosure via improperly used cryptographic function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Single Sign-On 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0341"
},
{
"category": "external",
"summary": "RHBZ#2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0341"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341"
},
{
"category": "external",
"summary": "https://source.android.com/security/bulletin/2021-02-01",
"url": "https://source.android.com/security/bulletin/2021-02-01"
}
],
"release_date": "2021-02-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:59:30+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Single Sign-On 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Single Sign-On 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "okhttp: information disclosure via improperly used cryptographic function"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Single Sign-On 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:59:30+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Single Sign-On 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Single Sign-On 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Single Sign-On 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:59:30+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Single Sign-On 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Single Sign-On 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Single Sign-On 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:59:30+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Single Sign-On 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Single Sign-On 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Single Sign-On 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:59:30+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Single Sign-On 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Single Sign-On 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Single Sign-On 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:59:30+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Single Sign-On 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Single Sign-On 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Single Sign-On 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:59:30+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Single Sign-On 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2713"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Single Sign-On 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
}
]
}
RHSA-2023:4983
Vulnerability from csaf_redhat - Published: 2023-09-05 18:37 - Updated: 2025-11-21 18:44Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for Red Hat Process Automation Manager.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which provides a detailed severity rating, is available for each vulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services.\n\nThis asynchronous security patch is an update to Red Hat Process Automation Manager 7.\n\nSecurity Fixes:\n\n* apache-bcel: Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing (CVE-2022-42920)\n\n* decode-uri-component: improper input validation resulting in DoS (CVE-2022-38900)\n\n* mina-sshd: Java unsafe deserialization vulnerability (CVE-2022-45047)\n\n* spring-boot: Spring Boot Welcome Page DoS Vulnerability (CVE-2023-20883)\n\n* springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern (CVE-2023-20860)\n\n* loader-utils: regular expression denial of service in interpolateName.js (CVE-2022-37599)\n\n* protobuf-java: timeout in parser leads to DoS (CVE-2022-3171)\n\n* snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857)\n\n* woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks (CVE-2022-40152)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\n* sshd-core: mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server (CVE-2021-30129)\n\nFor more details about the security issues, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE pages listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:4983",
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1981527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981527"
},
{
"category": "external",
"summary": "2126789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789"
},
{
"category": "external",
"summary": "2134291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134291"
},
{
"category": "external",
"summary": "2134872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134872"
},
{
"category": "external",
"summary": "2137645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137645"
},
{
"category": "external",
"summary": "2142707",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142707"
},
{
"category": "external",
"summary": "2145194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "2170644",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170644"
},
{
"category": "external",
"summary": "2180528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180528"
},
{
"category": "external",
"summary": "2209342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209342"
},
{
"category": "external",
"summary": "RHPAM-4639",
"url": "https://issues.redhat.com/browse/RHPAM-4639"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4983.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.4 security update",
"tracking": {
"current_release_date": "2025-11-21T18:44:29+00:00",
"generator": {
"date": "2025-11-21T18:44:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:4983",
"initial_release_date": "2023-09-05T18:37:03+00:00",
"revision_history": [
{
"date": "2023-09-05T18:37:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-09-05T18:37:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:44:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHPAM 7.13.4 async",
"product": {
"name": "RHPAM 7.13.4 async",
"product_id": "RHPAM 7.13.4 async",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_bpms_platform:7.13"
}
}
}
],
"category": "product_family",
"name": "Red Hat Process Automation Manager"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-30129",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1981527"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in sshd-core of Apache Mina SSHD allows an attacker to overflow the server causing an OutOfMemory error. This issue affects the SFTP and port forwarding features of Apache Mina SSHD version 2.0.0 and later versions. It was addressed in Apache Mina SSHD 2.7.0",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30129"
},
{
"category": "external",
"summary": "RHBZ#1981527",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981527"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30129"
}
],
"release_date": "2021-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server"
},
{
"cve": "CVE-2022-3143",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"discovery_date": "2022-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2124682"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Wildfly-elytron. Wildfly-elytron uses java.util.Arrays.equals in several places, which is unsafe and vulnerable to timing attacks. To compare values securely, use java.security.MessageDigest.isEqual instead. This flaw allows an attacker to access secure information or impersonate an authed user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wildfly-elytron: possible timing attacks via use of unsafe comparator",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3143"
},
{
"category": "external",
"summary": "RHBZ#2124682",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124682"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3143",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3143"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3143",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3143"
}
],
"release_date": "2022-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "wildfly-elytron: possible timing attacks via use of unsafe comparator"
},
{
"cve": "CVE-2022-3171",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2022-10-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2137645"
}
],
"notes": [
{
"category": "description",
"text": "A parsing issue with binary data in protobuf-java core and lite versions prior to 3.21.7, 3.20.3, 3.19.6 and 3.16.3 can lead to a denial of service attack. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields causes objects to be converted back-n-forth between mutable and immutable forms, resulting in potentially long garbage collection pauses. We recommend updating to the versions mentioned above.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "protobuf-java: timeout in parser leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3171"
},
{
"category": "external",
"summary": "RHBZ#2137645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2137645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3171",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3171"
},
{
"category": "external",
"summary": "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2",
"url": "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2"
}
],
"release_date": "2022-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "protobuf-java: timeout in parser leads to DoS"
},
{
"cve": "CVE-2022-3509",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2022-12-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2184161"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Textformat in protobuf-java core that can lead to a denial of service. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields can cause objects to convert between mutable and immutable forms, resulting in long garbage collection pauses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "protobuf-java: Textformat parsing issue leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3509"
},
{
"category": "external",
"summary": "RHBZ#2184161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3509",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3509"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "protobuf-java: Textformat parsing issue leads to DoS"
},
{
"cve": "CVE-2022-3510",
"cwe": {
"id": "CWE-915",
"name": "Improperly Controlled Modification of Dynamically-Determined Object Attributes"
},
"discovery_date": "2022-12-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2184176"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Message-Type Extensions in protobuf-java core that can lead to a denial of service. Inputs containing multiple instances of non-repeated embedded messages with repeated or unknown fields can cause objects to convert between mutable and immutable forms, resulting in long garbage collection pauses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "protobuf-java: Message-Type Extensions parsing issue leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3510"
},
{
"category": "external",
"summary": "RHBZ#2184176",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184176"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3510",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3510"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "protobuf-java: Message-Type Extensions parsing issue leads to DoS"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-25857",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2126789"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the org.yaml.snakeyaml package. This flaw allows an attacker to cause a denial of service (DoS) due to missing nested depth limitation for collections.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Denial of Service due to missing nested depth limitation for collections",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For RHEL-8 it\u0027s downgraded to moderate because \"snakeyaml\" itself in RHEL 8 or RHEL-9 isn\u0027t shipped and \"prometheus-jmx-exporter\" is needed as build dependency. And it\u0027s not directly exploitable, hence severity marked as moderate.\nRed Hat Integration and AMQ products are not vulnerable to this flaw, so their severity has been lowered to moderate.\nRed Hat Single Sign-On uses snakeyaml from liquibase-core and is only used when performing migrations and would require administrator privileges to execute, hence severity marked as Low.\nRed Hat Fuse 7 is now in Maintenance Support Phase and details about its fix should be present soon. However, Red Hat Fuse Online (Syndesis) does will not contain the fix for this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-25857"
},
{
"category": "external",
"summary": "RHBZ#2126789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525"
}
],
"release_date": "2022-08-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Denial of Service due to missing nested depth limitation for collections"
},
{
"cve": "CVE-2022-37599",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2022-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the interpolateName function in interpolateName.js in the webpack loader-utils 2.0.0 via the resourcePath variable in interpolateName.js. This flaw can lead to a regular expression denial of service (ReDoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "loader-utils: regular expression denial of service in interpolateName.js",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In Red Hat OpenShift Logging the openshift-logging/kibana6-rhel8 container and openshift-logging/logging-view-plugin-rhel8 bundles many nodejs packages as a build time dependencies, including loader-utils package. The vulnerable code is not used hence the impact to OpenShift Logging by this vulnerability is Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-37599"
},
{
"category": "external",
"summary": "RHBZ#2134872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-37599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37599"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-37599",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37599"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hhq3-ff78-jv3g",
"url": "https://github.com/advisories/GHSA-hhq3-ff78-jv3g"
},
{
"category": "external",
"summary": "https://github.com/webpack/loader-utils/issues/211",
"url": "https://github.com/webpack/loader-utils/issues/211"
}
],
"release_date": "2022-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"RHPAM 7.13.4 async"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "loader-utils: regular expression denial of service in interpolateName.js"
},
{
"cve": "CVE-2022-38900",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-02-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2170644"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in decode-uri-component. This issue occurs due to a specially crafted input, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "decode-uri-component: improper input validation resulting in DoS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For OpenShift Container Platform (OCP), Advanced Clusters Management for Kubernetes (ACM) and Advanced Cluster Security (ACS), the NPM decode-uri-component package is only present in source repositories as a development dependency, it is not used in production. Therefore this vulnerability is rated Low for OCP and ACS.\n\nIn Red Hat OpenShift Logging the openshift-logging/kibana6-rhel8 container bundles many nodejs packages as a build time dependencies, including the decode-uri-component package. \nThe vulnerable code is not used, hence the impact to OpenShift Logging by this vulnerability is Low.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38900"
},
{
"category": "external",
"summary": "RHBZ#2170644",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170644"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38900",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38900"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38900",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38900"
},
{
"category": "external",
"summary": "https://github.com/SamVerschueren/decode-uri-component/issues/5",
"url": "https://github.com/SamVerschueren/decode-uri-component/issues/5"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-w573-4hg7-7wgq",
"url": "https://github.com/advisories/GHSA-w573-4hg7-7wgq"
}
],
"release_date": "2022-11-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "decode-uri-component: improper input validation resulting in DoS"
},
{
"cve": "CVE-2022-40152",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2134291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the FasterXML/woodstox package. This flaw allows an attacker to cause a denial of service (DoS) in its target via XML serialization. An attacker may benefit from the parser sending a malicious input that may cause a crash. This vulnerability is only relevant for users using the DTD parsing functionality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-40152"
},
{
"category": "external",
"summary": "RHBZ#2134291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-40152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40152"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40152",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40152"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-3f7h-mf4q-vrm4",
"url": "https://github.com/advisories/GHSA-3f7h-mf4q-vrm4"
}
],
"release_date": "2022-09-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-42920",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2142707"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) write flaw was found in Apache Commons BCEL API. This flaw can be used to produce arbitrary bytecode and may abuse applications that pass attacker-controlled data to those APIs, giving the attacker more control over the resulting bytecode than otherwise expected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Fuse 7 ships the code in question but does not utilize it in the product, so it is affected at a reduced impact of Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42920"
},
{
"category": "external",
"summary": "RHBZ#2142707",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142707"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42920",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42920"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/lfxk7q8qmnh5bt9jm6nmjlv5hsxjhrz4",
"url": "https://lists.apache.org/thread/lfxk7q8qmnh5bt9jm6nmjlv5hsxjhrz4"
}
],
"release_date": "2022-11-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing"
},
{
"cve": "CVE-2022-45047",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-11-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2145194"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache MINA SSHD, when using Java deserialization to load a serialized java.security.PrivateKey. An attacker could benefit from unsafe deserialization by inserting unsecured data that may affect the application or server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mina-sshd: Java unsafe deserialization vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Impact as High as there\u0027s a mitigation for minimizing the impact which the flaw requires org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to be impacted, which would require an external/public API for an attacker to benefit from it. \n\nRed Hat Fuse 7 and Red Hat JBoss Enterprise Application Platform 7 have a lower rate (moderate) as it\u0027s very unlikely to be exploited since those are for internal usage or use a custom implementation in their case.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45047"
},
{
"category": "external",
"summary": "RHBZ#2145194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45047"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45047"
},
{
"category": "external",
"summary": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html",
"url": "https://www.mail-archive.com/dev@mina.apache.org/msg39312.html"
}
],
"release_date": "2022-11-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
},
{
"category": "workaround",
"details": "From the maintainer:\n\nFor Apache MINA SSHD \u003c= 2.9.1, do not use org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider to generate and later load your server\u0027s host key. Use separately generated host key files, for instance in OpenSSH format, and load them via a org.apache.sshd.common.keyprovider.FileKeyPairProvider instead. Or use a custom implementation instead of \nSimpleGeneratorHostKeyProvider that uses the OpenSSH format for storing and loading the host key (via classes OpenSSHKeyPairResourceWriter and OpenSSHKeyPairResourceParser).",
"product_ids": [
"RHPAM 7.13.4 async"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "mina-sshd: Java unsafe deserialization vulnerability"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-20860",
"cwe": {
"id": "CWE-155",
"name": "Improper Neutralization of Wildcards or Matching Symbols"
},
