Action not permitted
Modal body text goes here.
cve-2021-40690
Vulnerability from cvelistv5
Published
2021-09-19 00:00
Modified
2024-08-04 02:51
Severity ?
EPSS score ?
Summary
Bypass of the secureValidation property
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache Santuario |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:51:06.487Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" }, { "name": "[tomee-commits] 20210922 [tomee] 02/02: Update xmlsec to 2.2.3 to mitigate CVE-2021-40690", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f%40%3Ccommits.tomee.apache.org%3E" }, { "name": "[tomee-commits] 20210923 [jira] [Resolved] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8%40%3Ccommits.tomee.apache.org%3E" }, { "name": "[tomee-commits] 20210923 [jira] [Created] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28%40%3Ccommits.tomee.apache.org%3E" }, { "name": "[tomee-commits] 20210923 [jira] [Assigned] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4%40%3Ccommits.tomee.apache.org%3E" }, { "name": "[tomee-commits] 20210923 [jira] [Updated] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa%40%3Ccommits.tomee.apache.org%3E" }, { "name": "[poi-user] 20210923 Re: CVE-2021-40690 on xmlsec jar", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8%40%3Cuser.poi.apache.org%3E" }, { "name": "[debian-lts-announce] 20210927 [SECURITY] [DLA 2767-1] libxml-security-java security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html" }, { "name": "[cxf-issues] 20211027 [jira] [Created] (CXF-8613) High Security issues reported with Apache Santuario library bundled in CXF 3.4.4", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59%40%3Cissues.cxf.apache.org%3E" }, { "name": "[tomee-commits] 20211028 [jira] [Updated] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c%40%3Ccommits.tomee.apache.org%3E" }, { "name": "DSA-5010", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-5010" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230818-0002/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Santuario", "vendor": "Apache Software Foundation", "versions": [ { "lessThan": "2.2.3,2.1.7", "status": "affected", "version": "XML Security for Java", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "An Trinh, Calif." } ], "descriptions": [ { "lang": "en", "value": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-18T13:06:19.359156", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" }, { "name": "[tomee-commits] 20210922 [tomee] 02/02: Update xmlsec to 2.2.3 to mitigate CVE-2021-40690", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f%40%3Ccommits.tomee.apache.org%3E" }, { "name": "[tomee-commits] 20210923 [jira] [Resolved] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8%40%3Ccommits.tomee.apache.org%3E" }, { "name": "[tomee-commits] 20210923 [jira] [Created] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28%40%3Ccommits.tomee.apache.org%3E" }, { "name": "[tomee-commits] 20210923 [jira] [Assigned] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4%40%3Ccommits.tomee.apache.org%3E" }, { "name": "[tomee-commits] 20210923 [jira] [Updated] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa%40%3Ccommits.tomee.apache.org%3E" }, { "name": "[poi-user] 20210923 Re: CVE-2021-40690 on xmlsec jar", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8%40%3Cuser.poi.apache.org%3E" }, { "name": "[debian-lts-announce] 20210927 [SECURITY] [DLA 2767-1] libxml-security-java security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html" }, { "name": "[cxf-issues] 20211027 [jira] [Created] (CXF-8613) High Security issues reported with Apache Santuario library bundled in CXF 3.4.4", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59%40%3Cissues.cxf.apache.org%3E" }, { "name": "[tomee-commits] 20211028 [jira] [Updated] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "tags": [ "mailing-list" ], "url": "https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c%40%3Ccommits.tomee.apache.org%3E" }, { "name": "DSA-5010", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2021/dsa-5010" }, { "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "url": "https://security.netapp.com/advisory/ntap-20230818-0002/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Bypass of the secureValidation property", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2021-40690", "datePublished": "2021-09-19T00:00:00", "dateReserved": "2021-09-08T00:00:00", "dateUpdated": "2024-08-04T02:51:06.487Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-40690\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2021-09-19T18:15:07.223\",\"lastModified\":\"2023-11-07T03:38:37.593\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \\\"secureValidation\\\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.\"},{\"lang\":\"es\",\"value\":\"Todas las versiones de Apache Santuario - XML Security for Java anteriores a 2.2.3 y 2.1.7 son vulnerables a un problema donde la propiedad \\\"secureValidation\\\" no es pasada correctamente cuando es creado un KeyInfo a partir de un elemento KeyInfoReference. Esto permite a un atacante abusar de una transformaci\u00f3n XPath para extraer cualquier archivo local .xml en un elemento RetrievalMethod\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.1.7\",\"matchCriteriaId\":\"AB706AA4-B7E9-4319-A2C0-65B7186507DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.2.0\",\"versionEndExcluding\":\"2.2.3\",\"matchCriteriaId\":\"20BABD5C-5813-48B8-BAC9-0F36F381F12A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:cxf:3.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B927066-A747-4AC3-9E90-BCDB2E0175E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:tomee:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.0.8\",\"matchCriteriaId\":\"CD205DB8-3CCE-47AE-AD88-A557D31E4B23\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C650FEDB-E903-4C2D-AD40-282AB5F2E3C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A3622F5-5976-4BBC-A147-FC8A6431EA79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:commerce_platform:11.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CDE72F7-ED9D-4A53-BF63-DF6711FFDEF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndIncluding\":\"8.1.0\",\"matchCriteriaId\":\"B5B4A191-44AE-4C35-9164-19237D2CF013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.2.0\",\"versionEndIncluding\":\"8.2.3\",\"matchCriteriaId\":\"A543B4F8-149A-48AB-B388-AB7FA2ECAC18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1214FDF-357A-4BB9-BADE-50FB2BD16D10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B74B912-152D-4F38-9FC1-741D6D0B27FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3198F822-43F8-4CB3-97F7-C2982FDA5CBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8AF00C6-B97F-414D-A8DF-057E6BFD8597\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_bulk_data_integration:16.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3486C85C-57BC-433F-941C-E81539DA5C1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_financial_integration:14.1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"798E4FEE-9B2B-436E-A2B3-B8AA1079892A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_financial_integration:15.0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB86F6C3-981E-4ECA-A5EB-9A9CD73D70C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_financial_integration:16.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B042849-7EF5-4A5F-B6CD-712C0B8735BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_financial_integration:19.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7435071D-0C95-4686-A978-AFC4C9A0D0FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_integration_bus:14.1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CFCE558-9972-46A2-8539-C16044F1BAA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_integration_bus:15.0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1194C4E-CF42-4B4D-BA9A-40FDD28F1D58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_integration_bus:16.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"822A3C37-86F2-4E91-BE91-2A859F983941\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_integration_bus:19.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD311C33-A309-44D5-BBFB-539D72C7F8C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_merchandising_system:16.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8383028-B719-41FD-9B6A-71F8EB4C5F8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_merchandising_system:19.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE1BC44A-F0AF-41CD-9CEB-B07AB5ADAB38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_service_backbone:14.1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E702EBED-DB39-4084-84B1-258BC5FE7545\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_service_backbone:15.0.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F7956BF-D5B6-484B-999C-36B45CD8B75B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_service_backbone:16.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEE71EA5-B315-4F1E-BFEE-EC426B562F7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:retail_service_backbone:19.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DA6B655-A445-42E5-B6D9-70AB1C04774A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04BCDC24-4A21-473C-8733-0D9CFB38A752\"}]}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa%40%3Ccommits.tomee.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59%40%3Cissues.cxf.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E\",\"source\":\"security@apache.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28%40%3Ccommits.tomee.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4%40%3Ccommits.tomee.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8%40%3Cuser.poi.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c%40%3Ccommits.tomee.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f%40%3Ccommits.tomee.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8%40%3Ccommits.tomee.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html\",\"source\":\"security@apache.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20230818-0002/\",\"source\":\"security@apache.org\"},{\"url\":\"https://www.debian.org/security/2021/dsa-5010\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuapr2022.html\",\"source\":\"security@apache.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"security@apache.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}" } }
rhsa-2021_4679
Vulnerability from csaf_redhat
Published
2021-11-15 17:05
Modified
2024-11-06 00:10
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.2 security update
Notes
Topic
A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.
This release of Red Hat JBoss Enterprise Application Platform 7.4.2 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.1, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.2 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)
* wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users (CVE-2021-3717)
* mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server (CVE-2021-30129)
* jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)
* resteasy: Error message exposes endpoint class information (CVE-2021-20289)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis release of Red Hat JBoss Enterprise Application Platform 7.4.2 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.1, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.2 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)\n\n* wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users (CVE-2021-3717)\n\n* mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server (CVE-2021-30129)\n\n* jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)\n\n* resteasy: Error message exposes endpoint class information (CVE-2021-20289)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4679", "url": "https://access.redhat.com/errata/RHSA-2021:4679" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=appplatform\u0026version=7.4", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=appplatform\u0026version=7.4" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/" }, { "category": "external", "summary": "1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "1981527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981527" }, { "category": "external", "summary": "1991305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991305" }, { "category": "external", "summary": "1995259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259" }, { "category": "external", "summary": "JBEAP-21308", "url": "https://issues.redhat.com/browse/JBEAP-21308" }, { "category": "external", "summary": "JBEAP-22208", "url": "https://issues.redhat.com/browse/JBEAP-22208" }, { "category": "external", "summary": "JBEAP-22213", "url": "https://issues.redhat.com/browse/JBEAP-22213" }, { "category": "external", "summary": "JBEAP-22254", "url": "https://issues.redhat.com/browse/JBEAP-22254" }, { "category": "external", "summary": "JBEAP-22255", "url": "https://issues.redhat.com/browse/JBEAP-22255" }, { "category": "external", "summary": "JBEAP-22344", "url": "https://issues.redhat.com/browse/JBEAP-22344" }, { "category": "external", "summary": "JBEAP-22347", "url": "https://issues.redhat.com/browse/JBEAP-22347" }, { "category": "external", "summary": "JBEAP-22365", "url": "https://issues.redhat.com/browse/JBEAP-22365" }, { "category": "external", "summary": "JBEAP-22367", "url": "https://issues.redhat.com/browse/JBEAP-22367" }, { "category": "external", "summary": "JBEAP-22435", "url": "https://issues.redhat.com/browse/JBEAP-22435" }, { "category": "external", "summary": "JBEAP-22462", "url": "https://issues.redhat.com/browse/JBEAP-22462" }, { "category": "external", "summary": "JBEAP-22487", "url": "https://issues.redhat.com/browse/JBEAP-22487" }, { "category": "external", "summary": "JBEAP-22493", "url": "https://issues.redhat.com/browse/JBEAP-22493" }, { "category": "external", "summary": "JBEAP-22494", "url": "https://issues.redhat.com/browse/JBEAP-22494" }, { "category": "external", "summary": "JBEAP-22500", "url": "https://issues.redhat.com/browse/JBEAP-22500" }, { "category": "external", "summary": "JBEAP-22504", "url": "https://issues.redhat.com/browse/JBEAP-22504" }, { "category": "external", "summary": "JBEAP-22515", "url": "https://issues.redhat.com/browse/JBEAP-22515" }, { "category": "external", "summary": "JBEAP-22517", "url": "https://issues.redhat.com/browse/JBEAP-22517" }, { "category": "external", "summary": "JBEAP-22522", "url": "https://issues.redhat.com/browse/JBEAP-22522" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4679.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.2 security update", "tracking": { "current_release_date": "2024-11-06T00:10:24+00:00", "generator": { "date": "2024-11-06T00:10:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:4679", "initial_release_date": "2021-11-15T17:05:54+00:00", "revision_history": [ { "date": "2021-11-15T17:05:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-15T17:05:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:10:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "EAP 7.4.2 release", "product": { "name": "EAP 7.4.2 release", "product_id": "EAP 7.4.2 release", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3629", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1977362" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "EAP 7.4.2 release" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3629" }, { "category": "external", "summary": "RHBZ#1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3629", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-15T17:05:54+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "EAP 7.4.2 release" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4679" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "EAP 7.4.2 release" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS" }, { "cve": "CVE-2021-3717", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "discovery_date": "2021-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1991305" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly. An incorrect JBOSS_LOCAL_USER challenge location when using the elytron configuration may lead to JBOSS_LOCAL_USER access to all users on the machine. The highest threat from this vulnerability is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "EAP 7.4.2 release" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3717" }, { "category": "external", "summary": "RHBZ#1991305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3717" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-15T17:05:54+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "EAP 7.4.2 release" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4679" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "EAP 7.4.2 release" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users" }, { "acknowledgments": [ { "names": [ "Dirk Papenberg" ], "organization": "NTT DATA Germany" } ], "cve": "CVE-2021-20289", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2021-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1935927" } ], "notes": [ { "category": "description", "text": "A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method\u0027s parameter value. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "resteasy: Error message exposes endpoint class information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "EAP 7.4.2 release" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20289" }, { "category": "external", "summary": "RHBZ#1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20289", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20289" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289" } ], "release_date": "2021-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-15T17:05:54+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "EAP 7.4.2 release" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4679" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "EAP 7.4.2 release" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "resteasy: Error message exposes endpoint class information" }, { "cve": "CVE-2021-30129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981527" } ], "notes": [ { "category": "description", "text": "A vulnerability in sshd-core of Apache Mina SSHD allows an attacker to overflow the server causing an OutOfMemory error. This issue affects the SFTP and port forwarding features of Apache Mina SSHD version 2.0.0 and later versions. It was addressed in Apache Mina SSHD 2.7.0", "title": "Vulnerability description" }, { "category": "summary", "text": "mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "EAP 7.4.2 release" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30129" }, { "category": "external", "summary": "RHBZ#1981527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981527" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30129", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30129" } ], "release_date": "2021-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-15T17:05:54+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "EAP 7.4.2 release" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4679" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "EAP 7.4.2 release" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server" }, { "cve": "CVE-2021-37714", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995259" } ], "notes": [ { "category": "description", "text": "jsoup is a Java library for working with HTML. Those using jsoup versions prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. The issue is patched in version 1.14.2. There are a few available workarounds. Users may rate limit input parsing, limit the size of inputs based on system resources, and/or implement thread watchdogs to cap and timeout parse runtimes.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "EAP 7.4.2 release" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37714" }, { "category": "external", "summary": "RHBZ#1995259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37714", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37714" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714" }, { "category": "external", "summary": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c", "url": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-15T17:05:54+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "EAP 7.4.2 release" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4679" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "EAP 7.4.2 release" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck" }, { "cve": "CVE-2021-40690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011190" } ], "notes": [ { "category": "description", "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: XPath Transform abuse allows for information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Since OpenShift Container Platform (OCP) 4.7, the logging-elasticsearch6-container is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "EAP 7.4.2 release" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-40690" }, { "category": "external", "summary": "RHBZ#2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" } ], "release_date": "2021-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-15T17:05:54+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "EAP 7.4.2 release" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4679" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "EAP 7.4.2 release" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: XPath Transform abuse allows for information disclosure" } ] }
rhsa-2022_0151
Vulnerability from csaf_redhat
Published
2022-01-17 21:33
Modified
2024-11-06 00:19
Summary
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 security update on RHEL 7
Notes
Topic
New Red Hat Single Sign-On 7.5.1 packages are now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Single Sign-On 7.5 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.
This release of Red Hat Single Sign-On 7.5.1 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.5.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* Keycloak: Incorrect authorization allows unpriviledged users to create other users (CVE-2021-4133)
* keycloak-server-spi-private: ECP SAML binding bypasses authentication flows (CVE-2021-3827)
* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)
* resteasy: Error message exposes endpoint class information (CVE-2021-20289)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New Red Hat Single Sign-On 7.5.1 packages are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.5 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.5.1 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.5.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* Keycloak: Incorrect authorization allows unpriviledged users to create other users (CVE-2021-4133)\n\n* keycloak-server-spi-private: ECP SAML binding bypasses authentication flows (CVE-2021-3827)\n\n* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)\n\n* resteasy: Error message exposes endpoint class information (CVE-2021-20289)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0151", "url": "https://access.redhat.com/errata/RHSA-2022:0151" }, { "category": "external", "summary": "2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "2033602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033602" }, { "category": "external", "summary": "CIAM-1616", "url": "https://issues.redhat.com/browse/CIAM-1616" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.5/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.5/" }, { "category": "external", "summary": "2007512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007512" }, { "category": "external", "summary": "1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0151.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 security update on RHEL 7", "tracking": { "current_release_date": "2024-11-06T00:19:44+00:00", "generator": { "date": "2024-11-06T00:19:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0151", "initial_release_date": "2022-01-17T21:33:04+00:00", "revision_history": [ { "date": "2022-01-17T21:33:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-01-17T21:33:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:19:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.5 for RHEL 7 Server", "product": { "name": "Red Hat Single Sign-On 7.5 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.5::el7" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src", "product": { "name": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src", "product_id": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak@15.0.4-1.redhat_00001.1.el7sso?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "product": { "name": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "product_id": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak@15.0.4-1.redhat_00001.1.el7sso?arch=noarch" } } }, { "category": "product_version", "name": "rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "product": { "name": "rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "product_id": "rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak-server@15.0.4-1.redhat_00001.1.el7sso?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.5 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch" }, "product_reference": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "relates_to_product_reference": "7Server-RHSSO-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src as a component of Red Hat Single Sign-On 7.5 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src" }, "product_reference": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src", "relates_to_product_reference": "7Server-RHSSO-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch as a component of Red Hat Single Sign-On 7.5 for RHEL 7 Server", "product_id": "7Server-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch" }, "product_reference": "rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "relates_to_product_reference": "7Server-RHSSO-7.5" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Aaron Sachau" ], "organization": "SRAM" } ], "cve": "CVE-2021-3827", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2007512" } ], "notes": [ { "category": "description", "text": "A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user\u0027s credentials. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak-server-spi-private: ECP SAML binding bypasses authentication flows", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3827" }, { "category": "external", "summary": "RHBZ#2007512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3827", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3827" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3827", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3827" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v" } ], "release_date": "2021-09-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T21:33:04+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0151" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak-server-spi-private: ECP SAML binding bypasses authentication flows" }, { "acknowledgments": [ { "names": [ "Grzegorz Soba\u0144ski" ], "organization": "MLabs" } ], "cve": "CVE-2021-4133", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-12-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2033602" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak version from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled.", "title": "Vulnerability description" }, { "category": "summary", "text": "Keycloak: Incorrect authorization allows unpriviledged users to create other users", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects only Red Hat Single Sign-on 7.5.0. Red Hat Single Sign-on 7.4.x releases are NOT affected. Fix is available for download from customer portal which can be applied on RH-SSO 7.5.0", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4133" }, { "category": "external", "summary": "RHBZ#2033602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4133", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4133" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4133", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4133" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/issues/9247", "url": "https://github.com/keycloak/keycloak/issues/9247" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487" } ], "release_date": "2021-12-16T17:05:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T21:33:04+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0151" }, { "category": "workaround", "details": "Access to the user-creation functionality in the REST endpoint can be deactivated using CLI commands in undertow.\nrun:\n\nbin/jboss-cli.sh --connect\n/subsystem=undertow/configuration=filter/expression-filter=keycloakPathOverrideUsersCreateEndpoint:add( \\\n expression=\"(regex(\u0027^/auth/admin/realms/(.*)/users$\u0027) and method(POST))-\u003e response-code(400)\" \\\n)\n/subsystem=undertow/server=default-server/host=default-host/filter-ref=keycloakPathOverrideUsersCreateEndpoint:add()", "product_ids": [ "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Keycloak: Incorrect authorization allows unpriviledged users to create other users" }, { "acknowledgments": [ { "names": [ "Dirk Papenberg" ], "organization": "NTT DATA Germany" } ], "cve": "CVE-2021-20289", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2021-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1935927" } ], "notes": [ { "category": "description", "text": "A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method\u0027s parameter value. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "resteasy: Error message exposes endpoint class information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20289" }, { "category": "external", "summary": "RHBZ#1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20289", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20289" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289" } ], "release_date": "2021-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T21:33:04+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0151" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "resteasy: Error message exposes endpoint class information" }, { "cve": "CVE-2021-40690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011190" } ], "notes": [ { "category": "description", "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: XPath Transform abuse allows for information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Since OpenShift Container Platform (OCP) 4.7, the logging-elasticsearch6-container is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-40690" }, { "category": "external", "summary": "RHBZ#2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" } ], "release_date": "2021-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T21:33:04+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0151" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.noarch", "7Server-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el7sso.src", "7Server-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el7sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: XPath Transform abuse allows for information disclosure" } ] }
rhsa-2022_0152
Vulnerability from csaf_redhat
Published
2022-01-17 21:33
Modified
2024-11-06 00:19
Summary
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 security update on RHEL 8
Notes
Topic
New Red Hat Single Sign-On 7.5.1 packages are now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Single Sign-On 7.5 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.