"discovery_date": "2023-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2180528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Spring Framework. In this vulnerability, a security bypass is possible due to the behavior of the wildcard pattern.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-20860"
},
{
"category": "external",
"summary": "RHBZ#2180528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-20860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20860"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-20860",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20860"
},
{
"category": "external",
"summary": "https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861",
"url": "https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861"
}
],
"release_date": "2023-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern"
},
{
"cve": "CVE-2023-20861",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2180530"
}
],
"notes": [
{
"category": "description",
"text": "A flaw found was found in Spring Framework. This flaw allows a malicious user to use a specially crafted SpEL expression that causes a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "springframework: Spring Expression DoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-20861"
},
{
"category": "external",
"summary": "RHBZ#2180530",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180530"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-20861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20861"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-20861",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20861"
},
{
"category": "external",
"summary": "https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861",
"url": "https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861"
}
],
"release_date": "2023-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "springframework: Spring Expression DoS Vulnerability"
},
{
"cve": "CVE-2023-20883",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-05-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2209342"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Spring Boot, occurring prominently in Spring MVC with a reverse proxy cache. This issue requires Spring MVC to have auto-configuration enabled and the application to use Spring Boot\u0027s welcome page support, either static or templated, resulting in the application being deployed behind a proxy that caches 404 responses. This issue may cause a denial of service (DoS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-boot: Spring Boot Welcome Page DoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-20883"
},
{
"category": "external",
"summary": "RHBZ#2209342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-20883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20883"
}
],
"release_date": "2023-05-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-boot: Spring Boot Welcome Page DoS Vulnerability"
},
{
"cve": "CVE-2023-24998",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-02-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2172298"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Commons FileUpload, where it does not limit the number of parts being processed in a request. This issue may allow an attacker to use a malicious upload or series of uploads to trigger a denial of service.\r\n\r\nWhile Red Hat Satellite relies upon Apache Tomcat, it does not directly ship it. Tomcat is shipped with Red Hat Enterprise Linux and consumed by the Candlepin component of Satellite. Red Hat Satellite users are therefore advised to check the impact state of Red Hat Enterprise Linux, since any necessary fixes will be distributed through the platform.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "FileUpload: FileUpload DoS with excessive parts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"RHPAM 7.13.4 async"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-24998"
},
{
"category": "external",
"summary": "RHBZ#2172298",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172298"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24998",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24998"
},
{
"category": "external",
"summary": "https://commons.apache.org/proper/commons-fileupload/security-reports.html#Fixed_in_Apache_Commons_FileUpload_1.5",
"url": "https://commons.apache.org/proper/commons-fileupload/security-reports.html#Fixed_in_Apache_Commons_FileUpload_1.5"
}
],
"release_date": "2023-02-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-05T18:37:03+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"RHPAM 7.13.4 async"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"RHPAM 7.13.4 async"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "FileUpload: FileUpload DoS with excessive parts"
}
]
}
RHSA-2023_2707
Vulnerability from csaf_redhat - Published: 2023-05-10 11:25 - Updated: 2024-12-17 21:16Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "New Red Hat Single Sign-On 7.6.3 packages are now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.6.3 on RHEL 9 serves as a replacement for Red Hat Single Sign-On 7.6.2, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* okhttp: information disclosure via improperly used cryptographic function (CVE-2021-0341)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2707",
"url": "https://access.redhat.com/errata/RHSA-2023:2707"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2707.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.3 security update on RHEL 9",
"tracking": {
"current_release_date": "2024-12-17T21:16:57+00:00",
"generator": {
"date": "2024-12-17T21:16:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:2707",
"initial_release_date": "2023-05-10T11:25:29+00:00",
"revision_history": [
{
"date": "2023-05-10T11:25:29+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-10T11:25:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:16:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Single Sign-On 7.6 for RHEL 9",
"product": {
"name": "Red Hat Single Sign-On 7.6 for RHEL 9",
"product_id": "9Base-RHSSO-7.6",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.6::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Single Sign-On"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"product": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"product_id": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.7-1.redhat_00001.1.el9sso?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"product": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"product_id": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak@18.0.7-1.redhat_00001.1.el9sso?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"product": {
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"product_id": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-sso7-keycloak-server@18.0.7-1.redhat_00001.1.el9sso?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 9",
"product_id": "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
},
"product_reference": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"relates_to_product_reference": "9Base-RHSSO-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src as a component of Red Hat Single Sign-On 7.6 for RHEL 9",
"product_id": "9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src"
},
"product_reference": "rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"relates_to_product_reference": "9Base-RHSSO-7.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch as a component of Red Hat Single Sign-On 7.6 for RHEL 9",
"product_id": "9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
},
"product_reference": "rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"relates_to_product_reference": "9Base-RHSSO-7.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0341",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2154086"
}
],
"notes": [
{
"category": "description",
"text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "okhttp: information disclosure via improperly used cryptographic function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0341"
},
{
"category": "external",
"summary": "RHBZ#2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0341"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341"
},
{
"category": "external",
"summary": "https://source.android.com/security/bulletin/2021-02-01",
"url": "https://source.android.com/security/bulletin/2021-02-01"
}
],
"release_date": "2021-02-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2707"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "okhttp: information disclosure via improperly used cryptographic function"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2707"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2707"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2707"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2707"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2707"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T11:25:29+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2707"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.noarch",
"9Base-RHSSO-7.6:rh-sso7-keycloak-0:18.0.7-1.redhat_00001.1.el9sso.src",
"9Base-RHSSO-7.6:rh-sso7-keycloak-server-0:18.0.7-1.redhat_00001.1.el9sso.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
}
]
}
RHSA-2023_6305
Vulnerability from csaf_redhat - Published: 2023-11-06 11:24 - Updated: 2024-12-18 04:52Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update is now available for MTA-6.1-RHEL-8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Migration Toolkit for Applications 6.1.4 Images.\n\nSecurity Fix(es):\n\n* golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) (CVE-2023-39325)\n\n* HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:6305",
"url": "https://access.redhat.com/errata/RHSA-2023:6305"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6305.json"
}
],
"title": "Red Hat Security Advisory: Migration Toolkit for Applications security update",
"tracking": {
"current_release_date": "2024-12-18T04:52:36+00:00",
"generator": {
"date": "2024-12-18T04:52:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:6305",
"initial_release_date": "2023-11-06T11:24:51+00:00",
"revision_history": [
{
"date": "2023-11-06T11:24:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-06T11:24:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-18T04:52:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "MTA 6.1 for RHEL 8",
"product": {
"name": "MTA 6.1 for RHEL 8",
"product_id": "8Base-MTA-6.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:migration_toolkit_applications:6.1::el8"
}
}
}
],
"category": "product_family",
"name": "Migration Toolkit for Applications"
},
{
"branches": [
{
"category": "product_version",
"name": "mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"product": {
"name": "mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"product_id": "mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-hub-rhel8\u0026tag=6.1.4-2"
}
}
},
{
"category": "product_version",
"name": "mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"product": {
"name": "mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"product_id": "mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-operator-bundle\u0026tag=6.1.4-3"
}
}
},
{
"category": "product_version",
"name": "mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"product": {
"name": "mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"product_id": "mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-rhel8-operator\u0026tag=6.1.4-3"
}
}
},
{
"category": "product_version",
"name": "mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"product": {
"name": "mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"product_id": "mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-pathfinder-rhel8\u0026tag=6.1.4-1"
}
}
},
{
"category": "product_version",
"name": "mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"product": {
"name": "mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"product_id": "mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-ui-rhel8\u0026tag=6.1.4-2"
}
}
},
{
"category": "product_version",
"name": "mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64",
"product": {
"name": "mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64",
"product_id": "mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a?arch=amd64\u0026repository_url=registry.redhat.io/mta/mta-windup-addon-rhel8\u0026tag=6.1.4-2"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64 as a component of MTA 6.1 for RHEL 8",
"product_id": "8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64"
},
"product_reference": "mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"relates_to_product_reference": "8Base-MTA-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64 as a component of MTA 6.1 for RHEL 8",
"product_id": "8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64"
},
"product_reference": "mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"relates_to_product_reference": "8Base-MTA-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64 as a component of MTA 6.1 for RHEL 8",
"product_id": "8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64"
},
"product_reference": "mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"relates_to_product_reference": "8Base-MTA-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64 as a component of MTA 6.1 for RHEL 8",
"product_id": "8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64"
},
"product_reference": "mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"relates_to_product_reference": "8Base-MTA-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64 as a component of MTA 6.1 for RHEL 8",
"product_id": "8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64"
},
"product_reference": "mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"relates_to_product_reference": "8Base-MTA-6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64 as a component of MTA 6.1 for RHEL 8",
"product_id": "8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
},
"product_reference": "mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64",
"relates_to_product_reference": "8Base-MTA-6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-06T11:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-39325",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243296"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the `Rapid Reset Attack` in the Go language packages.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is related to CVE-2023-44487.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39325"
},
{
"category": "external",
"summary": "RHBZ#2243296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243296"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39325"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-44487",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://go.dev/issue/63417",
"url": "https://go.dev/issue/63417"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-06T11:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6305"
},
{
"category": "workaround",
"details": "The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487)"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242803"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in handling multiplexed streams in the HTTP/2 protocol. A client can repeatedly make a request for a new multiplex stream and immediately send an RST_STREAM frame to cancel it. This creates extra work for the server setting up and tearing down the streams while not hitting any server-side limit for the maximum number of active streams per connection, resulting in a denial of service due to server resource consumption. Red Hat has rated the severity of this flaw as \u0027Important\u0027 as the US Cybersecurity and Infrastructure Security Agency (CISA) declared this vulnerability an active exploit.\r\n\r\nCVE-2023-39325 was assigned for the Rapid Reset Attack in the Go language packages.\r\n\r\nSecurity Bulletin\r\nhttps://access.redhat.com/security/vulnerabilities/RHSB-2023-003",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "NGINX has been marked as Moderate Impact because, for performance and resource consumption reasons, NGINX limits the number of concurrent streams to a default of 128. In addition, to optimally balance network and server performance, NGINX allows the client to persist HTTP connections for up to 1000 requests by default using an HTTP keepalive.\n\nThe majority of RHEL utilities are not long-running applications; instead, they are command-line tools. These tools utilize Golang package as build-time dependency, which is why they are classified as having a \"Moderate\" level of impact.\n\nrhc component is no longer impacted by CVE-2023-44487 \u0026 CVE-2023-39325.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "RHBZ#2242803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242803"
},
{
"category": "external",
"summary": "RHSB-2023-003",
"url": "https://access.redhat.com/security/vulnerabilities/RHSB-2023-003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
},
{
"category": "external",
"summary": "https://github.com/dotnet/announcements/issues/277",
"url": "https://github.com/dotnet/announcements/issues/277"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2102",
"url": "https://pkg.go.dev/vuln/GO-2023-2102"
},
{
"category": "external",
"summary": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487",
"url": "https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487"
},
{
"category": "external",
"summary": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/",
"url": "https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-10-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-06T11:24:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6305"
},
{
"category": "workaround",
"details": "Users are strongly urged to update their software as soon as fixes are available. \nThere are several mitigation approaches for this flaw. \n\n1. If circumstances permit, users may disable http2 endpoints to circumvent the flaw altogether until a fix is available.\n2. IP-based blocking or flood protection and rate control tools may be used at network endpoints to filter incoming traffic.\n3. Several package specific mitigations are also available. \n a. nginx: https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/\n b. netty: https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p\n c. haproxy: https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487\n d. nghttp2: https://github.com/nghttp2/nghttp2/security/advisories/GHSA-vx74-f528-fxqg\n e. golang: The default stream concurrency limit in golang is 250 streams (requests) per HTTP/2 connection. This value may be adjusted in the golang.org/x/net/http2 package using the Server.MaxConcurrentStreams setting and the ConfigureServer function which are available in golang.org/x/net/http2.",
"product_ids": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-MTA-6.1:mta/mta-hub-rhel8@sha256:5dddb8ad78fd32ea95f0cecefefe23df5f91947e4ecf91545904a41d587d5f9c_amd64",
"8Base-MTA-6.1:mta/mta-operator-bundle@sha256:f3d585e24d65905b2e9f594dcdb67721aa95057ab7587ae531c3487aa2f94e53_amd64",
"8Base-MTA-6.1:mta/mta-pathfinder-rhel8@sha256:e3abb9fce799c8b59e2001fa06b186fecce9f8d19d4987e3ce16ba2325f0ad00_amd64",
"8Base-MTA-6.1:mta/mta-rhel8-operator@sha256:3ec660105a8b02d46e6b0fb33293f5dc8e8c628b9a0487b261e7c6c811152f55_amd64",
"8Base-MTA-6.1:mta/mta-ui-rhel8@sha256:c3b75025b98012483cd5d7fc3b1e2b747e6c78782e99736522b9cdbf220f5841_amd64",
"8Base-MTA-6.1:mta/mta-windup-addon-rhel8@sha256:569e41225942bc8bebaa2d4becb83254ab5ca290363a18d186754fc7f039e95a_amd64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-10-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)"
}
]
}
RHSA-2023:1514
Vulnerability from csaf_redhat - Published: 2023-03-29 11:43 - Updated: 2025-11-21 18:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.4.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.10 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* SnakeYaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)\n\n* hsqldb: Untrusted input may lead to RCE attack (CVE-2022-41853)\n\n* Undertow: Infinite loop in SslConduit during close (CVE-2023-1108)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1514",
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2136141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141"
},
{
"category": "external",
"summary": "2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "2174246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
},
{
"category": "external",
"summary": "JBEAP-23572",
"url": "https://issues.redhat.com/browse/JBEAP-23572"
},
{
"category": "external",
"summary": "JBEAP-24122",
"url": "https://issues.redhat.com/browse/JBEAP-24122"
},
{
"category": "external",
"summary": "JBEAP-24172",