This release of Red Hat Single Sign-On 7.5.1 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.5.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* Keycloak: Incorrect authorization allows unpriviledged users to create other users (CVE-2021-4133)
* keycloak-server-spi-private: ECP SAML binding bypasses authentication flows (CVE-2021-3827)
* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)
* resteasy: Error message exposes endpoint class information (CVE-2021-20289)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "New Red Hat Single Sign-On 7.5.1 packages are now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.5 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.5.1 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.5.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* Keycloak: Incorrect authorization allows unpriviledged users to create other users (CVE-2021-4133)\n\n* keycloak-server-spi-private: ECP SAML binding bypasses authentication flows (CVE-2021-3827)\n\n* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)\n\n* resteasy: Error message exposes endpoint class information (CVE-2021-20289)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0152", "url": "https://access.redhat.com/errata/RHSA-2022:0152" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.5/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.5/" }, { "category": "external", "summary": "1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "2007512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007512" }, { "category": "external", "summary": "2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "2033602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033602" }, { "category": "external", "summary": "CIAM-1615", "url": "https://issues.redhat.com/browse/CIAM-1615" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0152.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 security update on RHEL 8", "tracking": { "current_release_date": "2024-11-06T00:19:37+00:00", "generator": { "date": "2024-11-06T00:19:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0152", "initial_release_date": "2022-01-17T21:33:24+00:00", "revision_history": [ { "date": "2022-01-17T21:33:24+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-01-17T21:33:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:19:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.5 for RHEL 8", "product": { "name": "Red Hat Single Sign-On 7.5 for RHEL 8", "product_id": "8Base-RHSSO-7.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.5::el8" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src", "product": { "name": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src", "product_id": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak@15.0.4-1.redhat_00001.1.el8sso?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "product": { "name": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "product_id": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak@15.0.4-1.redhat_00001.1.el8sso?arch=noarch" } } }, { "category": "product_version", "name": "rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "product": { "name": "rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "product_id": "rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-sso7-keycloak-server@15.0.4-1.redhat_00001.1.el8sso?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch as a component of Red Hat Single Sign-On 7.5 for RHEL 8", "product_id": "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch" }, "product_reference": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "relates_to_product_reference": "8Base-RHSSO-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src as a component of Red Hat Single Sign-On 7.5 for RHEL 8", "product_id": "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src" }, "product_reference": "rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src", "relates_to_product_reference": "8Base-RHSSO-7.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch as a component of Red Hat Single Sign-On 7.5 for RHEL 8", "product_id": "8Base-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch" }, "product_reference": "rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "relates_to_product_reference": "8Base-RHSSO-7.5" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Aaron Sachau" ], "organization": "SRAM" } ], "cve": "CVE-2021-3827", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2007512" } ], "notes": [ { "category": "description", "text": "A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user\u0027s credentials. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak-server-spi-private: ECP SAML binding bypasses authentication flows", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3827" }, { "category": "external", "summary": "RHBZ#2007512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3827", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3827" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3827", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3827" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v" } ], "release_date": "2021-09-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T21:33:24+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0152" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak-server-spi-private: ECP SAML binding bypasses authentication flows" }, { "acknowledgments": [ { "names": [ "Grzegorz Soba\u0144ski" ], "organization": "MLabs" } ], "cve": "CVE-2021-4133", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-12-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2033602" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak version from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled.", "title": "Vulnerability description" }, { "category": "summary", "text": "Keycloak: Incorrect authorization allows unpriviledged users to create other users", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects only Red Hat Single Sign-on 7.5.0. Red Hat Single Sign-on 7.4.x releases are NOT affected. Fix is available for download from customer portal which can be applied on RH-SSO 7.5.0", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4133" }, { "category": "external", "summary": "RHBZ#2033602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4133", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4133" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4133", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4133" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/issues/9247", "url": "https://github.com/keycloak/keycloak/issues/9247" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487" } ], "release_date": "2021-12-16T17:05:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T21:33:24+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0152" }, { "category": "workaround", "details": "Access to the user-creation functionality in the REST endpoint can be deactivated using CLI commands in undertow.\nrun:\n\nbin/jboss-cli.sh --connect\n/subsystem=undertow/configuration=filter/expression-filter=keycloakPathOverrideUsersCreateEndpoint:add( \\\n expression=\"(regex(\u0027^/auth/admin/realms/(.*)/users$\u0027) and method(POST))-\u003e response-code(400)\" \\\n)\n/subsystem=undertow/server=default-server/host=default-host/filter-ref=keycloakPathOverrideUsersCreateEndpoint:add()", "product_ids": [ "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Keycloak: Incorrect authorization allows unpriviledged users to create other users" }, { "acknowledgments": [ { "names": [ "Dirk Papenberg" ], "organization": "NTT DATA Germany" } ], "cve": "CVE-2021-20289", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2021-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1935927" } ], "notes": [ { "category": "description", "text": "A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method\u0027s parameter value. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "resteasy: Error message exposes endpoint class information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20289" }, { "category": "external", "summary": "RHBZ#1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20289", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20289" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289" } ], "release_date": "2021-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T21:33:24+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0152" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "resteasy: Error message exposes endpoint class information" }, { "cve": "CVE-2021-40690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011190" } ], "notes": [ { "category": "description", "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: XPath Transform abuse allows for information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Since OpenShift Container Platform (OCP) 4.7, the logging-elasticsearch6-container is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-40690" }, { "category": "external", "summary": "RHBZ#2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" } ], "release_date": "2021-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T21:33:24+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0152" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.noarch", "8Base-RHSSO-7.5:rh-sso7-keycloak-0:15.0.4-1.redhat_00001.1.el8sso.src", "8Base-RHSSO-7.5:rh-sso7-keycloak-server-0:15.0.4-1.redhat_00001.1.el8sso.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: XPath Transform abuse allows for information disclosure" } ] }
rhsa-2022_0164
Vulnerability from csaf_redhat
Published
2022-01-18 14:52
Modified
2022-01-18 14:52
Summary
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 for OpenShift image security and enhancement update
Notes
Topic
A new image is available for Red Hat Single Sign-On 7.5.1, running on OpenShift Container Platform 3.10 and 3.11, and 4.9.
Red Hat Product Security has rated this update as having a security impact of important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Single Sign-On is an integrated sign-on solution, available as a
Red Hat JBoss Middleware for OpenShift containerized image. The Red Hat
Single Sign-On for OpenShift image provides an authentication server that
you can use to log in centrally, log out, and register. You can also manage
user accounts for web applications, mobile applications, and RESTful web
services.
This erratum releases a new image for Red Hat Single Sign-On 7.5.1 for
use within the OpenShift Container Platform 3.10, OpenShift Container Platform
3.11, and within the OpenShift Container Platform 4.9 cloud computing Platform-as-a-Service (PaaS) for
on-premise or private cloud deployments, aligning with the standalone product release.