"url": "https://issues.redhat.com/browse/JBEAP-24172"
},
{
"category": "external",
"summary": "JBEAP-24182",
"url": "https://issues.redhat.com/browse/JBEAP-24182"
},
{
"category": "external",
"summary": "JBEAP-24220",
"url": "https://issues.redhat.com/browse/JBEAP-24220"
},
{
"category": "external",
"summary": "JBEAP-24254",
"url": "https://issues.redhat.com/browse/JBEAP-24254"
},
{
"category": "external",
"summary": "JBEAP-24292",
"url": "https://issues.redhat.com/browse/JBEAP-24292"
},
{
"category": "external",
"summary": "JBEAP-24339",
"url": "https://issues.redhat.com/browse/JBEAP-24339"
},
{
"category": "external",
"summary": "JBEAP-24341",
"url": "https://issues.redhat.com/browse/JBEAP-24341"
},
{
"category": "external",
"summary": "JBEAP-24363",
"url": "https://issues.redhat.com/browse/JBEAP-24363"
},
{
"category": "external",
"summary": "JBEAP-24372",
"url": "https://issues.redhat.com/browse/JBEAP-24372"
},
{
"category": "external",
"summary": "JBEAP-24380",
"url": "https://issues.redhat.com/browse/JBEAP-24380"
},
{
"category": "external",
"summary": "JBEAP-24383",
"url": "https://issues.redhat.com/browse/JBEAP-24383"
},
{
"category": "external",
"summary": "JBEAP-24384",
"url": "https://issues.redhat.com/browse/JBEAP-24384"
},
{
"category": "external",
"summary": "JBEAP-24385",
"url": "https://issues.redhat.com/browse/JBEAP-24385"
},
{
"category": "external",
"summary": "JBEAP-24395",
"url": "https://issues.redhat.com/browse/JBEAP-24395"
},
{
"category": "external",
"summary": "JBEAP-24507",
"url": "https://issues.redhat.com/browse/JBEAP-24507"
},
{
"category": "external",
"summary": "JBEAP-24574",
"url": "https://issues.redhat.com/browse/JBEAP-24574"
},
{
"category": "external",
"summary": "JBEAP-24588",
"url": "https://issues.redhat.com/browse/JBEAP-24588"
},
{
"category": "external",
"summary": "JBEAP-24605",
"url": "https://issues.redhat.com/browse/JBEAP-24605"
},
{
"category": "external",
"summary": "JBEAP-24618",
"url": "https://issues.redhat.com/browse/JBEAP-24618"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1514.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 on RHEL 9 security update",
"tracking": {
"current_release_date": "2025-11-21T18:38:52+00:00",
"generator": {
"date": "2025-11-21T18:38:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:1514",
"initial_release_date": "2023-03-29T11:43:38+00:00",
"revision_history": [
{
"date": "2023-03-29T11:43:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-03-29T11:43:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:38:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 9",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan@11.0.17-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.86-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.8-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata@13.4.0-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.5-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.86-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.50-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"product": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"product_id": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"product": {
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"product_id": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-client@1.1.16-1.Final_redhat_00002.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.11-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"product_id": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-wildfly-integration@1.0.7-1.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.14-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"product_id": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-mime4j@0.8.9-1.redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-el-api_3.0_spec@2.0.1-1.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"product_id": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-spi@3.4.0-2.Final_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"product_id": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-26.Final_redhat_00025.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"product_id": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-snakeyaml@1.33.0-2.SP1_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"product_id": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.23-1.SP2_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"product_id": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-native@1.0.2-3.redhat_00004.1.el9eap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"product_id": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native@1.0.2-4.redhat_00004.1.el9eap?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"product_id": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.10-6.GA_redhat_00002.1.el9eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-cachestore-jdbc@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-cachestore-remote@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-client-hotrod@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-commons@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-component-annotations@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-core@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-commons@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-spi@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-infinispan-hibernate-cache-v53@11.0.17-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-buffer@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-dns@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-haproxy@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-http2@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-memcache@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-mqtt@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-redis@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-smtp@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-socks@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-stomp@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-codec-xml@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-common@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-handler-proxy@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-resolver-dns-classes-macos@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-epoll@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-classes-kqueue@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-unix-common@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-rxtx@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-sctp@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-udt@4.1.86-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-cxf@5.4.8-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata@13.4.0-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-appclient@13.4.0-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-common@13.4.0-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-ear@13.4.0-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-ejb@13.4.0-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-metadata-web@13.4.0-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-client@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.15.5-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.50-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product": {
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_id": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-api@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product": {
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_id": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-common@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product": {
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_id": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-config@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_id": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-federation@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product": {
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_id": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-api@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product": {
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_id": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-impl@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product": {
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_id": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-idm-simple-schema@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product": {
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_id": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-picketlink-impl@2.5.5-22.SP12_redhat_00012.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-client-common@1.1.16-1.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-ejb-client@1.1.16-1.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-naming-client@1.1.16-1.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-http-transaction-client@1.1.16-1.Final_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.11-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-wildfly-integration@1.0.7-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow-jastow@2.0.14-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"product_id": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-apache-mime4j@0.8.9-1.redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-el-api_3.0_spec@2.0.1-1.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jbossws-spi@3.4.0-2.Final_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product_id": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.10.0-26.Final_redhat_00025.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product_id": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.10.0-26.Final_redhat_00025.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product_id": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.10.0-26.Final_redhat_00025.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-snakeyaml@1.33.0-2.SP1_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-undertow@2.2.23-1.SP2_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-activemq-artemis-native@1.0.2-3.redhat_00004.1.el9eap?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.10-6.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.10-6.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.10-6.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.10-6.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.10-6.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.10-6.GA_redhat_00002.1.el9eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll@4.1.86-1.Final_redhat_00001.1.el9eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"product": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"product_id": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-netty-transport-native-epoll-debuginfo@4.1.86-1.Final_redhat_00001.1.el9eap?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"product": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"product_id": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native@1.0.2-4.redhat_00004.1.el9eap?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"product": {
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"product_id": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-artemis-native-wildfly@1.0.2-4.redhat_00004.1.el9eap?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64"
},
"product_reference": "eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64"
},
"product_reference": "eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src"
},
"product_reference": "eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch"
},
"product_reference": "eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64 as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64"
},
"product_reference": "eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch"
},
"product_reference": "eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch"
},
"product_reference": "eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch"
},
"product_reference": "eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch"
},
"product_reference": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src"
},
"product_reference": "eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch"
},
"product_reference": "eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch"
},
"product_reference": "eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch"
},
"product_reference": "eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch"
},
"product_reference": "eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src"
},
"product_reference": "eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-12-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150009"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SnakeYaml: Constructor Deserialization Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml\u0027s SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker\u0027s control. Due to that the impact for RHPAM is reduced to Low.\n\nRed Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml\u0027s Constructor class nor pass untrusted data to this class. When this class is used, it\u2019s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src"
],
"known_not_affected": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1471"
},
{
"category": "external",
"summary": "RHBZ#2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2",
"url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2"
}
],
"release_date": "2022-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "SnakeYaml: Constructor Deserialization Remote Code Execution"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src"
],
"known_not_affected": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src"
],
"known_not_affected": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41853",
"cwe": {
"id": "CWE-470",
"name": "Use of Externally-Controlled Input to Select Classes or Code (\u0027Unsafe Reflection\u0027)"
},
"discovery_date": "2022-10-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2136141"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the HSQLDB package. This flaw allows untrusted inputs to execute remote code due to any static method of any Java class in the classpath, resulting in code execution by default.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hsqldb: Untrusted input may lead to RCE attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41853"
},
{
"category": "external",
"summary": "RHBZ#2136141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41853"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41853"
},
{
"category": "external",
"summary": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control",
"url": "http://hsqldb.org/doc/2.0/guide/sqlroutines-chapt.html#src_jrt_access_control"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-77xx-rxvh-q682",
"url": "https://github.com/advisories/GHSA-77xx-rxvh-q682"
}
],
"release_date": "2022-10-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
},
{
"category": "workaround",
"details": "By default, the static methods of any class that is on the classpath are available for use and can compromise security in some systems. The optional Java system property, hsqldb.method_class_names, allows preventing access to classes other than java.lang.Math or specifying a semicolon-separated list of allowed classes. A property value that ends with .* is treated as a wild card and allows access to all class or method names formed by substitution of the * (asterisk).\n\nIn the example below, the property has been included as an argument to the Java command.\n\n java -Dhsqldb.method_class_names=\"org.me.MyClass;org.you.YourClass;org.you.lib.*\" [the rest of the command line]\n\nThe above example allows access to the methods in the two classes: org.me.MyClass and org.you.YourClass together with all the classes in the org.you.lib package. Note that if the property is not defined, no access control is performed at this level.\n\nThe user who creates a Java routine must have the relevant access privileges on the tables that are used inside the Java method.\n\nOnce the routine has been defined, the normal database access control applies to its user. The routine can be executed only by those users who have been granted EXECUTE privileges on it. Access to routines can be granted to users with GRANT EXECUTE or GRANT ALL. For example, GRANT EXECUTE ON myroutine TO PUBLIC.\n\nIn hsqldb 2.7.1, all classes by default are not accessible, except those in java.lang.Math and need to be manually enabled.",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "hsqldb: Untrusted input may lead to RCE attack"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src"
],
"known_not_affected": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
],
"known_not_affected": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
],
"known_not_affected": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-1108",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2174246"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Undertow: Infinite loop in SslConduit during close",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src"
],
"known_not_affected": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-1108"
},
{
"category": "external",
"summary": "RHBZ#2174246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-1108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-m4mm-pg93-fv78",
"url": "https://github.com/advisories/GHSA-m4mm-pg93-fv78"
}
],
"release_date": "2023-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-29T11:43:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1514"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-activemq-artemis-native-1:1.0.2-3.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-apache-mime4j-0:0.8.9-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-artemis-native-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-native-wildfly-1:1.0.2-4.redhat_00004.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-artemis-wildfly-integration-0:1.0.7-1.redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-0:11.0.17-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-jdbc-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-cachestore-remote-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-client-hotrod-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-component-annotations-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-core-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-commons-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-spi-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-infinispan-hibernate-cache-v53-0:11.0.17-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-0:1.5.11-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-common-spi-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-api-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-core-impl-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-deployers-common-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-jdbc-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-ironjacamar-validator-0:1.5.11-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-ejb-client-0:4.0.50-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-el-api_3.0_spec-0:2.0.1-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-0:13.4.0-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-metadata-appclient-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-common-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ear-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-ejb-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-metadata-web-0:13.4.0-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-0:1.10.0-26.Final_redhat_00025.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-cli-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jboss-server-migration-core-0:1.10.0-26.Final_redhat_00025.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-cxf-0:5.4.8-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jbossws-spi-0:3.4.0-2.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-buffer-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-haproxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-http2-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-memcache-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-mqtt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-redis-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-smtp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-socks-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-stomp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-codec-xml-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-handler-proxy-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-resolver-dns-classes-macos-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-classes-kqueue-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-epoll-debuginfo-0:4.1.86-1.Final_redhat_00001.1.el9eap.x86_64",
"9Base-JBEAP-7.4:eap7-netty-transport-native-unix-common-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-rxtx-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-sctp-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-netty-transport-udt-0:4.1.86-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-common-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-config-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-federation-0:2.5.5-22.SP12_redhat_00012.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-picketlink-idm-api-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-idm-simple-schema-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-picketlink-impl-0:2.5.5-22.SP12_redhat_00012.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-0:3.15.5-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-resteasy-atom-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-cdi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-client-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-crypto-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jackson2-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxb-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jaxrs-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jettison-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jose-jwt-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-jsapi-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-binding-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-json-p-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-multipart-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-rxjava2-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-spring-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-validator-provider-11-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-resteasy-yaml-provider-0:3.15.5-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-snakeyaml-0:1.33.0-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-0:2.2.23-1.SP2_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-undertow-jastow-0:2.0.14-1.Final_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.10-6.GA_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-http-client-common-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-ejb-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-naming-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-http-transaction-client-0:1.1.16-1.Final_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.10-6.GA_redhat_00002.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Undertow: Infinite loop in SslConduit during close"
}
]
}
RHSA-2023_2710
Vulnerability from csaf_redhat - Published: 2023-05-10 14:30 - Updated: 2024-12-17 21:17Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A new image is available for Red Hat Single Sign-On 7.6.3, running on Red\nHat OpenShift Container Platform from the release of 3.11 up to the release\nof 4.12.0.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Single Sign-On is an integrated sign-on solution, available as a\nRed Hat JBoss Middleware for OpenShift containerized image. The Red Hat\nSingle Sign-On for OpenShift image provides an authentication server that\nyou can use to log in centrally, log out, and register. You can also manage\nuser accounts for web applications, mobile applications, and RESTful web\nservices.\n\nThis erratum releases a new image for Red Hat Single Sign-On 7.6.3 for use within the Red Hat OpenShift Container Platform (from the release of 3.11\nup to the release of 4.12.0) cloud computing Platform-as-a-Service (PaaS)\nfor on-premise or private cloud deployments, aligning with the standalone\nproduct release.\n\nSecurity Fix(es):\n\n* okhttp: information disclosure via improperly used cryptographic function (CVE-2021-0341)\n\n* undertow: Server identity in https connection is not checked by the undertow client (CVE-2022-4492)\n\n* snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode (CVE-2022-38752)\n\n* dev-java/snakeyaml: DoS via stack overflow (CVE-2022-41854)\n\n* codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS (CVE-2022-41881)\n\n* apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider (CVE-2022-45787)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2710",
"url": "https://access.redhat.com/errata/RHSA-2023:2710"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "RHSSO-1883",
"url": "https://issues.redhat.com/browse/RHSSO-1883"
},
{
"category": "external",
"summary": "RHSSO-2313",
"url": "https://issues.redhat.com/browse/RHSSO-2313"
},
{
"category": "external",
"summary": "RHSSO-2346",
"url": "https://issues.redhat.com/browse/RHSSO-2346"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2710.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.3 for OpenShift image security update",
"tracking": {
"current_release_date": "2024-12-17T21:17:26+00:00",
"generator": {
"date": "2024-12-17T21:17:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:2710",
"initial_release_date": "2023-05-10T14:30:46+00:00",
"revision_history": [
{
"date": "2023-05-10T14:30:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-10T14:30:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T21:17:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Middleware Containers for OpenShift",
"product": {
"name": "Middleware Containers for OpenShift",
"product_id": "8Base-RHOSE-Middleware",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhosemc:1.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x",
"product": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x",
"product_id": "rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5?arch=s390x\u0026repository_url=registry.redhat.io/rh-sso-7/sso76-openshift-rhel8\u0026tag=7.6-22"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"product": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"product_id": "rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568?arch=ppc64le\u0026repository_url=registry.redhat.io/rh-sso-7/sso76-openshift-rhel8\u0026tag=7.6-22"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"product": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"product_id": "rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"product_identification_helper": {
"purl": "pkg:oci/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275?arch=amd64\u0026repository_url=registry.redhat.io/rh-sso-7/sso76-openshift-rhel8\u0026tag=7.6-22"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64 as a component of Middleware Containers for OpenShift",
"product_id": "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64"
},
"product_reference": "rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"relates_to_product_reference": "8Base-RHOSE-Middleware"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le as a component of Middleware Containers for OpenShift",
"product_id": "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le"
},
"product_reference": "rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"relates_to_product_reference": "8Base-RHOSE-Middleware"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x as a component of Middleware Containers for OpenShift",
"product_id": "8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
},
"product_reference": "rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x",
"relates_to_product_reference": "8Base-RHOSE-Middleware"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0341",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2022-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2154086"
}
],
"notes": [
{
"category": "description",
"text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "okhttp: information disclosure via improperly used cryptographic function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0341"
},
{
"category": "external",
"summary": "RHBZ#2154086",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2154086"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0341"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0341"
},
{
"category": "external",
"summary": "https://source.android.com/security/bulletin/2021-02-01",
"url": "https://source.android.com/security/bulletin/2021-02-01"
}
],
"release_date": "2021-02-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T14:30:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "okhttp: information disclosure via improperly used cryptographic function"
},
{
"cve": "CVE-2022-4492",
"cwe": {
"id": "CWE-550",
"name": "Server-generated Error Message Containing Sensitive Information"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153260"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in undertow. The undertow client is not checking the server identity the server certificate presents in HTTPS connections. This is a compulsory step ( that should at least be performed by default) in HTTPS and in http/2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "undertow: Server identity in https connection is not checked by the undertow client",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4492"
},
{
"category": "external",
"summary": "RHBZ#2153260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153260"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4492"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T14:30:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "undertow: Server identity in https connection is not checked by the undertow client"
},
{
"cve": "CVE-2022-38752",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129710"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the snakeyaml package due to a stack-overflow in parsing YAML files. By persuading a victim to open a specially-crafted file, a remote attacker could cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not affected by this issue as it already includes the fixed version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-38752"
},
{
"category": "external",
"summary": "RHBZ#2129710",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129710"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38752"
}
],
"release_date": "2022-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T14:30:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode"
},
{
"cve": "CVE-2022-41854",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2151988"
}
],
"notes": [
{
"category": "description",
"text": "Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "dev-java/snakeyaml: DoS via stack overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41854"
},
{
"category": "external",
"summary": "RHBZ#2151988",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151988"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41854"
},
{
"category": "external",
"summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355",
"url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/543/stackoverflow-oss-fuzz-50355"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355",
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50355"
}
],
"release_date": "2022-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T14:30:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "dev-java/snakeyaml: DoS via stack overflow"
},
{
"cve": "CVE-2022-41881",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2022-12-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153379"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in codec-haproxy from the Netty project. This flaw allows an attacker to build a malformed crafted message and cause infinite recursion, causing stack exhaustion and leading to a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41881"
},
{
"category": "external",
"summary": "RHBZ#2153379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41881"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T14:30:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS"
},
{
"cve": "CVE-2022-45787",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2158916"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache James\u0027s Mime4j TempFileStorageProvider class, where it may set improper permissions when utilizing temporary files. This flaw allows a locally authorized attacker to access information outside their intended permissions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-45787"
},
{
"category": "external",
"summary": "RHBZ#2158916",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787"
}
],
"release_date": "2023-01-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T14:30:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-10T14:30:46+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2710"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:9079e1080d36270fbd3529a221a014859042ebcc627243f015cbbdd3bdc04275_amd64",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:c3e0e8203d2a7dd9e3bc729b3fd28b15558b7e6d25c3fb538687be54f0ec5568_ppc64le",
"8Base-RHOSE-Middleware:rh-sso-7/sso76-openshift-rhel8@sha256:e7d2be6b039deff86bf9fa7c0285583f3769d4f39be9471ba9906fe8e2fb00e5_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
}
]
}
RHSA-2023:5165
Vulnerability from csaf_redhat - Published: 2023-09-14 09:51 - Updated: 2025-11-21 18:45Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat AMQ Streams 2.5.0 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat AMQ Streams, based on the Apache Kafka project, offers a distributed backbone that allows microservices and other applications to share data with extremely high throughput and extremely low latency.\n\nSecurity Fix(es):\n\n* snakeyaml: Constructor Deserialization Remote Code Execution (CVE-2022-1471)\n \n* scala: deserialization gadget chain (CVE-2022-36944)\n\n* DoS of the Okio client when handling a crafted GZIP archive (CVE-2023-3635)\n \n* netty-codec: Bzip2Decoder doesn\u0027t allow setting size restrictions for decompressed data (CVE-2021-37136)\n\n* netty-codec: SnappyFrameDecoder doesn\u0027t restrict chunk length and may buffer skippable chunks in an unnecessary way (CVE-2021-37137)\n\n* netty: world readable temporary file containing sensitive data (CVE-2022-24823)\n\n* guava: insecure temporary directory creation (CVE-2023-2976)\n\n* Jetty servlets with multipart support may cause OOM error with client requests (CVE-2023-26048)\n\n* Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies (CVE-2023-26049)\n\n* bouncycastle: potential blind LDAP injection attack using a self-signed certificate (CVE-2023-33201)\n\n* snappy-java: Integer overflow in shuffle leads to DoS (CVE-2023-34453)\n\n* snappy-java: Integer overflow in compress leads to DoS (CVE-2023-34454)\n\n* snappy-java: Unchecked chunk length leads to DoS (CVE-2023-34455)\n\n* Flaw in Netty\u0027s SniHandler while navigating TLS handshake; DoS (CVE-2023-34462)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:5165",
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.streams\u0026version=2.5.0",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.streams\u0026version=2.5.0"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_amq_streams/2.5",
"url": "https://access.redhat.com/documentation/en-us/red_hat_amq_streams/2.5"
},
{
"category": "external",
"summary": "2004133",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004133"
},
{
"category": "external",
"summary": "2004135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004135"
},
{
"category": "external",
"summary": "2087186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087186"
},
{
"category": "external",
"summary": "2129809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129809"
},
{
"category": "external",
"summary": "2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "2215229",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215229"
},
{
"category": "external",
"summary": "2215393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215393"
},
{
"category": "external",
"summary": "2215394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215394"
},
{
"category": "external",
"summary": "2215445",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215445"
},
{
"category": "external",
"summary": "2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "2216888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216888"
},
{
"category": "external",
"summary": "2229295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229295"
},
{
"category": "external",
"summary": "2236340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236340"
},
{
"category": "external",
"summary": "2236341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236341"
},
{
"category": "external",
"summary": "ENTMQST-5081",
"url": "https://issues.redhat.com/browse/ENTMQST-5081"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5165.json"
}
],
"title": "Red Hat Security Advisory: Red Hat AMQ Streams 2.5.0 release and security update",
"tracking": {
"current_release_date": "2025-11-21T18:45:04+00:00",
"generator": {
"date": "2025-11-21T18:45:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:5165",
"initial_release_date": "2023-09-14T09:51:43+00:00",
"revision_history": [
{
"date": "2023-09-14T09:51:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-09-14T09:51:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:45:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat AMQ Streams 2.5.0",
"product": {
"name": "Red Hat AMQ Streams 2.5.0",
"product_id": "Red Hat AMQ Streams 2.5.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:amq_streams:2"
}
}
}
],
"category": "product_family",
"name": "Streams for Apache Kafka"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-37136",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2004133"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty\u0027s netty-codec due to size restrictions for decompressed data in the Bzip2Decoder. By sending a specially-crafted input, a remote attacker could cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty-codec: Bzip2Decoder doesn\u0027t allow setting size restrictions for decompressed data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack ship the vulnerable version of netty-codec package. Since the release of OCP 4.6, the Metering product has been deprecated [1], so the affected components are marked as wontfix. This may be fixed in the future.\n\nStarting in OCP 4.7, the elasticsearch component is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37136"
},
{
"category": "external",
"summary": "RHBZ#2004133",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004133"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37136"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37136",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37136"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv",
"url": "https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv"
}
],
"release_date": "2021-09-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty-codec: Bzip2Decoder doesn\u0027t allow setting size restrictions for decompressed data"
},
{
"cve": "CVE-2021-37137",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2004135"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Netty\u0027s netty-codec due to unrestricted chunk lengths in the SnappyFrameDecoder. By sending a specially-crafted input, a remote attacker could cause excessive memory usage resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty-codec: SnappyFrameDecoder doesn\u0027t restrict chunk length and may buffer skippable chunks in an unnecessary way",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of netty-codec package.\nSince the release of OCP 4.6, the Metering product has been deprecated [1], hence the affected components are marked as wontfix.\nThis may be fixed in the future.\n\nStarting in OCP 4.7, the elasticsearch component is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37137"
},
{
"category": "external",
"summary": "RHBZ#2004135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37137",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37137"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37137",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37137"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv",
"url": "https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv"
}
],
"release_date": "2021-09-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty-codec: SnappyFrameDecoder doesn\u0027t restrict chunk length and may buffer skippable chunks in an unnecessary way"
},
{