Security Fix(es):
* resteasy-jaxrs: resteasy: Error message exposes endpoint class information (CVE-2021-20289)
* keycloak-server-spi-private: ECP SAML binding bypasses authentication flows (CVE-2021-3827)
* xmlsec: xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)
* keycloak-services: Keycloak: Incorrect authorization allows unpriviledged users to create other users (CVE-2021-4133)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 2023 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A new image is available for Red Hat Single Sign-On 7.5.1, running on OpenShift Container Platform 3.10 and 3.11, and 4.9.\n\nRed Hat Product Security has rated this update as having a security impact of important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On is an integrated sign-on solution, available as a\nRed Hat JBoss Middleware for OpenShift containerized image. The Red Hat\nSingle Sign-On for OpenShift image provides an authentication server that\nyou can use to log in centrally, log out, and register. You can also manage\nuser accounts for web applications, mobile applications, and RESTful web\nservices.\n\nThis erratum releases a new image for Red Hat Single Sign-On 7.5.1 for\nuse within the OpenShift Container Platform 3.10, OpenShift Container Platform\n3.11, and within the OpenShift Container Platform 4.9 cloud computing Platform-as-a-Service (PaaS) for\non-premise or private cloud deployments, aligning with the standalone product release.\n\nSecurity Fix(es):\n\n* resteasy-jaxrs: resteasy: Error message exposes endpoint class information (CVE-2021-20289)\n\n* keycloak-server-spi-private: ECP SAML binding bypasses authentication flows (CVE-2021-3827)\n\n* xmlsec: xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)\n\n* keycloak-services: Keycloak: Incorrect authorization allows unpriviledged users to create other users (CVE-2021-4133)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0164", "url": "https://access.redhat.com/errata/RHSA-2022:0164" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2022/rhsa-2022_0164.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 for OpenShift image security and enhancement update", "tracking": { "current_release_date": "2022-01-18T14:52:00Z", "generator": { "date": "2023-07-01T05:15:00Z", "engine": { "name": "Red Hat SDEngine", "version": "3.18.0" } }, "id": "RHSA-2022:0164", "initial_release_date": "2022-01-18T14:52:00Z", "revision_history": [ { "date": "2022-01-18T14:52:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Middleware Containers for OpenShift", "product": { "name": "Middleware Containers for OpenShift", "product_id": "8Base-RHOSE-Middleware", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhosemc:1.0::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "category": "product_version", "name": "rh-sso-7/sso75-openshift-rhel8:7.5-15", "product": { "name": "rh-sso-7/sso75-openshift-rhel8:7.5-15", "product_id": "rh-sso-7/sso75-openshift-rhel8:7.5-15" } } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-sso-7/sso75-openshift-rhel8:7.5-15 as a component of Middleware Containers for OpenShift", "product_id": "8Base-RHOSE-Middleware:rh-sso-7/sso75-openshift-rhel8:7.5-15" }, "product_reference": "rh-sso-7/sso75-openshift-rhel8:7.5-15", "relates_to_product_reference": "8Base-RHOSE-Middleware" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Aaron Sachau" ], "organization": "SRAM" } ], "cve": "CVE-2021-3827", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-09-24T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=2007512" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user\u0027s credentials. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak-server-spi-private: ECP SAML binding bypasses authentication flows", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso75-openshift-rhel8:7.5-15" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3827", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3827" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3827", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3827" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v" }, { "category": "external", "summary": "CVE-2021-3827", "url": "https://access.redhat.com/security/cve/CVE-2021-3827" }, { "category": "external", "summary": "bz#2007512: CVE-2021-3827 keycloak-server-spi-private: ECP SAML binding bypasses authentication flows", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007512" } ], "release_date": "2021-09-02T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "To update to the latest Red Hat Single Sign-On 7.5.1 for OpenShift\nimage, Follow these steps to pull in the content:\n\n1. On your master hosts, ensure you are logged into the CLI as a\ncluster administrator or user with project administrator access\nto the global \"openshift\" project. For example:\n\n$ oc login -u system:admin\n\n2. Update the core set of Red Hat Single Sign-On resources for OpenShift\nin the \"openshift\" project by running the following commands:\n\n$ for resource in sso75-image-stream.json \\\nsso75-https.json \\\nsso75-mysql.json \\\nsso75-mysql-persistent.json \\\nsso75-postgresql.json \\\nsso75-postgresql-persistent.json \\\nsso75-x509-https.json \\\nsso75-x509-mysql-persistent.json \\\nsso75-x509-postgresql-persistent.json\ndo\noc replace -n openshift --force -f \\\nhttps://raw.githubusercontent.com/jboss-container-images/redhat-sso-7-openshift-image/v7.5.1.GA/templates/${resource}\ndone\n\n3. Install the Red Hat Single Sign-On 7.5.1 for OpenShift streams in the\n\"openshift\" project by running the following commands:\n\n$ oc -n openshift import-image redhat-sso75-openshift:1.0", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso75-openshift-rhel8:7.5-15" ], "url": "https://access.redhat.com/errata/RHSA-2022:0164" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso75-openshift-rhel8:7.5-15" ] } ], "threats": [ { "category": "impact", "date": "2021-09-24T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2021-3827 keycloak-server-spi-private: ECP SAML binding bypasses authentication flows" }, { "acknowledgments": [ { "names": [ "Grzegorz Soba\u0144ski" ], "organization": "MLabs" } ], "cve": "CVE-2021-4133", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-12-17T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=2033602" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in Keycloak version from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled.", "title": "Vulnerability description" }, { "category": "summary", "text": "Keycloak: Incorrect authorization allows unpriviledged users to create other users", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso75-openshift-rhel8:7.5-15" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4133", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4133" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4133", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4133" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/issues/9247", "url": "https://github.com/keycloak/keycloak/issues/9247" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487" }, { "category": "external", "summary": "CVE-2021-4133", "url": "https://access.redhat.com/security/cve/CVE-2021-4133" }, { "category": "external", "summary": "bz#2033602: CVE-2021-4133 Keycloak: Incorrect authorization allows unpriviledged users to create other users", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033602" } ], "release_date": "2021-12-16T17:05:00Z", "remediations": [ { "category": "vendor_fix", "details": "To update to the latest Red Hat Single Sign-On 7.5.1 for OpenShift\nimage, Follow these steps to pull in the content:\n\n1. On your master hosts, ensure you are logged into the CLI as a\ncluster administrator or user with project administrator access\nto the global \"openshift\" project. For example:\n\n$ oc login -u system:admin\n\n2. Update the core set of Red Hat Single Sign-On resources for OpenShift\nin the \"openshift\" project by running the following commands:\n\n$ for resource in sso75-image-stream.json \\\nsso75-https.json \\\nsso75-mysql.json \\\nsso75-mysql-persistent.json \\\nsso75-postgresql.json \\\nsso75-postgresql-persistent.json \\\nsso75-x509-https.json \\\nsso75-x509-mysql-persistent.json \\\nsso75-x509-postgresql-persistent.json\ndo\noc replace -n openshift --force -f \\\nhttps://raw.githubusercontent.com/jboss-container-images/redhat-sso-7-openshift-image/v7.5.1.GA/templates/${resource}\ndone\n\n3. Install the Red Hat Single Sign-On 7.5.1 for OpenShift streams in the\n\"openshift\" project by running the following commands:\n\n$ oc -n openshift import-image redhat-sso75-openshift:1.0", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso75-openshift-rhel8:7.5-15" ], "url": "https://access.redhat.com/errata/RHSA-2022:0164" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso75-openshift-rhel8:7.5-15" ] } ], "threats": [ { "category": "impact", "date": "2021-12-17T00:00:00Z", "details": "Important" } ], "title": "CVE-2021-4133 Keycloak: Incorrect authorization allows unpriviledged users to create other users" }, { "acknowledgments": [ { "names": [ "Dirk Papenberg" ], "organization": "NTT DATA Germany" } ], "cve": "CVE-2021-20289", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2021-03-05T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method\u0027s parameter value. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "resteasy: Error message exposes endpoint class information", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso75-openshift-rhel8:7.5-15" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20289", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20289" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289" }, { "category": "external", "summary": "CVE-2021-20289", "url": "https://access.redhat.com/security/cve/CVE-2021-20289" }, { "category": "external", "summary": "bz#1935927: CVE-2021-20289 resteasy: Error message exposes endpoint class information", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" } ], "release_date": "2021-03-03T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "To update to the latest Red Hat Single Sign-On 7.5.1 for OpenShift\nimage, Follow these steps to pull in the content:\n\n1. On your master hosts, ensure you are logged into the CLI as a\ncluster administrator or user with project administrator access\nto the global \"openshift\" project. For example:\n\n$ oc login -u system:admin\n\n2. Update the core set of Red Hat Single Sign-On resources for OpenShift\nin the \"openshift\" project by running the following commands:\n\n$ for resource in sso75-image-stream.json \\\nsso75-https.json \\\nsso75-mysql.json \\\nsso75-mysql-persistent.json \\\nsso75-postgresql.json \\\nsso75-postgresql-persistent.json \\\nsso75-x509-https.json \\\nsso75-x509-mysql-persistent.json \\\nsso75-x509-postgresql-persistent.json\ndo\noc replace -n openshift --force -f \\\nhttps://raw.githubusercontent.com/jboss-container-images/redhat-sso-7-openshift-image/v7.5.1.GA/templates/${resource}\ndone\n\n3. Install the Red Hat Single Sign-On 7.5.1 for OpenShift streams in the\n\"openshift\" project by running the following commands:\n\n$ oc -n openshift import-image redhat-sso75-openshift:1.0", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso75-openshift-rhel8:7.5-15" ], "url": "https://access.redhat.com/errata/RHSA-2022:0164" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso75-openshift-rhel8:7.5-15" ] } ], "threats": [ { "category": "impact", "date": "2021-03-05T00:00:00Z", "details": "Low" } ], "title": "CVE-2021-20289 resteasy: Error message exposes endpoint class information" }, { "cve": "CVE-2021-40690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-09-19T00:00:00Z", "ids": [ { "system_name": "Red Hat Bugzilla", "text": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" } ], "notes": [ { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" }, { "category": "description", "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: XPath Transform abuse allows for information disclosure", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "8Base-RHOSE-Middleware:rh-sso-7/sso75-openshift-rhel8:7.5-15" ] }, "references": [ { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" }, { "category": "external", "summary": "CVE-2021-40690", "url": "https://access.redhat.com/security/cve/CVE-2021-40690" }, { "category": "external", "summary": "bz#2011190: CVE-2021-40690 xml-security: XPath Transform abuse allows for information disclosure", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" } ], "release_date": "2021-09-17T00:00:00Z", "remediations": [ { "category": "vendor_fix", "details": "To update to the latest Red Hat Single Sign-On 7.5.1 for OpenShift\nimage, Follow these steps to pull in the content:\n\n1. On your master hosts, ensure you are logged into the CLI as a\ncluster administrator or user with project administrator access\nto the global \"openshift\" project. For example:\n\n$ oc login -u system:admin\n\n2. Update the core set of Red Hat Single Sign-On resources for OpenShift\nin the \"openshift\" project by running the following commands:\n\n$ for resource in sso75-image-stream.json \\\nsso75-https.json \\\nsso75-mysql.json \\\nsso75-mysql-persistent.json \\\nsso75-postgresql.json \\\nsso75-postgresql-persistent.json \\\nsso75-x509-https.json \\\nsso75-x509-mysql-persistent.json \\\nsso75-x509-postgresql-persistent.json\ndo\noc replace -n openshift --force -f \\\nhttps://raw.githubusercontent.com/jboss-container-images/redhat-sso-7-openshift-image/v7.5.1.GA/templates/${resource}\ndone\n\n3. Install the Red Hat Single Sign-On 7.5.1 for OpenShift streams in the\n\"openshift\" project by running the following commands:\n\n$ oc -n openshift import-image redhat-sso75-openshift:1.0", "product_ids": [ "8Base-RHOSE-Middleware:rh-sso-7/sso75-openshift-rhel8:7.5-15" ], "url": "https://access.redhat.com/errata/RHSA-2022:0164" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-Middleware:rh-sso-7/sso75-openshift-rhel8:7.5-15" ] } ], "threats": [ { "category": "impact", "date": "2021-09-19T00:00:00Z", "details": "Moderate" } ], "title": "CVE-2021-40690 xml-security: XPath Transform abuse allows for information disclosure" } ] }
rhsa-2021_5149
Vulnerability from csaf_redhat
Published
2021-12-15 14:52
Modified
2024-11-06 00:15
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.10 security update on RHEL 6
Notes
Topic
A security update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release of Red Hat JBoss Enterprise Application Platform 7.3.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.10 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)
* wildfly-elytron: possible timing attack in ScramServer (CVE-2021-3642)
* wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users (CVE-2021-3717)
* jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)
* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)