"cve": "CVE-2022-1471",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-12-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2150009"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SnakeYaml package. This flaw allows an attacker to benefit from remote code execution by sending malicious YAML content and this content being deserialized by the constructor. Deserialization is unsafe and leads to Remote Code Execution (RCE).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "SnakeYaml: Constructor Deserialization Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "In the Red Hat Process Automation 7 (RHPAM) the untrusted, malicious YAML file for deserialization by the vulnerable Snakeyaml\u0027s SafeConstructor class must be provided intentionally by the RHPAM user which requires high privileges. The potential attack complexity is also high because it depends on conditions that are beyond the attacker\u0027s control. Due to that the impact for RHPAM is reduced to Low.\n\nRed Hat Fuse 7 does not expose by default any endpoint that passes incoming data/request into vulnerable Snakeyaml\u0027s Constructor class nor pass untrusted data to this class. When this class is used, it\u2019s still only used to parse internal configuration, hence the impact by this vulnerability to Red Hat Fuse 7 is reduced to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1471"
},
{
"category": "external",
"summary": "RHBZ#2150009",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1471"
},
{
"category": "external",
"summary": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2",
"url": "https://github.com/google/security-research/security/advisories/GHSA-mjmj-j48q-9wg2"
}
],
"release_date": "2022-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "SnakeYaml: Constructor Deserialization Remote Code Execution"
},
{
"cve": "CVE-2022-24823",
"cwe": {
"id": "CWE-379",
"name": "Creation of Temporary File in Directory with Insecure Permissions"
},
"discovery_date": "2022-05-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2087186"
}
],
"notes": [
{
"category": "description",
"text": "CVE-2021-21290 contains an incomplete fix, and this addresses the issue found in netty. When using multipart decoders in netty, local information disclosure can occur via the local system temporary directory if temporary storing of uploads on the disk is enabled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: world readable temporary file containing sensitive data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users.\n\nRed Hat Satellite 6 is not affected as is using netty 3.6.7 version which is not impacted by this vulnerability.\n\nRed Hat Fuse 7 is now in Maintenance Support Phase and should be fixed soon. However, Red Hat Fuse Online (Syndesis) does will not contain the fix for this flaw.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-24823"
},
{
"category": "external",
"summary": "RHBZ#2087186",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087186"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-24823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24823"
}
],
"release_date": "2022-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
},
{
"category": "workaround",
"details": "As a workaround, specify one\u0027s own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty: world readable temporary file containing sensitive data"
},
{
"cve": "CVE-2022-36944",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2022-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2129809"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Scala\u0027s LazyList that permits code execution during deserialization. This issue could allow an attacker to craft a LazyList containing a malicious Function0 call to execute arbitrary code on a server that deserializes untrusted data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "scala: deserialization gadget chain",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-36944"
},
{
"category": "external",
"summary": "RHBZ#2129809",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2129809"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-36944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36944"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-36944",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36944"
},
{
"category": "external",
"summary": "https://github.com/scala/scala/pull/10118",
"url": "https://github.com/scala/scala/pull/10118"
}
],
"release_date": "2022-09-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
},
{
"category": "workaround",
"details": "Users of Scala\u0027s LazyList should never permit deserialization of untrusted data.",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "scala: deserialization gadget chain"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-2976",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"discovery_date": "2023-06-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215229"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Guava. The methodology for temporary directories and files can allow other local users or apps with accordant permissions to access the temp files, possibly leading to information exposure or tampering in the files created in the directory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "guava: insecure temporary directory creation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Single Sign-On 7 ships the affected component as a layered product of Red Hat JBoss Enterprise Application 7, and as such is affected by this flaw. However, Single Sign-On 7 does not use the affected code and is not vulnerable to exploit.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-2976"
},
{
"category": "external",
"summary": "RHBZ#2215229",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215229"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2976",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2976"
}
],
"release_date": "2023-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
},
{
"category": "workaround",
"details": "Temp files should be created with sufficiently non-predictable names and in a secure-permissioned, dedicated temp folder.",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "guava: insecure temporary directory creation"
},
{
"cve": "CVE-2023-3635",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"discovery_date": "2023-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2229295"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in SquareUp Okio. A class GzipSource does not handle an exception that might be raised when parsing a malformed gzip buffer. This issue may allow a malicious user to start processing a malformed file, which can result in a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "okio: GzipSource class improper exception handling",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss Enterprise Application Platform XP does contain Okio package but is not using GzipSource.java, which is the affected class.\nRed Hat support for Spring Boot is considered low impact as it\u0027s used by Dekorate during compilation process and not included in the resulting Jar.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3635"
},
{
"category": "external",
"summary": "RHBZ#2229295",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229295"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3635",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3635"
}
],
"release_date": "2023-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "okio: GzipSource class improper exception handling"
},
{
"cve": "CVE-2023-26048",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-08-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236340"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the jetty-server package. A servlet with multipart support could get an OutOfMemorryError when the client sends a part that has a name but no filename and substantial content. This flaw allows a malicious user to jeopardize the environment by leaving the JVM in an unreliable state.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26048"
},
{
"category": "external",
"summary": "RHBZ#2236340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26048",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26048"
},
{
"category": "external",
"summary": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-qw69-rqj8-6qw8",
"url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-qw69-rqj8-6qw8"
}
],
"release_date": "2023-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter()"
},
{
"cve": "CVE-2023-26049",
"cwe": {
"id": "CWE-1286",
"name": "Improper Validation of Syntactic Correctness of Input"
},
"discovery_date": "2023-08-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236341"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the jetty-server package. Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies or otherwise perform unintended behavior by tampering with the cookie parsing mechanism.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26049"
},
{
"category": "external",
"summary": "RHBZ#2236341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236341"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26049",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26049"
},
{
"category": "external",
"summary": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-p26g-97m4-6q7c",
"url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-p26g-97m4-6q7c"
}
],
"release_date": "2023-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies"
},
{
"cve": "CVE-2023-33201",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-06-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215465"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Bouncy Castle 1.73. This issue targets the fix of LDAP wild cards. Before the fix there was no validation for the X.500 name of any certificate, subject, or issuer, so the presence of a wild card may lead to information disclosure. This could allow a malicious user to obtain unauthorized information via blind LDAP Injection, exploring the environment and enumerating data. The exploit depends on the structure of the target LDAP directory as well as what kind of errors are exposed to the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-33201"
},
{
"category": "external",
"summary": "RHBZ#2215465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215465"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-33201"
},
{
"category": "external",
"summary": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201",
"url": "https://github.com/bcgit/bc-java/wiki/CVE-2023-33201"
}
],
"release_date": "2023-06-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bouncycastle: potential blind LDAP injection attack using a self-signed certificate"
},
{
"cve": "CVE-2023-34453",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2023-06-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215393"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Snappy-java\u0027s shuffle function, which does not check input sizes before beginning operations. This issue could allow an attacker to send malicious input to trigger an overflow error that crashes the program, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snappy-java: Integer overflow in shuffle leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-34453"
},
{
"category": "external",
"summary": "RHBZ#2215393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-34453",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34453"
}
],
"release_date": "2023-06-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snappy-java: Integer overflow in shuffle leads to DoS"
},
{
"cve": "CVE-2023-34454",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2023-06-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215394"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Snappy-java\u0027s shuffle function, which does not check input sizes before beginning operations. This issue could allow an attacker to send malicious input to trigger an overflow error that crashes the program, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snappy-java: Integer overflow in compress leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-34454"
},
{
"category": "external",
"summary": "RHBZ#2215394",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215394"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-34454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-34454",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34454"
}
],
"release_date": "2023-06-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snappy-java: Integer overflow in compress leads to DoS"
},
{
"cve": "CVE-2023-34455",
"cwe": {
"id": "CWE-1285",
"name": "Improper Validation of Specified Index, Position, or Offset in Input"
},
"discovery_date": "2023-06-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215445"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Snappy-java\u0027s fileSnappyInputStream hasNextChunk function, which does not sufficiently evaluate input bytes before beginning operations. This issue could allow an attacker to send malicious input to trigger an out of memory error that crashes the program, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "snappy-java: Unchecked chunk length leads to DoS",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-34455"
},
{
"category": "external",
"summary": "RHBZ#2215445",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215445"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-34455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-34455",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34455"
}
],
"release_date": "2023-06-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "snappy-java: Unchecked chunk length leads to DoS"
},
{
"cve": "CVE-2023-34462",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-06-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216888"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty\u0027s SniHandler while navigating TLS handshake which may permit a large heap allocation if the handler did not have a timeout configured. This issue may allow an attacker to send a client hello packet which would cause the server to buffer large amounts of data per connection, potentially causing an out of memory error, resulting in Denial of Service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: SniHandler 16MB allocation leads to OOM",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat AMQ Streams 2.5.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-34462"
},
{
"category": "external",
"summary": "RHBZ#2216888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216888"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-34462",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34462"
}
],
"release_date": "2023-06-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-14T09:51:43+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
},
{
"category": "workaround",
"details": "Configuration of SniHandler with an idle timeout will mitigate this issue.",
"product_ids": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat AMQ Streams 2.5.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty: SniHandler 16MB allocation leads to OOM"
}
]
}
RHSA-2023:3185
Vulnerability from csaf_redhat - Published: 2023-05-17 13:58 - Updated: 2025-11-21 18:40Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat AMQ Broker 7.10.3 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms.\n\nThis release of Red Hat AMQ Broker 7.10.3 includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* keycloak: path traversal via double URL encoding (CVE-2022-3782)\n\n* springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern (CVE-2023-20860)\n\n* springframework: DoS via data binding to multipartFile or servlet part (CVE-2022-22970)\n\n* springframework: DoS with STOMP over WebSocket (CVE-2022-22971)\n\n* springframework: Spring Expression DoS Vulnerability (CVE-2023-20861)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:3185",
"url": "https://access.redhat.com/errata/RHSA-2023:3185"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.10.3",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.10.3"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_amq_broker/7.10",
"url": "https://access.redhat.com/documentation/en-us/red_hat_amq_broker/7.10"
},
{
"category": "external",
"summary": "2087272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087272"
},
{
"category": "external",
"summary": "2087274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087274"
},
{
"category": "external",
"summary": "2138971",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138971"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "2180528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180528"
},
{
"category": "external",
"summary": "2180530",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180530"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3185.json"
}
],
"title": "Red Hat Security Advisory: Red Hat AMQ Broker 7.10.3 release and security update",
"tracking": {
"current_release_date": "2025-11-21T18:40:43+00:00",
"generator": {
"date": "2025-11-21T18:40:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:3185",
"initial_release_date": "2023-05-17T13:58:49+00:00",
"revision_history": [
{
"date": "2023-05-17T13:58:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-17T13:58:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:40:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "AMQ Broker 7.10.3",
"product": {
"name": "AMQ Broker 7.10.3",
"product_id": "AMQ Broker 7.10.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:amq_broker:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss AMQ"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3782",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2022-10-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2138971"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "keycloak: path traversal via double URL encoding",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not impacted as this CVE affects the server-side Keycloak execution but Quarkus only acts as a Keycloak client in its quarkus-keycloak-authorization extension. For this reason Quarkus is marked with Low impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AMQ Broker 7.10.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3782"
},
{
"category": "external",
"summary": "RHBZ#2138971",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138971"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3782"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-17T13:58:49+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"AMQ Broker 7.10.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3185"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AMQ Broker 7.10.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "keycloak: path traversal via double URL encoding"
},
{
"cve": "CVE-2022-22970",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2087272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Spring Framework. Applications that handle file uploads are vulnerable to a denial of service (DoS) attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "springframework: DoS via data binding to multipartFile or servlet part",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AMQ Broker 7.10.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22970"
},
{
"category": "external",
"summary": "RHBZ#2087272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22970",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22970"
},
{
"category": "external",
"summary": "https://tanzu.vmware.com/security/cve-2022-22970",
"url": "https://tanzu.vmware.com/security/cve-2022-22970"
}
],
"release_date": "2022-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-17T13:58:49+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"AMQ Broker 7.10.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3185"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AMQ Broker 7.10.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "springframework: DoS via data binding to multipartFile or servlet part"
},
{
"cve": "CVE-2022-22971",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2087274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Spring Framework Applications. Applications that use STOMP over the WebSocket endpoint are vulnerable to a denial of service attack caused by an authenticated user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "springframework: DoS with STOMP over WebSocket",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AMQ Broker 7.10.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22971"
},
{
"category": "external",
"summary": "RHBZ#2087274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22971"
},
{
"category": "external",
"summary": "https://tanzu.vmware.com/security/cve-2022-22971",
"url": "https://tanzu.vmware.com/security/cve-2022-22971"
}
],