* resteasy: Error message exposes endpoint class information (CVE-2021-20289)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat JBoss Enterprise Application Platform 7.3.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.10 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)\n\n* wildfly-elytron: possible timing attack in ScramServer (CVE-2021-3642)\n\n* wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users (CVE-2021-3717)\n\n* jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)\n\n* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)\n\n* resteasy: Error message exposes endpoint class information (CVE-2021-20289)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:5149", "url": "https://access.redhat.com/errata/RHSA-2021:5149" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/" }, { "category": "external", "summary": "1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "1981407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981407" }, { "category": "external", "summary": "1991305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991305" }, { "category": "external", "summary": "1995259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259" }, { "category": "external", "summary": "2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "JBEAP-22143", "url": "https://issues.redhat.com/browse/JBEAP-22143" }, { "category": "external", "summary": "JBEAP-22314", "url": "https://issues.redhat.com/browse/JBEAP-22314" }, { "category": "external", "summary": "JBEAP-22332", "url": "https://issues.redhat.com/browse/JBEAP-22332" }, { "category": "external", "summary": "JBEAP-22343", "url": "https://issues.redhat.com/browse/JBEAP-22343" }, { "category": "external", "summary": "JBEAP-22363", "url": "https://issues.redhat.com/browse/JBEAP-22363" }, { "category": "external", "summary": "JBEAP-22490", "url": "https://issues.redhat.com/browse/JBEAP-22490" }, { "category": "external", "summary": "JBEAP-22501", "url": "https://issues.redhat.com/browse/JBEAP-22501" }, { "category": "external", "summary": "JBEAP-22523", "url": "https://issues.redhat.com/browse/JBEAP-22523" }, { "category": "external", "summary": "JBEAP-22734", "url": "https://issues.redhat.com/browse/JBEAP-22734" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_5149.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.10 security update on RHEL 6", "tracking": { "current_release_date": "2024-11-06T00:15:40+00:00", "generator": { "date": "2024-11-06T00:15:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:5149", "initial_release_date": "2021-12-15T14:52:07+00:00", "revision_history": [ { "date": "2021-12-15T14:52:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-12-15T14:52:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:15:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product": { "name": "Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.10.15-1.Final_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "product": { "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "product_id": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j@2.2.7-1.redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "product": { "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "product_id": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow@2.0.41-1.SP1_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy@3.11.5-1.Final_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "product": { "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "product_id": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.3.12-1.redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src", "product": { "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src", "product_id": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xml-security@2.1.7-1.redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.43-1.Final_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "product": { "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "product_id": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.14.2-1.redhat_00002.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "product": { "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "product_id": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jakarta-el@3.0.3-3.redhat_00007.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "product_id": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.7.2-10.Final_redhat_00011.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "product": { "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "product_id": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.3-1.Final_redhat_00001.1.el6eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "product": { "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "product_id": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.3.10-2.GA_redhat_00003.1.el6eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.10.15-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron-tool@1.10.15-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j@2.2.7-1.redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-bindings@2.2.7-1.redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-policy@2.2.7-1.redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-common@2.2.7-1.redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-dom@2.2.7-1.redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-policy-stax@2.2.7-1.redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-stax@2.2.7-1.redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "product_id": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow@2.0.41-1.SP1_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-client@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-client-microprofile@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.11.5-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.3.12-1.redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-rt@3.3.12-1.redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-services@3.3.12-1.redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-tools@3.3.12-1.redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "product_id": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xml-security@2.1.7-1.redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.43-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "product": { "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "product_id": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.14.2-1.redhat_00002.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "product": { "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "product_id": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jakarta-el@3.0.3-3.redhat_00007.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4-to-eap7.3@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.0@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.1@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.2@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.2-to-eap7.3@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.3-server@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.0@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.1@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly11.0@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly12.0@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly13.0-server@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly14.0-server@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly15.0-server@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly16.0-server@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly17.0-server@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly18.0-server@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly8.2@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly9.0@1.7.2-10.Final_redhat_00011.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.3-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.3-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.3-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.3-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.3-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.3-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.3-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.3-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.3-1.Final_redhat_00001.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "product": { "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "product_id": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.3.10-2.GA_redhat_00003.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.3.10-2.GA_redhat_00003.1.el6eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "product_id": "eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.3.10-2.GA_redhat_00003.1.el6eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src" }, "product_reference": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch" }, "product_reference": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src" }, "product_reference": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch" }, "product_reference": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src" }, "product_reference": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src" }, "product_reference": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src" }, "product_reference": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch" }, "product_reference": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "relates_to_product_reference": "6Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" }, "product_reference": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src", "relates_to_product_reference": "6Server-JBEAP-7.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3629", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1977362" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3629" }, { "category": "external", "summary": "RHBZ#1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3629", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:52:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5149" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS" }, { "cve": "CVE-2021-3642", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "discovery_date": "2021-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981407" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Elytron where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-elytron: possible timing attack in ScramServer", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3642" }, { "category": "external", "summary": "RHBZ#1981407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981407" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3642", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3642" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3642", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3642" } ], "release_date": "2021-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:52:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5149" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-elytron: possible timing attack in ScramServer" }, { "cve": "CVE-2021-3717", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "discovery_date": "2021-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1991305" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly. An incorrect JBOSS_LOCAL_USER challenge location when using the elytron configuration may lead to JBOSS_LOCAL_USER access to all users on the machine. The highest threat from this vulnerability is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3717" }, { "category": "external", "summary": "RHBZ#1991305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3717" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:52:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5149" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users" }, { "acknowledgments": [ { "names": [ "Dirk Papenberg" ], "organization": "NTT DATA Germany" } ], "cve": "CVE-2021-20289", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2021-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1935927" } ], "notes": [ { "category": "description", "text": "A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method\u0027s parameter value. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "resteasy: Error message exposes endpoint class information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20289" }, { "category": "external", "summary": "RHBZ#1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20289", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20289" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289" } ], "release_date": "2021-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:52:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5149" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "resteasy: Error message exposes endpoint class information" }, { "cve": "CVE-2021-37714", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995259" } ], "notes": [ { "category": "description", "text": "jsoup is a Java library for working with HTML. Those using jsoup versions prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. The issue is patched in version 1.14.2. There are a few available workarounds. Users may rate limit input parsing, limit the size of inputs based on system resources, and/or implement thread watchdogs to cap and timeout parse runtimes.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37714" }, { "category": "external", "summary": "RHBZ#1995259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37714", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37714" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714" }, { "category": "external", "summary": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c", "url": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:52:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5149" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck" }, { "cve": "CVE-2021-40690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011190" } ], "notes": [ { "category": "description", "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: XPath Transform abuse allows for information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Since OpenShift Container Platform (OCP) 4.7, the logging-elasticsearch6-container is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-40690" }, { "category": "external", "summary": "RHBZ#2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" } ], "release_date": "2021-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:52:07+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5149" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el6eap.src", "6Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el6eap.src", "6Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.noarch", "6Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el6eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: XPath Transform abuse allows for information disclosure" } ] }
rhsa-2022_6407
Vulnerability from csaf_redhat
Published
2022-09-09 07:12
Modified
2024-11-06 01:35
Summary
Red Hat Security Advisory: Red Hat Integration Camel-K 1.8 security update
Notes
Topic
A minor version update is now available for Red Hat Integration Camel K. The purpose of this text-only errata is to inform you about the security issues fixed in this release.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
A minor version update is now available for Red Hat Camel K that includes CVE fixes in the base images, which are documented in the Release Notes document linked in the References section.
Security Fix(es):
* hadoop: WebHDFS client might send SPNEGO authorization header (CVE-2020-9492)
* jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS (CVE-2020-27223)
* jackson-databind: denial of service via a large depth of nested objects (CVE-2020-36518)
* mysql-connector-java: unauthorized access to critical (CVE-2021-2471)
* lz4: memory corruption due to an integer overflow bug caused by memmove argument (CVE-2021-3520)
* undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)
* elasticsearch: executing async search improperly stores HTTP headers leading to information disclosure (CVE-2021-22132)
* jetty: Symlink directory exposes webapp directory contents (CVE-2021-28163)
* jetty: Ambiguous paths can access WEB-INF (CVE-2021-28164)
* jetty: Resource exhaustion when receiving an invalid large TLS frame (CVE-2021-28165)
* jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)
* Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients (CVE-2021-38153)
* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)
* resteasy: Error message exposes endpoint class information (CVE-2021-20289)
* elasticsearch: Document disclosure flaw when Document or Field Level Security is used (CVE-2021-22137)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A minor version update is now available for Red Hat Integration Camel K. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "A minor version update is now available for Red Hat Camel K that includes CVE fixes in the base images, which are documented in the Release Notes document linked in the References section.\n\nSecurity Fix(es):\n\n* hadoop: WebHDFS client might send SPNEGO authorization header (CVE-2020-9492)\n\n* jetty: request containing multiple Accept headers with a large number of \"quality\" parameters may lead to DoS (CVE-2020-27223)\n\n* jackson-databind: denial of service via a large depth of nested objects (CVE-2020-36518)\n\n* mysql-connector-java: unauthorized access to critical (CVE-2021-2471)\n\n* lz4: memory corruption due to an integer overflow bug caused by memmove argument (CVE-2021-3520)\n\n* undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)\n\n* elasticsearch: executing async search improperly stores HTTP headers leading to information disclosure (CVE-2021-22132)\n\n* jetty: Symlink directory exposes webapp directory contents (CVE-2021-28163)\n\n* jetty: Ambiguous paths can access WEB-INF (CVE-2021-28164)\n\n* jetty: Resource exhaustion when receiving an invalid large TLS frame (CVE-2021-28165)\n\n* jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)\n\n* Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients (CVE-2021-38153)\n\n* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)\n\n* resteasy: Error message exposes endpoint class information (CVE-2021-20289)\n\n* elasticsearch: Document disclosure flaw when Document or Field Level Security is used (CVE-2021-22137)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6407", "url": "https://access.redhat.com/errata/RHSA-2022:6407" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=red.hat.integration\u0026version=2022-Q3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=red.hat.integration\u0026version=2022-Q3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_integration/2022.q3", "url": "https://access.redhat.com/documentation/en-us/red_hat_integration/2022.q3" }, { "category": "external", "summary": "1923181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923181" }, { "category": "external", "summary": "1925237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925237" }, { "category": "external", "summary": "1934116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934116" }, { "category": "external", "summary": "1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "1943189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943189" }, { "category": "external", "summary": "1945710", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945710" }, { "category": "external", "summary": "1945712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945712" }, { "category": "external", "summary": "1945714", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945714" }, { "category": "external", "summary": "1954559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954559" }, { "category": "external", "summary": "1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "1995259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259" }, { "category": "external", "summary": "2009041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009041" }, { "category": "external", "summary": "2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "2020583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020583" }, { "category": "external", "summary": "2064698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064698" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6407.json" } ], "title": "Red Hat Security Advisory: Red Hat Integration Camel-K 1.8 security update", "tracking": { "current_release_date": "2024-11-06T01:35:25+00:00", "generator": { "date": "2024-11-06T01:35:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:6407", "initial_release_date": "2022-09-09T07:12:07+00:00", "revision_history": [ { "date": "2022-09-09T07:12:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-09-09T07:12:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T01:35:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHAF Camel-K 1.8", "product": { "name": "RHAF Camel-K 1.8", "product_id": "RHAF Camel-K 1.8", "product_identification_helper": { "cpe": "cpe:/a:redhat:integration:1" } } } ], "category": "product_family", "name": "Red Hat Integration" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-9492", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1925237" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache hadoop. The WebHDFS client can send a SPNEGO authorization header to a remote URL without proper verification which could lead to an access restriction bypass. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "hadoop: WebHDFS client might send SPNEGO authorization header", "title": "Vulnerability summary" }, { "category": "other", "text": "While OpenShift Container Platform (OCP) does package a vulnerable version of hadoop-hdfs-client in the hadoop and hive containers, the HDFS storage back-end is not enabled by default and is largely undocumented/unsupported. However, as it still can be enabled by using the configuration option `unsupportedFeatures.enabledHDFS`, the vulnerability has been rated Moderate for OCP.\n\nIn OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of hadoop package.\nSince the release of OCP 4.6, the Metering product has been deprecated [1], hence the affected components are marked as wontfix.\nThis may be fixed in the future.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHAF Camel-K 1.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9492" }, { "category": "external", "summary": "RHBZ#1925237", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1925237" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9492", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9492" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9492", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9492" }, { "category": "external", "summary": "https://hadoop.apache.org/cve_list.html", "url": "https://hadoop.apache.org/cve_list.html" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEHADOOP-1065272", "url": "https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEHADOOP-1065272" } ], "release_date": "2021-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-09T07:12:07+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHAF Camel-K 1.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "RHAF Camel-K 1.8" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "hadoop: WebHDFS client might send SPNEGO authorization header" }, { "cve": "CVE-2020-27223", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1934116" } ], "notes": [ { "category": "description", "text": "In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of \u201cquality\u201d (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: request containing multiple Accept headers with a large number of \"quality\" parameters may lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of jetty.\nSince the release of OCP 4.6, the Metering product has been deprecated [1], hence the affected components are marked as wontfix.\nThis may be fixed in the future.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHAF Camel-K 1.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27223" }, { "category": "external", "summary": "RHBZ#1934116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934116" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27223", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27223" }, { "category": "external", "summary": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7", "url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7" } ], "release_date": "2021-02-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-09T07:12:07+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHAF Camel-K 1.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "RHAF Camel-K 1.8" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: request containing multiple Accept headers with a large number of \"quality\" parameters may lead to DoS" }, { "cve": "CVE-2020-36518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064698" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Jackson Databind package. This cause of the issue is due to a Java StackOverflow exception and a denial of service via a significant depth of nested objects.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: denial of service via a large depth of nested objects", "title": "Vulnerability summary" }, { "category": "other", "text": "CodeReady Studio is no longer supported and therefore this flaw will not be addressed in CodeReady Studio.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHAF Camel-K 1.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36518" }, { "category": "external", "summary": "RHBZ#2064698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064698" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36518", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36518" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-57j2-w4cx-62h2", "url": "https://github.com/advisories/GHSA-57j2-w4cx-62h2" } ], "release_date": "2020-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-09T07:12:07+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHAF Camel-K 1.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHAF Camel-K 1.8" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: denial of service via a large depth of nested objects" }, { "cve": "CVE-2021-2471", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-11-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2020583" } ], "notes": [ { "category": "description", "text": "MySQL Connector/J has no security check when external general entities are included in XML sources, consequently, there exists an XML External Entity(XXE) vulnerability. A successful attack can access critical data and gain full control/access to all MySQL Connectors\u0027 accessible data without any authorization.", "title": "Vulnerability description" }, { "category": "summary", "text": "mysql-connector-java: unauthorized access to critical", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), the Presto component is part of the OCP Metering stack and it ships the vulnerable version of the MySQL Connector/J package. Since the release of OCP 4.6, the Metering product has been deprecated and is removed from OCP starting from 4.9 version [1], hence the affected component is marked as wontfix.\n\n[1] https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html#ocp-4-9-deprecated-removed-features", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHAF Camel-K 1.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-2471" }, { "category": "external", "summary": "RHBZ#2020583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020583" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-2471", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-2471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-2471" }, { "category": "external", "summary": "https://www.oracle.com/security-alerts/cpuoct2021.html", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "release_date": "2021-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-09T07:12:07+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHAF Camel-K 1.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "RHAF Camel-K 1.8" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "mysql-connector-java: unauthorized access to critical" }, { "cve": "CVE-2021-3520", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1954559" } ], "notes": [ { "category": "description", "text": "There\u0027s a flaw in lz4. An attacker who submits a crafted file to an application linked with lz4 may be able to trigger an integer overflow, leading to calling of memmove() on a negative size argument, causing an out-of-bounds write and/or a crash. The greatest impact of this flaw is to availability, with some potential impact to confidentiality and integrity as well.", "title": "Vulnerability description" }, { "category": "summary", "text": "lz4: memory corruption due to an integer overflow bug caused by memmove argument", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is out of support scope for Red Hat Enterprise Linux 7. To learn more about Red Hat Enterprise Linux support life cycles, please see https://access.redhat.com/support/policy/updates/errata .", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHAF Camel-K 1.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3520" }, { "category": "external", "summary": "RHBZ#1954559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3520", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3520" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3520", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3520" } ], "release_date": "2021-04-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-09T07:12:07+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHAF Camel-K 1.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "RHAF Camel-K 1.8" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "lz4: memory corruption due to an integer overflow bug caused by memmove argument" }, { "cve": "CVE-2021-3629", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1977362" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHAF Camel-K 1.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3629" }, { "category": "external", "summary": "RHBZ#1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3629", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-09T07:12:07+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHAF Camel-K 1.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHAF Camel-K 1.8" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS" }, { "acknowledgments": [ { "names": [ "Dirk Papenberg" ], "organization": "NTT DATA Germany" } ], "cve": "CVE-2021-20289", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2021-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1935927" } ], "notes": [ { "category": "description", "text": "A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method\u0027s parameter value. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "resteasy: Error message exposes endpoint class information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHAF Camel-K 1.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20289" }, { "category": "external", "summary": "RHBZ#1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20289", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20289" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289" } ], "release_date": "2021-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-09T07:12:07+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHAF Camel-K 1.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "RHAF Camel-K 1.8" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "resteasy: Error message exposes endpoint class information" }, { "cve": "CVE-2021-22132", "cwe": { "id": "CWE-522", "name": "Insufficiently Protected Credentials" }, "discovery_date": "2021-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1923181" } ], "notes": [ { "category": "description", "text": "Elasticsearch versions 7.7.0 to 7.10.1 contain an information disclosure flaw in the async search API. Users who execute an async search will improperly store the HTTP headers. An Elasticsearch user with the ability to read the .tasks index could obtain sensitive request headers of other users in the cluster. This issue is fixed in Elasticsearch 7.10.2", "title": "Vulnerability description" }, { "category": "summary", "text": "elasticsearch: executing async search improperly stores HTTP headers leading to information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHAF Camel-K 1.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22132" }, { "category": "external", "summary": "RHBZ#1923181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923181" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22132", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22132" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22132", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22132" }, { "category": "external", "summary": "https://discuss.elastic.co/t/elasticsearch-7-10-2-security-update/261164", "url": "https://discuss.elastic.co/t/elasticsearch-7-10-2-security-update/261164" } ], "release_date": "2021-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-09T07:12:07+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHAF Camel-K 1.