"release_date": "2022-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-17T13:58:49+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"AMQ Broker 7.10.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3185"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AMQ Broker 7.10.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "springframework: DoS with STOMP over WebSocket"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AMQ Broker 7.10.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-17T13:58:49+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"AMQ Broker 7.10.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3185"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AMQ Broker 7.10.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-20860",
"cwe": {
"id": "CWE-155",
"name": "Improper Neutralization of Wildcards or Matching Symbols"
},
"discovery_date": "2023-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2180528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Spring Framework. In this vulnerability, a security bypass is possible due to the behavior of the wildcard pattern.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AMQ Broker 7.10.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-20860"
},
{
"category": "external",
"summary": "RHBZ#2180528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-20860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20860"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-20860",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20860"
},
{
"category": "external",
"summary": "https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861",
"url": "https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861"
}
],
"release_date": "2023-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-17T13:58:49+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"AMQ Broker 7.10.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3185"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AMQ Broker 7.10.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern"
},
{
"cve": "CVE-2023-20861",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2180530"
}
],
"notes": [
{
"category": "description",
"text": "A flaw found was found in Spring Framework. This flaw allows a malicious user to use a specially crafted SpEL expression that causes a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "springframework: Spring Expression DoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AMQ Broker 7.10.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-20861"
},
{
"category": "external",
"summary": "RHBZ#2180530",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180530"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-20861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20861"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-20861",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20861"
},
{
"category": "external",
"summary": "https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861",
"url": "https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861"
}
],
"release_date": "2023-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-17T13:58:49+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"AMQ Broker 7.10.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3185"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AMQ Broker 7.10.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "springframework: Spring Expression DoS Vulnerability"
}
]
}
RHSA-2023_3185
Vulnerability from csaf_redhat - Published: 2023-05-17 13:58 - Updated: 2024-12-16 22:26Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat AMQ Broker 7.10.3 is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms.\n\nThis release of Red Hat AMQ Broker 7.10.3 includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.\n\nSecurity Fix(es):\n\n* keycloak: path traversal via double URL encoding (CVE-2022-3782)\n\n* springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern (CVE-2023-20860)\n\n* springframework: DoS via data binding to multipartFile or servlet part (CVE-2022-22970)\n\n* springframework: DoS with STOMP over WebSocket (CVE-2022-22971)\n\n* springframework: Spring Expression DoS Vulnerability (CVE-2023-20861)\n\n* RESTEasy: creation of insecure temp files (CVE-2023-0482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:3185",
"url": "https://access.redhat.com/errata/RHSA-2023:3185"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.10.3",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.amq.broker\u0026version=7.10.3"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_amq_broker/7.10",
"url": "https://access.redhat.com/documentation/en-us/red_hat_amq_broker/7.10"
},
{
"category": "external",
"summary": "2087272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087272"
},
{
"category": "external",
"summary": "2087274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087274"
},
{
"category": "external",
"summary": "2138971",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138971"
},
{
"category": "external",
"summary": "2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "2180528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180528"
},
{
"category": "external",
"summary": "2180530",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180530"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3185.json"
}
],
"title": "Red Hat Security Advisory: Red Hat AMQ Broker 7.10.3 release and security update",
"tracking": {
"current_release_date": "2024-12-16T22:26:31+00:00",
"generator": {
"date": "2024-12-16T22:26:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:3185",
"initial_release_date": "2023-05-17T13:58:49+00:00",
"revision_history": [
{
"date": "2023-05-17T13:58:49+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-17T13:58:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-16T22:26:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "AMQ Broker 7.10.3",
"product": {
"name": "AMQ Broker 7.10.3",
"product_id": "AMQ Broker 7.10.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:amq_broker:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss AMQ"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3782",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2022-10-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2138971"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Keycloak, where it does not properly validate URLs included in a redirect. An attacker can use this flaw to construct a malicious request to bypass validation and access other URLs and potentially sensitive information within the domain or possibly conduct further attacks. This flaw affects any client that utilizes a wildcard in the Valid Redirect URIs field.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "keycloak: path traversal via double URL encoding",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Build of Quarkus is not impacted as this CVE affects the server-side Keycloak execution but Quarkus only acts as a Keycloak client in its quarkus-keycloak-authorization extension. For this reason Quarkus is marked with Low impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AMQ Broker 7.10.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3782"
},
{
"category": "external",
"summary": "RHBZ#2138971",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138971"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3782"
}
],
"release_date": "2022-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-17T13:58:49+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"AMQ Broker 7.10.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3185"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AMQ Broker 7.10.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "keycloak: path traversal via double URL encoding"
},
{
"cve": "CVE-2022-22970",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2087272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Spring Framework. Applications that handle file uploads are vulnerable to a denial of service (DoS) attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "springframework: DoS via data binding to multipartFile or servlet part",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AMQ Broker 7.10.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22970"
},
{
"category": "external",
"summary": "RHBZ#2087272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22970",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22970"
},
{
"category": "external",
"summary": "https://tanzu.vmware.com/security/cve-2022-22970",
"url": "https://tanzu.vmware.com/security/cve-2022-22970"
}
],
"release_date": "2022-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-17T13:58:49+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"AMQ Broker 7.10.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3185"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AMQ Broker 7.10.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "springframework: DoS via data binding to multipartFile or servlet part"
},
{
"cve": "CVE-2022-22971",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-05-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2087274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Spring Framework Applications. Applications that use STOMP over the WebSocket endpoint are vulnerable to a denial of service attack caused by an authenticated user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "springframework: DoS with STOMP over WebSocket",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AMQ Broker 7.10.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22971"
},
{
"category": "external",
"summary": "RHBZ#2087274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22971"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22971",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22971"
},
{
"category": "external",
"summary": "https://tanzu.vmware.com/security/cve-2022-22971",
"url": "https://tanzu.vmware.com/security/cve-2022-22971"
}
],
"release_date": "2022-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-17T13:58:49+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"AMQ Broker 7.10.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3185"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AMQ Broker 7.10.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "springframework: DoS with STOMP over WebSocket"
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "Creation of Temporary File With Insecure Permissions"
},
"discovery_date": "2023-01-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2166004"
}
],
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "RESTEasy: creation of insecure temp files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AMQ Broker 7.10.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0482"
},
{
"category": "external",
"summary": "RHBZ#2166004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
}
],
"release_date": "2023-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-17T13:58:49+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"AMQ Broker 7.10.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3185"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AMQ Broker 7.10.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "RESTEasy: creation of insecure temp files"
},
{
"cve": "CVE-2023-20860",
"cwe": {
"id": "CWE-155",
"name": "Improper Neutralization of Wildcards or Matching Symbols"
},
"discovery_date": "2023-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2180528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Spring Framework. In this vulnerability, a security bypass is possible due to the behavior of the wildcard pattern.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AMQ Broker 7.10.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-20860"
},
{
"category": "external",
"summary": "RHBZ#2180528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-20860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20860"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-20860",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20860"
},
{
"category": "external",
"summary": "https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861",
"url": "https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861"
}
],
"release_date": "2023-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-17T13:58:49+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"AMQ Broker 7.10.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3185"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AMQ Broker 7.10.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern"
},
{
"cve": "CVE-2023-20861",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-03-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2180530"
}
],
"notes": [
{
"category": "description",
"text": "A flaw found was found in Spring Framework. This flaw allows a malicious user to use a specially crafted SpEL expression that causes a denial of service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "springframework: Spring Expression DoS Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AMQ Broker 7.10.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-20861"
},
{
"category": "external",
"summary": "RHBZ#2180530",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180530"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-20861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20861"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-20861",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20861"
},
{
"category": "external",
"summary": "https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861",
"url": "https://spring.io/blog/2023/03/20/spring-framework-6-0-7-and-5-3-26-fix-cve-2023-20860-and-cve-2023-20861"
}
],
"release_date": "2023-03-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-17T13:58:49+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings.\n\nThe References section of this erratum contains a download link (you must log in to download the update).",
"product_ids": [
"AMQ Broker 7.10.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3185"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AMQ Broker 7.10.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "springframework: Spring Expression DoS Vulnerability"
}
]
}
FKIE_CVE-2023-0482
Vulnerability from fkie_nvd - Published: 2023-02-17 22:15 - Updated: 2025-03-18 16:155.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
| Vendor | Product | Version | |
|---|---|---|---|
| redhat | resteasy | 3.15.4 | |
| redhat | resteasy | 4.7.7 | |
| redhat | resteasy | 5.0.5 | |
| redhat | resteasy | 6.2.2 | |
| netapp | active_iq_unified_manager | - | |
| netapp | active_iq_unified_manager | - | |
| netapp | active_iq_unified_manager | - | |
| netapp | oncommand_workflow_automation | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:resteasy:3.15.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7EC7F357-F788-45EA-9EC8-1827E0C3C3F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:resteasy:4.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "A1127722-44D1-4E06-BDD8-979BFD6E3301",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:resteasy:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0E3A6FBC-A883-42F6-84D3-FCBC7A5DC5B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:resteasy:6.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E7E6BA5D-DE79-45FE-B033-7E9CB458CE3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*",
"matchCriteriaId": "F3E0B672-3E06-4422-B2A4-0BD073AEC2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*",
"matchCriteriaId": "E8F29E19-3A64-4426-A2AA-F169440267CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user."
}
],
"id": "CVE-2023-0482",
"lastModified": "2025-03-18T16:15:15.277",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-02-17T22:15:11.957",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20230427-0001/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20230427-0001/"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-378"
}
],
"source": "secalert@redhat.com",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-378"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-2C6G-PFX3-W7H8
Vulnerability from github – Published: 2025-01-15 18:56 – Updated: 2025-01-15 18:56Impact
In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.
Patches
Fixed in the following pull requests:
- https://github.com/resteasy/resteasy/pull/3409 (7.0.0.Alpha1)
- https://github.com/resteasy/resteasy/pull/3423 (6.2.3.Final)
- https://github.com/resteasy/resteasy/pull/3412 (5.0.6.Final)
- https://github.com/resteasy/resteasy/pull/3413 (4.7.8.Final)
- https://github.com/resteasy/resteasy/pull/3410 (3.15.5.Final)
Workarounds
There is no workaround for this issue.
References
- https://nvd.nist.gov/vuln/detail/CVE-2023-0482
- https://bugzilla.redhat.com/show_bug.cgi?id=2166004
- https://github.com/advisories/GHSA-jrmh-v64j-mjm9
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.jboss.resteasy:resteasy-core"
},
"ranges": [
{
"events": [
{
"introduced": "6.0.0.Beta1"
},
{
"fixed": "6.2.3.Final"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.jboss.resteasy:resteasy-core"
},
"ranges": [
{
"events": [
{
"introduced": "5.0.0.Alpha1"
},
{
"fixed": "5.0.6.Final"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.jboss.resteasy:resteasy-core"
},
"ranges": [
{
"events": [
{
"introduced": "4.0.0.Beta1"
},
{
"fixed": "4.7.8.Final"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.jboss.resteasy:resteasy-multipart-provider"
},
"ranges": [
{
"events": [
{
"introduced": "6.0.0.Beta1"
},
{
"fixed": "6.2.3.Final"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.jboss.resteasy:resteasy-multipart-provider"
},
"ranges": [
{
"events": [
{
"introduced": "5.0.0.Alpha1"
},
{
"fixed": "5.0.6.Final"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.jboss.resteasy:resteasy-multipart-provider"
},
"ranges": [
{
"events": [
{
"introduced": "4.0.0.Beta1"
},
{
"fixed": "4.7.8.Final"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"database_specific": {
"last_known_affected_version_range": "\u003c 3.15.4.Final"
},
"package": {
"ecosystem": "Maven",
"name": "org.jboss.resteasy:resteasy-multipart-provider"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.15.5.Final"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"database_specific": {
"last_known_affected_version_range": "\u003c 3.15.4.Final"
},
"package": {
"ecosystem": "Maven",
"name": "org.jboss.resteasy:resteasy-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.15.5.Final"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2023-0482"
],
"database_specific": {
"cwe_ids": [
"CWE-378"
],
"github_reviewed": true,
"github_reviewed_at": "2025-01-15T18:56:57Z",
"nvd_published_at": null,
"severity": "MODERATE"
},
"details": "### Impact\nIn RESTEasy the insecure `File.createTempFile()` is used in the `DataSourceProvider`, `FileProvider` and `Mime4JWorkaround` classes which creates temp files with insecure permissions that could be read by a local user.\n\n### Patches\nFixed in the following pull requests:\n\n* https://github.com/resteasy/resteasy/pull/3409 (7.0.0.Alpha1)\n* https://github.com/resteasy/resteasy/pull/3423 (6.2.3.Final)\n* https://github.com/resteasy/resteasy/pull/3412 (5.0.6.Final)\n* https://github.com/resteasy/resteasy/pull/3413 (4.7.8.Final)\n* https://github.com/resteasy/resteasy/pull/3410 (3.15.5.Final)\n\n### Workarounds\nThere is no workaround for this issue.\n\n### References\n* https://nvd.nist.gov/vuln/detail/CVE-2023-0482\n* https://bugzilla.redhat.com/show_bug.cgi?id=2166004\n* https://github.com/advisories/GHSA-jrmh-v64j-mjm9\n",
"id": "GHSA-2c6g-pfx3-w7h8",
"modified": "2025-01-15T18:56:57Z",
"published": "2025-01-15T18:56:57Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/resteasy/resteasy/security/advisories/GHSA-2c6g-pfx3-w7h8"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
},
{
"type": "WEB",
"url": "https://github.com/resteasy/resteasy/pull/3409"
},
{
"type": "WEB",
"url": "https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56"
},
{
"type": "WEB",
"url": "https://github.com/resteasy/resteasy/pull/3410"
},
{
"type": "WEB",
"url": "https://github.com/resteasy/resteasy/pull/3412"
},
{
"type": "WEB",
"url": "https://github.com/resteasy/resteasy/pull/3413"
},
{
"type": "WEB",
"url": "https://github.com/resteasy/resteasy/pull/3423"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166004"
},
{
"type": "WEB",
"url": "https://github.com/orgs/resteasy/discussions/3415"
},
{
"type": "WEB",
"url": "https://github.com/orgs/resteasy/discussions/3504"
},
{
"type": "WEB",
"url": "https://github.com/orgs/resteasy/discussions/3506"
},
{
"type": "PACKAGE",
"url": "https://github.com/resteasy/resteasy"
},
{
"type": "WEB",
"url": "https://issues.redhat.com/browse/RESTEASY-3286"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20230427-0001"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "Insecure Temporary File in RESTEasy"
}
GHSA-JRMH-V64J-MJM9
Vulnerability from github – Published: 2023-02-18 00:31 – Updated: 2025-01-15 18:56Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-2c6g-pfx3-w7h8. This link is maintained to preserve external references.