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "RHAF Camel-K 1.8" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "elasticsearch: executing async search improperly stores HTTP headers leading to information disclosure" }, { "cve": "CVE-2021-22137", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1943189" } ], "notes": [ { "category": "description", "text": "In Elasticsearch versions before 7.11.2 and 6.8.15 a document disclosure flaw was found when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain cross-cluster search queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices.", "title": "Vulnerability description" }, { "category": "summary", "text": "elasticsearch: Document disclosure flaw when Document or Field Level Security is used", "title": "Vulnerability summary" }, { "category": "other", "text": "In Elasticsearch, Document and Field Level Security is an enterprise only feature [1]. Hence the open source version is unaffected by this vulnerability.\n\n[1] https://www.elastic.co/subscriptions", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHAF Camel-K 1.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22137" }, { "category": "external", "summary": "RHBZ#1943189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943189" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22137", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22137" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22137", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22137" }, { "category": "external", "summary": "https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125", "url": "https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125" } ], "release_date": "2021-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-09T07:12:07+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHAF Camel-K 1.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.6, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "RHAF Camel-K 1.8" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "elasticsearch: Document disclosure flaw when Document or Field Level Security is used" }, { "cve": "CVE-2021-28163", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-04-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945710" } ], "notes": [ { "category": "description", "text": "If the ${jetty.base} directory or the ${jetty.base}/webapps directory is a symlink the contents of the ${jetty.base}/webapps directory may be deployed as a static web application, exposing the content of the directory for download. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: Symlink directory exposes webapp directory contents", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), the hive/presto/hadoop components that comprise the OCP metering stack, ship the vulnerable version of jetty.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected components are marked as wontfix.\nThis may be fixed in the future.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated\n\nRed Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Important and Critical flaws.\n\nRed Hat CodeReady Studio 12 is not affected by this vulnerability because it does not ship a vulnerable version of jetty.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHAF Camel-K 1.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-28163" }, { "category": "external", "summary": "RHBZ#1945710", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945710" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28163", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28163" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28163", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28163" }, { "category": "external", "summary": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-j6qj-j888-vvgq", "url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-j6qj-j888-vvgq" } ], "release_date": "2021-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-09T07:12:07+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHAF Camel-K 1.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "RHAF Camel-K 1.8" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: Symlink directory exposes webapp directory contents" }, { "cve": "CVE-2021-28164", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-04-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945712" } ], "notes": [ { "category": "description", "text": "In Jetty the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. An attacker can use this vulnerability to reveal sensitive information regarding the implementation of a web application.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: Ambiguous paths can access WEB-INF", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Important and Critical flaws.\n\nRed Hat CodeReady Studio 12 is not affected by this vulnerability because it does not ship a vulnerable version of jetty.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHAF Camel-K 1.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-28164" }, { "category": "external", "summary": "RHBZ#1945712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945712" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28164", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28164" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28164", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28164" }, { "category": "external", "summary": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5", "url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5" } ], "release_date": "2021-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-09T07:12:07+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHAF Camel-K 1.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "RHAF Camel-K 1.8" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: Ambiguous paths can access WEB-INF" }, { "cve": "CVE-2021-28165", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945714" } ], "notes": [ { "category": "description", "text": "When using SSL/TLS with Jetty, either with HTTP/1.1, HTTP/2, or WebSocket, the server may receive an invalid large (greater than 17408) TLS frame that is incorrectly handled, causing high CPU resources utilization. The highest threat from this vulnerability is to service availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "jetty: Resource exhaustion when receiving an invalid large TLS frame", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), the hive/presto/hadoop components that comprise the OCP metering stack, ship the vulnerable version of jetty.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected components are marked as wontfix.\nThis may be fixed in the future.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated\n\nRed Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Important and Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHAF Camel-K 1.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-28165" }, { "category": "external", "summary": "RHBZ#1945714", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945714" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28165", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28165" }, { "category": "external", "summary": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w", "url": "https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w" } ], "release_date": "2021-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-09T07:12:07+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHAF Camel-K 1.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHAF Camel-K 1.8" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jetty: Resource exhaustion when receiving an invalid large TLS frame" }, { "cve": "CVE-2021-37714", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995259" } ], "notes": [ { "category": "description", "text": "jsoup is a Java library for working with HTML. Those using jsoup versions prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. The issue is patched in version 1.14.2. There are a few available workarounds. Users may rate limit input parsing, limit the size of inputs based on system resources, and/or implement thread watchdogs to cap and timeout parse runtimes.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHAF Camel-K 1.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37714" }, { "category": "external", "summary": "RHBZ#1995259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37714", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37714" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714" }, { "category": "external", "summary": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c", "url": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-09T07:12:07+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHAF Camel-K 1.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHAF Camel-K 1.8" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck" }, { "cve": "CVE-2021-38153", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2021-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2009041" } ], "notes": [ { "category": "description", "text": "Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHAF Camel-K 1.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-38153" }, { "category": "external", "summary": "RHBZ#2009041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009041" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-38153", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38153" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38153", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38153" } ], "release_date": "2021-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-09T07:12:07+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHAF Camel-K 1.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "RHAF Camel-K 1.8" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients" }, { "cve": "CVE-2021-40690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011190" } ], "notes": [ { "category": "description", "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: XPath Transform abuse allows for information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Since OpenShift Container Platform (OCP) 4.7, the logging-elasticsearch6-container is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHAF Camel-K 1.8" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-40690" }, { "category": "external", "summary": "RHBZ#2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" } ], "release_date": "2021-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-09-09T07:12:07+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHAF Camel-K 1.8" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "RHAF Camel-K 1.8" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: XPath Transform abuse allows for information disclosure" } ] }
rhsa-2022_5532
Vulnerability from csaf_redhat
Published
2022-07-07 14:19
Modified
2024-11-06 01:12
Summary
Red Hat Security Advisory: Red Hat Fuse 7.11.0 release and security update
Notes
Topic
A minor version update (from 7.10 to 7.11) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release of Red Hat Fuse 7.11.0 serves as a replacement for Red Hat Fuse 7.10 and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References.
Security Fix(es):
* fastjson (CVE-2022-25845)
* jackson-databind (CVE-2020-36518)
* mysql-connector-java (CVE-2021-2471, CVE-2022-21363)
* undertow (CVE-2022-1259, CVE-2021-3629, CVE-2022-1319)
* wildfly-elytron (CVE-2021-3642)
* nodejs-ansi-regex (CVE-2021-3807, CVE-2021-3807)
* 3 qt (CVE-2021-3859)
* kubernetes-client (CVE-2021-4178)
* spring-security (CVE-2021-22119)
* protobuf-java (CVE-2021-22569)
* google-oauth-client (CVE-2021-22573)
* XStream (CVE-2021-29505, CVE-2021-43859)
* jdom (CVE-2021-33813, CVE-2021-33813)
* apache-commons-compress (CVE-2021-35515, CVE-2021-35516, CVE-2021-35517, CVE-2021-36090)
* Kafka (CVE-2021-38153)
* xml-security (CVE-2021-40690)
* logback (CVE-2021-42550)
* netty (CVE-2021-43797)
* xnio (CVE-2022-0084)
* jdbc-postgresql (CVE-2022-21724)
* spring-expression (CVE-2022-22950)
* springframework (CVE-2021-22096, CVE-2021-22060, CVE-2021-22096, CVE-2022-22976, CVE-2022-22970, CVE-2022-22971, CVE-2022-22978)
* h2 (CVE-2022-23221)
* junrar (CVE-2022-23596)
* artemis-commons (CVE-2022-23913)
* elasticsearch (CVE-2020-7020)
* tomcat (CVE-2021-24122, CVE-2021-25329, CVE-2020-9484, CVE-2021-25122, CVE-2021-33037, CVE-2021-30640, CVE-2021-41079, CVE-2021-42340, CVE-2022-23181)
* junit4 (CVE-2020-15250)
* wildfly-core (CVE-2020-25689, CVE-2021-3644)
* kotlin (CVE-2020-29582)
* karaf (CVE-2021-41766, CVE-2022-22932)
* Spring Framework (CVE-2022-22968)
* metadata-extractor (CVE-2022-24614)
* poi-scratchpad (CVE-2022-26336)
* postgresql-jdbc (CVE-2022-26520)
* tika-core (CVE-2022-30126)
For more details about the security issues, including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A minor version update (from 7.10 to 7.11) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat Fuse 7.11.0 serves as a replacement for Red Hat Fuse 7.10 and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References.\n\nSecurity Fix(es):\n\n* fastjson (CVE-2022-25845)\n\n* jackson-databind (CVE-2020-36518)\n\n* mysql-connector-java (CVE-2021-2471, CVE-2022-21363)\n\n* undertow (CVE-2022-1259, CVE-2021-3629, CVE-2022-1319)\n\n* wildfly-elytron (CVE-2021-3642)\n\n* nodejs-ansi-regex (CVE-2021-3807, CVE-2021-3807)\n\n* 3 qt (CVE-2021-3859)\n\n* kubernetes-client (CVE-2021-4178)\n\n* spring-security (CVE-2021-22119)\n\n* protobuf-java (CVE-2021-22569)\n\n* google-oauth-client (CVE-2021-22573)\n\n* XStream (CVE-2021-29505, CVE-2021-43859)\n\n* jdom (CVE-2021-33813, CVE-2021-33813)\n\n* apache-commons-compress (CVE-2021-35515, CVE-2021-35516, CVE-2021-35517, CVE-2021-36090)\n\n* Kafka (CVE-2021-38153)\n\n* xml-security (CVE-2021-40690)\n\n* logback (CVE-2021-42550)\n\n* netty (CVE-2021-43797)\n\n* xnio (CVE-2022-0084)\n\n* jdbc-postgresql (CVE-2022-21724)\n\n* spring-expression (CVE-2022-22950)\n\n* springframework (CVE-2021-22096, CVE-2021-22060, CVE-2021-22096, CVE-2022-22976, CVE-2022-22970, CVE-2022-22971, CVE-2022-22978)\n\n* h2 (CVE-2022-23221)\n\n* junrar (CVE-2022-23596)\n\n* artemis-commons (CVE-2022-23913)\n\n* elasticsearch (CVE-2020-7020)\n\n* tomcat (CVE-2021-24122, CVE-2021-25329, CVE-2020-9484, CVE-2021-25122, CVE-2021-33037, CVE-2021-30640, CVE-2021-41079, CVE-2021-42340, CVE-2022-23181)\n\n* junit4 (CVE-2020-15250)\n\n* wildfly-core (CVE-2020-25689, CVE-2021-3644)\n\n* kotlin (CVE-2020-29582)\n\n* karaf (CVE-2021-41766, CVE-2022-22932)\n\n* Spring Framework (CVE-2022-22968)\n\n* metadata-extractor (CVE-2022-24614)\n\n* poi-scratchpad (CVE-2022-26336)\n\n* postgresql-jdbc (CVE-2022-26520)\n\n* tika-core (CVE-2022-30126)\n\nFor more details about the security issues, including the impact, CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:5532", "url": "https://access.redhat.com/errata/RHSA-2022:5532" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.11.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=jboss.fuse\u0026version=7.11.