Original Description
In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.jboss.resteasy:resteasy-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.7.8.Final"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.jboss.resteasy:resteasy-core"
},
"ranges": [
{
"events": [
{
"introduced": "5.0.0.Alpha1"
},
{
"fixed": "5.0.6.Final"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.jboss.resteasy:resteasy-core"
},
"ranges": [
{
"events": [
{
"introduced": "6.0.0.Beta1"
},
{
"fixed": "6.2.3.Final"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.jboss.resteasy:resteasy-multipart-provider"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.7.8.Final"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.jboss.resteasy:resteasy-multipart-provider"
},
"ranges": [
{
"events": [
{
"introduced": "5.0.0.Alpha1"
},
{
"fixed": "5.0.6.Final"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.jboss.resteasy:resteasy-multipart-provider"
},
"ranges": [
{
"events": [
{
"introduced": "6.0.0.Beta1"
},
{
"fixed": "6.2.3.Final"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-378"
],
"github_reviewed": true,
"github_reviewed_at": "2023-02-18T02:18:19Z",
"nvd_published_at": "2023-02-17T22:15:00Z",
"severity": "MODERATE"
},
"details": "# Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-2c6g-pfx3-w7h8. This link is maintained to preserve external references.\n\n# Original Description\nIn RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"id": "GHSA-jrmh-v64j-mjm9",
"modified": "2025-01-15T18:56:33Z",
"published": "2023-02-18T00:31:59Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0482"
},
{
"type": "WEB",
"url": "https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56"
},
{
"type": "WEB",
"url": "https://github.com/orgs/resteasy/discussions/3415"
},
{
"type": "WEB",
"url": "https://github.com/orgs/resteasy/discussions/3504"
},
{
"type": "WEB",
"url": "https://github.com/orgs/resteasy/discussions/3506"
},
{
"type": "PACKAGE",
"url": "https://github.com/resteasy/Resteasy"
},
{
"type": "WEB",
"url": "https://issues.redhat.com/browse/RESTEASY-3286"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20230427-0001"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "Duplicate Advisory: Insecure Temporary File in RESTEasy",
"withdrawn": "2025-01-15T18:56:33Z"
}
CERTFR-2023-AVI-0791
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar | IBM SOAR QRadar Plugin App versions antérieures à 5.0.3 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 12.0.x antérieures à 12.0.1 | ||
| IBM | Sterling | IBM Sterling Global Mailbox versions 6.x antérieures à 6.1.2.3 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x et 11.2.x antérieures à 11.2.4 Fix Pack 2 | ||
| IBM | Spectrum | IBM Spectrum Copy Data Management versions 2.2.x antérieures à 2.2.21.0 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.0.3",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Global Mailbox versions 6.x ant\u00e9rieures \u00e0 6.1.2.3",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.1.x et 11.2.x ant\u00e9rieures \u00e0 11.2.4 Fix Pack 2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Copy Data Management versions 2.2.x ant\u00e9rieures \u00e0 2.2.21.0",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-25577",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25577"
},
{
"name": "CVE-2023-23934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23934"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2022-46364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46364"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2019-14806",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14806"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2023-30601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30601"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0791",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-09-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7040672 du 27 septembre 2023",
"url": "https://www.ibm.com/support/pages/node/7040672"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7029380 du 15 septembre 2023",
"url": "https://www.ibm.com/support/pages/node/7029380"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7039222 du 26 septembre 2023",
"url": "https://www.ibm.com/support/pages/node/7039222"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7040744 du 27 septembre 2023",
"url": "https://www.ibm.com/support/pages/node/7040744"
}
]
}
CERTFR-2023-AVI-0791
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar | IBM SOAR QRadar Plugin App versions antérieures à 5.0.3 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 12.0.x antérieures à 12.0.1 | ||
| IBM | Sterling | IBM Sterling Global Mailbox versions 6.x antérieures à 6.1.2.3 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x et 11.2.x antérieures à 11.2.4 Fix Pack 2 | ||
| IBM | Spectrum | IBM Spectrum Copy Data Management versions 2.2.x antérieures à 2.2.21.0 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.0.3",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Global Mailbox versions 6.x ant\u00e9rieures \u00e0 6.1.2.3",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.1.x et 11.2.x ant\u00e9rieures \u00e0 11.2.4 Fix Pack 2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Copy Data Management versions 2.2.x ant\u00e9rieures \u00e0 2.2.21.0",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-25577",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25577"
},
{
"name": "CVE-2023-23934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23934"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2022-46364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46364"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-45787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45787"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-0482",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0482"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2019-14806",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14806"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2023-30601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30601"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0791",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-09-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7040672 du 27 septembre 2023",
"url": "https://www.ibm.com/support/pages/node/7040672"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7029380 du 15 septembre 2023",
"url": "https://www.ibm.com/support/pages/node/7029380"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7039222 du 26 septembre 2023",
"url": "https://www.ibm.com/support/pages/node/7039222"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7040744 du 27 septembre 2023",
"url": "https://www.ibm.com/support/pages/node/7040744"
}
]
}
WID-SEC-W-2024-1769
Vulnerability from csaf_certbund - Published: 2024-08-05 22:00 - Updated: 2024-08-05 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Hitachi Ops Center ist eine Softwarel\u00f6sung f\u00fcr Rechenzentren zur Verwaltung, Optimierung, Orchestrierung und zum Schutz von Daten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Hitachi Ops Center ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1769 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1769.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1769 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1769"
},
{
"category": "external",
"summary": "Hitachi Software Vulnerability Information vom 2024-08-05",
"url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-136/index.html"
}
],
"source_lang": "en-US",
"title": "Hitachi Ops Center: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff",
"tracking": {
"current_release_date": "2024-08-05T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T18:11:59.017+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2024-1769",
"initial_release_date": "2024-08-05T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-08-05T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Analyzer \u003c11.0.1-00",
"product": {
"name": "Hitachi Ops Center Analyzer \u003c11.0.1-00",
"product_id": "T036614"
}
},
{
"category": "product_version_range",
"name": "Viewpoint \u003c11.0.2-00",
"product": {
"name": "Hitachi Ops Center Viewpoint \u003c11.0.2-00",
"product_id": "T036615"
}
}
],
"category": "product_name",
"name": "Ops Center"
}
],
"category": "vendor",
"name": "Hitachi"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-0482",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Hitachi Ops Center, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen."
}
],
"release_date": "2024-08-05T22:00:00.000+00:00",
"title": "CVE-2023-0482"
},
{
"cve": "CVE-2023-24815",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Hitachi Ops Center, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen."
}
],
"release_date": "2024-08-05T22:00:00.000+00:00",
"title": "CVE-2023-24815"
},
{
"cve": "CVE-2023-2974",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Hitachi Ops Center, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen."
}
],
"release_date": "2024-08-05T22:00:00.000+00:00",
"title": "CVE-2023-2974"
},
{
"cve": "CVE-2023-32081",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Hitachi Ops Center, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen."
}
],
"release_date": "2024-08-05T22:00:00.000+00:00",
"title": "CVE-2023-32081"
},
{
"cve": "CVE-2023-33546",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Hitachi Ops Center, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen."
}
],
"release_date": "2024-08-05T22:00:00.000+00:00",
"title": "CVE-2023-33546"
},
{
"cve": "CVE-2023-4853",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in Hitachi Ops Center, die zum aktuellen Zeitpunkt nicht im Detail beschrieben und ver\u00f6ffentlicht wurden. Ein Angreifer kann diese Schwachstellen ausnutzen, um nicht n\u00e4her spezifizierte Auswirkungen zu verursachen."
}
],
"release_date": "2024-08-05T22:00:00.000+00:00",
"title": "CVE-2023-4853"
}
]
}
WID-SEC-W-2023-1193
Vulnerability from csaf_certbund - Published: 2023-05-10 22:00 - Updated: 2024-03-17 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Single Sign-On ist ein eigenst\u00e4ndiger Server, basierend auf dem Keycloak Projekt.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat Single Sign On ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren, Informationen offenzulegen oder Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1193 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1193.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1193 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1193"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2705 vom 2023-05-10",
"url": "https://access.redhat.com/errata/RHSA-2023:2705"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2706 vom 2023-05-10",
"url": "https://access.redhat.com/errata/RHSA-2023:2706"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2707 vom 2023-05-10",
"url": "https://access.redhat.com/errata/RHSA-2023:2707"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2710 vom 2023-05-10",
"url": "https://access.redhat.com/errata/RHSA-2023:2710"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2713 vom 2023-05-10",
"url": "https://access.redhat.com/errata/RHSA-2023:2713"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:3223 vom 2023-05-18",
"url": "https://access.redhat.com/errata/RHSA-2023:3223"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:3815 vom 2023-06-27",
"url": "https://access.redhat.com/errata/RHSA-2023:3815"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:3813 vom 2023-06-27",
"url": "https://access.redhat.com/errata/RHSA-2023:3813"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:3809 vom 2023-06-29",
"url": "https://access.redhat.com/errata/RHSA-2023:3809"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4983 vom 2023-09-05",
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5165 vom 2023-09-14",
"url": "https://access.redhat.com/errata/RHSA-2023:5165"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2023-143 vom 2023-10-03",
"url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-143/index.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1353 vom 2024-03-18",
"url": "https://access.redhat.com/errata/RHSA-2024:1353"
}
],
"source_lang": "en-US",
"title": "Red Hat Single Sign On: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-03-17T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:50:43.713+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1193",
"initial_release_date": "2023-05-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-05-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-05-18T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-06-27T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-06-29T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-09-05T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-09-14T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-10-03T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von HITACHI aufgenommen"
},
{
"date": "2024-03-17T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c Common Services 10.9.3-00",
"product": {
"name": "Hitachi Ops Center \u003c Common Services 10.9.3-00",
"product_id": "T030195"
}
}
],
"category": "product_name",
"name": "Ops Center"
}
],
"category": "vendor",
"name": "Hitachi"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "Quarkus",
"product": {
"name": "Red Hat Enterprise Linux Quarkus",
"product_id": "T028364",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:quarkus"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Streams \u003c 2.4.0",
"product": {
"name": "Red Hat JBoss A-MQ Streams \u003c 2.4.0",
"product_id": "T027764"
}
}
],
"category": "product_name",
"name": "JBoss A-MQ"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c 7.6.3",
"product": {
"name": "Red Hat Single Sign On \u003c 7.6.3",
"product_id": "T027699"
}
}
],
"category": "product_name",
"name": "Single Sign On"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-0482",
"notes": [
{
"category": "description",
"text": "In Red Hat Single Sign On existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T028364",
"67646",
"T027764",
"T030195"
]
},
"release_date": "2023-05-10T22:00:00.000+00:00",
"title": "CVE-2023-0482"
},
{
"cve": "CVE-2022-45787",
"notes": [
{
"category": "description",
"text": "In Red Hat Single Sign On existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T028364",
"67646",
"T027764",
"T030195"
]
},
"release_date": "2023-05-10T22:00:00.000+00:00",
"title": "CVE-2022-45787"
},
{
"cve": "CVE-2022-4492",
"notes": [
{
"category": "description",
"text": "In Red Hat Single Sign On existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T028364",
"67646",
"T027764",
"T030195"
]
},
"release_date": "2023-05-10T22:00:00.000+00:00",
"title": "CVE-2022-4492"
},
{
"cve": "CVE-2022-41881",
"notes": [
{
"category": "description",
"text": "In Red Hat Single Sign On existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T028364",
"67646",
"T027764",
"T030195"
]
},
"release_date": "2023-05-10T22:00:00.000+00:00",
"title": "CVE-2022-41881"
},
{
"cve": "CVE-2022-41854",
"notes": [
{
"category": "description",
"text": "In Red Hat Single Sign On existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T028364",
"67646",
"T027764",
"T030195"
]
},
"release_date": "2023-05-10T22:00:00.000+00:00",
"title": "CVE-2022-41854"
},
{
"cve": "CVE-2022-38752",
"notes": [
{
"category": "description",
"text": "In Red Hat Single Sign On existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T028364",
"67646",
"T027764",
"T030195"
]
},
"release_date": "2023-05-10T22:00:00.000+00:00",
"title": "CVE-2022-38752"
},
{
"cve": "CVE-2021-0341",
"notes": [
{
"category": "description",
"text": "In Red Hat Single Sign On existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T028364",
"67646",
"T027764",
"T030195"
]
},
"release_date": "2023-05-10T22:00:00.000+00:00",
"title": "CVE-2021-0341"
}
]
}
WID-SEC-W-2023-0919
Vulnerability from csaf_certbund - Published: 2023-04-11 22:00 - Updated: 2023-05-09 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM WebSphere Application Server ist ein J2EE-Applikationsserver.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in IBM WebSphere Application Server Liberty ausnutzen, um seine Privilegien zu erh\u00f6hen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Windows\n- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0919 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0919.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0919 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0919"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6989199 vom 2023-05-09",
"url": "https://www.ibm.com/support/pages/node/6989199"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6983490 vom 2023-04-13",
"url": "https://www.ibm.com/support/pages/node/6983490"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2023-04-11",
"url": "https://www.ibm.com/support/pages/node/6982895"
}
],
"source_lang": "en-US",
"title": "IBM WebSphere Application Server Liberty: Schwachstelle erm\u00f6glicht Privilegieneskalation",
"tracking": {
"current_release_date": "2023-05-09T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:48:29.494+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0919",
"initial_release_date": "2023-04-11T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-04-11T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-04-13T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-05-09T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM Business Automation Workflow 21.0.2",
"product": {
"name": "IBM Business Automation Workflow 21.0.2",
"product_id": "1055431",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:21.0.2"
}
}
},
{
"category": "product_name",
"name": "IBM Business Automation Workflow 21.0.3",
"product": {
"name": "IBM Business Automation Workflow 21.0.3",
"product_id": "1150328",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:21.0.3"
}
}
},
{
"category": "product_name",
"name": "IBM Business Automation Workflow 22.0.1",
"product": {
"name": "IBM Business Automation Workflow 22.0.1",
"product_id": "1268578",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:22.0.1"
}
}
},
{
"category": "product_name",
"name": "IBM Business Automation Workflow 18.0.0.0",
"product": {
"name": "IBM Business Automation Workflow 18.0.0.0",
"product_id": "389078",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:18.0.0.0"
}
}
},
{
"category": "product_name",
"name": "IBM Business Automation Workflow 18.0.0.1",
"product": {
"name": "IBM Business Automation Workflow 18.0.0.1",
"product_id": "389079",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:18.0.0.1"
}
}
},
{
"category": "product_name",
"name": "IBM Business Automation Workflow 18.0.0.2",
"product": {
"name": "IBM Business Automation Workflow 18.0.0.2",
"product_id": "428468",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:18.0.0.2"
}
}
},
{
"category": "product_name",
"name": "IBM Business Automation Workflow 19.0.0.1",
"product": {
"name": "IBM Business Automation Workflow 19.0.0.1",
"product_id": "433292",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:19.0.0.1"
}
}
},
{
"category": "product_name",
"name": "IBM Business Automation Workflow 19.0.0.2",
"product": {
"name": "IBM Business Automation Workflow 19.0.0.2",
"product_id": "672243",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:19.0.0.2"
}
}
},
{
"category": "product_name",
"name": "IBM Business Automation Workflow 19.0.0.3",
"product": {
"name": "IBM Business Automation Workflow 19.0.0.3",
"product_id": "672244",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:19.0.0.3"
}
}
},
{
"category": "product_name",
"name": "IBM Business Automation Workflow 20.0.0.1",
"product": {
"name": "IBM Business Automation Workflow 20.0.0.1",
"product_id": "867559",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:20.0.0.1"
}
}
},
{
"category": "product_name",
"name": "IBM Business Automation Workflow 20.0.0.2",
"product": {
"name": "IBM Business Automation Workflow 20.0.0.2",
"product_id": "867560",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:20.0.0.2"
}
}
}
],
"category": "product_name",
"name": "Business Automation Workflow"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM TXSeries for Multiplatforms 9.1",
"product": {
"name": "IBM TXSeries for Multiplatforms 9.1",
"product_id": "T015903",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:txseries:for_multiplatforms_9.1"
}
}
},
{
"category": "product_name",
"name": "IBM TXSeries for Multiplatforms 8.2",
"product": {
"name": "IBM TXSeries for Multiplatforms 8.2",
"product_id": "T015904",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:txseries:for_multiplatforms_8.2"
}
}
},
{
"category": "product_name",
"name": "IBM TXSeries for Multiplatforms 8.1",
"product": {
"name": "IBM TXSeries for Multiplatforms 8.1",
"product_id": "T015905",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:txseries:for_multiplatforms_8.1"
}
}
}
],
"category": "product_name",
"name": "TXSeries"
},
{
"category": "product_name",
"name": "IBM WebSphere Application Server Liberty 23.0.0.3",
"product": {
"name": "IBM WebSphere Application Server Liberty 23.0.0.3",
"product_id": "T027199",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:websphere_application_server:liberty_23.0.0.3"
}
}
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-0482",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in IBM WebSphere Application Server Liberty. Der Fehler besteht in \"RESTEasy\" aufgrund der Erstellung von unsicheren tempor\u00e4ren Dateien in der Funktion \"File.createTempFile()\", die in den Klassen \"DataSourceProvider\", \"FileProvider\" und \"Mime4JWorkaround\" verwendet wird. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, indem er eine speziell gestaltete Anfrage sendet, um seine Privilegien zu erweitern."
}
],
"product_status": {
"known_affected": [
"T015905",
"T015904",
"867559",
"T015903",
"672243",
"672244",
"1268578",
"389079",
"428468",
"389078",
"1150328",
"1055431",
"867560",
"433292",
"T027199"
]
},
"release_date": "2023-04-11T22:00:00.000+00:00",
"title": "CVE-2023-0482"
}
]
}
GSD-2023-0482
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-0482",
"id": "GSD-2023-0482",
"references": [
"https://www.suse.com/security/cve/CVE-2023-0482.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-0482"
],
"details": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"id": "GSD-2023-0482",
"modified": "2023-12-13T01:20:22.675002Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2023-0482",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "RESTEasy",
"version": {
"version_data": [
{
"version_value": "Fixed in RESTEasy 4.7.8.Final"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-378"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56",
"refsource": "MISC",
"url": "https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56"
},
{
"name": "https://security.netapp.com/advisory/ntap-20230427-0001/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20230427-0001/"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "(,6.2.2.Final]",
"affected_versions": "All versions up to 6.2.2.final",
"cwe_ids": [
"CWE-1035",
"CWE-937"
],
"date": "2023-02-18",
"description": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"fixed_versions": [],
"identifier": "CVE-2023-0482",
"identifiers": [
"GHSA-jrmh-v64j-mjm9",
"CVE-2023-0482"
],
"not_impacted": "",
"package_slug": "maven/org.jboss.resteasy/resteasy-undertow",
"pubdate": "2023-02-18",
"solution": "Unfortunately, there is no solution available yet.",
"title": "Insecure Temporary File in RESTEasy",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2023-0482",
"https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56",
"https://issues.redhat.com/browse/RESTEASY-3286",
"https://github.com/advisories/GHSA-jrmh-v64j-mjm9"
],
"uuid": "a1adc7a8-ec10-4e1b-b814-0ecd51eaf43e"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.7.8",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2023-0482"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56",
"refsource": "MISC",
"tags": [
"Patch"
],
"url": "https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56"
},
{
"name": "https://security.netapp.com/advisory/ntap-20230427-0001/",
"refsource": "CONFIRM",
"tags": [],
"url": "https://security.netapp.com/advisory/ntap-20230427-0001/"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-04-27T15:15Z",
"publishedDate": "2023-02-17T22:15Z"
}
}
}
TSSA-2025-00001
Vulnerability from csaf_trustsource - Published: 2025-10-06 11:54 - Updated: 2025-10-06 11:54Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"notes": [
{
"category": "summary",
"text": "Detailed list of project vulnerabilities",
"title": "Author comment"
}
],
"publisher": {
"category": "vendor",
"name": "TrustSource Product and Service Security",
"namespace": "https://app.trustsource.io/"
},
"title": "Project CSAF document",
"tracking": {
"current_release_date": "2025-10-06T11:54:52.856Z",
"generator": {
"date": "2025-10-06T11:54:52.856Z",
"engine": {
"name": "TrustSource-CSAF",
"version": "1.0.0"
}
},
"id": "tssa-2025-00001",
"initial_release_date": "2025-10-06T11:54:52.856Z",
"revision_history": [
{
"date": "2025-10-06T11:54:52.856Z",
"number": "1",
"summary": "Initial version."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "0.4.0",
"product": {
"name": "ecs-java-client",
"product_id": "U2FsdGVkX1/PvkRLmbU707SrI0ySwi7noULP/t0B93/l"
}
}
],
"category": "product_name",
"name": "JavaTools"
}
],
"category": "vendor",
"name": "EACG Operations Solutions GmbH"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-25761",
"cwe": {
"id": "CWE-79",
"name": "CWE-79"
},
"notes": [
{
"category": "description",
"text": "Jenkins JUnit Plugin 1166.va_436e268e972 and earlier does not escape test case class names in JavaScript expressions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control test case class names in the JUnit resources processed by the plugin.",
"title": "CVE description"
}
],
"product_status": {
"under_investigation": [
"U2FsdGVkX1/PvkRLmbU707SrI0ySwi7noULP/t0B93/l"
]
},
"references": [
{
"category": "external",
"summary": "Mailing List - Third Party Advisory",
"url": "http://www.openwall.com/lists/oss-security/2023/02/15/4"
},
{
"category": "external",
"summary": "Vendor Advisory",
"url": "https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3032"
},
{
"category": "external",
"summary": "Mailing List - Third Party Advisory",
"url": "http://www.openwall.com/lists/oss-security/2023/02/15/4"
},
{
"category": "external",
"summary": "Vendor Advisory",
"url": "https://www.jenkins.io/security/advisory/2023-02-15/#SECURITY-3032"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"U2FsdGVkX1/PvkRLmbU707SrI0ySwi7noULP/t0B93/l"
]
}
]
},
{
"cve": "CVE-2022-45380",
"cwe": {
"id": "CWE-79",
"name": "CWE-79"
},
"notes": [
{
"category": "description",
"text": "Jenkins JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.",
"title": "CVE description"
}
],
"product_status": {
"under_investigation": [
"U2FsdGVkX1/PvkRLmbU707SrI0ySwi7noULP/t0B93/l"
]
},
"references": [
{
"category": "external",
"summary": "Mailing List",
"url": "http://www.openwall.com/lists/oss-security/2022/11/15/4"
},
{
"category": "external",
"summary": "Vendor Advisory",
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2888"
},
{
"category": "external",
"summary": "Mailing List",
"url": "http://www.openwall.com/lists/oss-security/2022/11/15/4"
},
{
"category": "external",
"summary": "Vendor Advisory",
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2888"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"U2FsdGVkX1/PvkRLmbU707SrI0ySwi7noULP/t0B93/l"
]
}
]
},
{
"cve": "CVE-2023-0482",
"cwe": {
"id": "CWE-378",
"name": "CWE-378"
},
"notes": [
{
"category": "description",
"text": "In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.",
"title": "CVE description"
}
],
"product_status": {
"under_investigation": [
"U2FsdGVkX1/PvkRLmbU707SrI0ySwi7noULP/t0B93/l"
]
},
"references": [
{
"category": "external",
"summary": "Patch",
"url": "https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56"
},
{
"category": "external",
"summary": "Third Party Advisory",
"url": "https://security.netapp.com/advisory/ntap-20230427-0001/"
},
{
"category": "external",
"summary": "Patch",
"url": "https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56"
},
{
"category": "external",
"summary": "Third Party Advisory",
"url": "https://security.netapp.com/advisory/ntap-20230427-0001/"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"U2FsdGVkX1/PvkRLmbU707SrI0ySwi7noULP/t0B93/l"
]
}
]
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.