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "url": "https://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/" }, { "category": "external", "summary": "1838332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1838332" }, { "category": "external", "summary": "1887810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887810" }, { "category": "external", "summary": "1893070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893070" }, { "category": "external", "summary": "1893125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893125" }, { "category": "external", "summary": "1917209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917209" }, { "category": "external", "summary": "1930291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930291" }, { "category": "external", "summary": "1934032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934032" }, { "category": "external", "summary": "1934061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934061" }, { "category": "external", "summary": "1966735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966735" }, { "category": "external", "summary": "1973413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1973413" }, { "category": "external", "summary": "1976052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976052" }, { "category": "external", "summary": "1977064", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977064" }, { "category": "external", "summary": "1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "1981407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981407" }, { "category": "external", "summary": "1981533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981533" }, { "category": "external", "summary": "1981544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981544" }, { "category": "external", "summary": "1981895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981895" }, { "category": "external", "summary": "1981900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981900" }, { "category": "external", "summary": "1981903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981903" }, { "category": "external", "summary": "1981909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981909" }, { "category": "external", "summary": "2004820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004820" }, { "category": "external", "summary": "2007557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007557" }, { "category": "external", "summary": "2009041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009041" }, { "category": "external", "summary": "2010378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010378" }, { "category": "external", "summary": "2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "2014356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014356" }, { "category": "external", "summary": "2020583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020583" }, { "category": "external", "summary": "2031958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031958" }, { "category": "external", "summary": "2033560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033560" }, { "category": "external", "summary": "2034388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034388" }, { "category": "external", "summary": "2034584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034584" }, { "category": "external", "summary": "2039903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039903" }, { "category": "external", "summary": "2044596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044596" }, { "category": "external", "summary": "2046279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046279" }, { "category": "external", "summary": "2046282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046282" }, { "category": "external", "summary": "2047343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047343" }, { "category": "external", "summary": "2047417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047417" }, { "category": "external", "summary": "2049778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049778" }, { "category": "external", "summary": "2049783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049783" }, { "category": "external", "summary": "2050863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050863" }, { "category": "external", "summary": "2055480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055480" }, { "category": "external", "summary": "2058763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058763" }, { "category": "external", "summary": "2063292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063292" }, { "category": "external", "summary": "2063601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063601" }, { "category": "external", "summary": "2064007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064007" }, { "category": "external", "summary": "2064226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064226" }, { "category": "external", "summary": "2064698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064698" }, { "category": "external", "summary": "2069414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069414" }, { "category": "external", "summary": "2072339", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072339" }, { "category": "external", "summary": "2073890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073890" }, { "category": "external", "summary": "2075441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075441" }, { "category": "external", "summary": "2081879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081879" }, { "category": "external", "summary": "2087214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087214" }, { "category": "external", "summary": "2087272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087272" }, { "category": "external", "summary": "2087274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087274" }, { "category": "external", "summary": "2087606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087606" }, { "category": "external", "summary": "2088523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088523" }, { "category": "external", "summary": "2100654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100654" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_5532.json" } ], "title": "Red Hat Security Advisory: Red Hat Fuse 7.11.0 release and security update", "tracking": { "current_release_date": "2024-11-06T01:12:38+00:00", "generator": { "date": "2024-11-06T01:12:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:5532", "initial_release_date": "2022-07-07T14:19:49+00:00", "revision_history": [ { "date": "2022-07-07T14:19:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-07-07T14:19:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T01:12:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Fuse 7.11", "product": { "name": "Red Hat Fuse 7.11", "product_id": "Red Hat Fuse 7.11", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:7" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-7020", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-10-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1893125" } ], "notes": [ { "category": "description", "text": "Elasticsearch versions before 6.8.13 and 7.9.2 contain a document disclosure flaw when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain complex queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices.", "title": "Vulnerability description" }, { "category": "summary", "text": "elasticsearch: not properly preserving security permissions when executing complex queries may lead to information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-7020" }, { "category": "external", "summary": "RHBZ#1893125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-7020", "url": "https://www.cve.org/CVERecord?id=CVE-2020-7020" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-7020", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7020" }, { "category": "external", "summary": "https://discuss.elastic.co/t/elastic-stack-7-9-3-and-6-8-13-security-update/253033", "url": "https://discuss.elastic.co/t/elastic-stack-7-9-3-and-6-8-13-security-update/253033" }, { "category": "external", "summary": "https://www.elastic.co/community/security/", "url": "https://www.elastic.co/community/security/" } ], "release_date": "2020-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "elasticsearch: not properly preserving security permissions when executing complex queries may lead to information disclosure" }, { "cve": "CVE-2020-9484", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2020-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1838332" } ], "notes": [ { "category": "description", "text": "A deserialization flaw was discovered in Apache Tomcat\u0027s use of a FileStore. Under specific circumstances, an attacker can use a specially crafted request to trigger Remote Code Execution through deserialization of the file under their control. The highest threat from the vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: deserialization flaw in session persistence storage leading to RCE", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Enterprise Linux 8, Red Hat Certificate System 10 and Identity Management are using the pki-servlet-engine component, which embeds a vulnerable version of Tomcat. However, in these specific contexts, the prerequisites to the vulnerability are not met. The PersistentManager is not set, and a SecurityManager is used. The use of pki-servlet-engine outside of these contexts is not supported. As a result, the vulnerability can not be triggered in supported configurations of these products. A future update may update Tomcat in pki-servlet-engine.\n\nRed Hat Satellite do not ship Tomcat and rather use its configuration. The product is not affected because configuration does not make use of PersistanceManager or FileStore. Tomcat updates can be obtain from Red Hat Enterprise Linux (RHEL) RHSA.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9484" }, { "category": "external", "summary": "RHBZ#1838332", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1838332" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9484", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9484" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9484", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9484" }, { "category": "external", "summary": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202005.mbox/%3Ce3a0a517-bf82-ba62-0af6-24b83ea0e4e2%40apache.org%3E", "url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202005.mbox/%3Ce3a0a517-bf82-ba62-0af6-24b83ea0e4e2%40apache.org%3E" }, { "category": "external", "summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M5", "url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.0-M5" }, { "category": "external", "summary": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.104", "url": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.104" }, { "category": "external", "summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.55", "url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.55" }, { "category": "external", "summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.35", "url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.35" } ], "release_date": "2020-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" }, { "category": "workaround", "details": "Users may configure the PersistenceManager with an appropriate value for sessionAttributeValueClassNameFilter to ensure that only application provided attributes are serialized and deserialized. For more details about the configuration, refer to the Apache Tomcat 9 Configuration Reference https://tomcat.apache.org/tomcat-9.0-doc/config/manager.html.", "product_ids": [ "Red Hat Fuse 7.11" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "tomcat: deserialization flaw in session persistence storage leading to RCE" }, { "cve": "CVE-2020-15250", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1887810" } ], "notes": [ { "category": "description", "text": "In JUnit4 from version 4.7 and before 4.13.1, the test rule TemporaryFolder contains a local information disclosure vulnerability. On Unix like systems, the system\u0027s temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. This vulnerability impacts you if the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder, and the JUnit tests execute in an environment where the OS has other untrusted users. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. For Java 1.7 and higher users: this vulnerability is fixed in 4.13.1. For Java 1.6 and lower users: no patch is available, you must use the workaround below. If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability. For more information, including an example of vulnerable code, see the referenced GitHub Security Advisory.", "title": "Vulnerability description" }, { "category": "summary", "text": "junit4: TemporaryFolder is shared between all users across system which could result in information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15250" }, { "category": "external", "summary": "RHBZ#1887810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887810" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15250", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15250" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15250", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15250" }, { "category": "external", "summary": "https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp", "url": "https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp" } ], "release_date": "2020-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "junit4: TemporaryFolder is shared between all users across system which could result in information disclosure" }, { "cve": "CVE-2020-25689", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2020-10-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1893070" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in WildFly in all versions up to 21.0.0.Final, where the host-controller tries to reconnect in a loop, generating new connections that are not properly closed while unable to connect to the domain controller. This flaw allows an attacker to cause an Out of memory (OOM) issue, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-25689" }, { "category": "external", "summary": "RHBZ#1893070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1893070" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-25689", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25689" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25689", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25689" } ], "release_date": "2020-10-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller" }, { "cve": "CVE-2020-29582", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "discovery_date": "2021-02-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930291" } ], "notes": [ { "category": "description", "text": "In JetBrains Kotlin before 1.4.21, a vulnerable Java API was used for temporary file and folder creation. An attacker was able to read data from such files and list directories due to insecure permissions.", "title": "Vulnerability description" }, { "category": "summary", "text": "kotlin: vulnerable Java API was used for temporary file and folder creation which could result in information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat CodeReady Studio 12 is not affected by this vulnerability because It ships kotlin-stdlib. The vulnerable component is not in kotlin-stdlib.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29582" }, { "category": "external", "summary": "RHBZ#1930291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29582", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29582" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29582", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29582" }, { "category": "external", "summary": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/", "url": "https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/" } ], "release_date": "2021-02-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kotlin: vulnerable Java API was used for temporary file and folder creation which could result in information disclosure" }, { "cve": "CVE-2020-36518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064698" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Jackson Databind package. This cause of the issue is due to a Java StackOverflow exception and a denial of service via a significant depth of nested objects.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: denial of service via a large depth of nested objects", "title": "Vulnerability summary" }, { "category": "other", "text": "CodeReady Studio is no longer supported and therefore this flaw will not be addressed in CodeReady Studio.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36518" }, { "category": "external", "summary": "RHBZ#2064698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064698" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36518", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36518" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-57j2-w4cx-62h2", "url": "https://github.com/advisories/GHSA-57j2-w4cx-62h2" } ], "release_date": "2020-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: denial of service via a large depth of nested objects" }, { "cve": "CVE-2021-2471", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-11-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2020583" } ], "notes": [ { "category": "description", "text": "MySQL Connector/J has no security check when external general entities are included in XML sources, consequently, there exists an XML External Entity(XXE) vulnerability. A successful attack can access critical data and gain full control/access to all MySQL Connectors\u0027 accessible data without any authorization.", "title": "Vulnerability description" }, { "category": "summary", "text": "mysql-connector-java: unauthorized access to critical", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), the Presto component is part of the OCP Metering stack and it ships the vulnerable version of the MySQL Connector/J package. Since the release of OCP 4.6, the Metering product has been deprecated and is removed from OCP starting from 4.9 version [1], hence the affected component is marked as wontfix.\n\n[1] https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html#ocp-4-9-deprecated-removed-features", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-2471" }, { "category": "external", "summary": "RHBZ#2020583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020583" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-2471", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-2471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-2471" }, { "category": "external", "summary": "https://www.oracle.com/security-alerts/cpuoct2021.html", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "release_date": "2021-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "mysql-connector-java: unauthorized access to critical" }, { "cve": "CVE-2021-3629", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1977362" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3629" }, { "category": "external", "summary": "RHBZ#1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3629", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS" }, { "cve": "CVE-2021-3642", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "discovery_date": "2021-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981407" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Elytron where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-elytron: possible timing attack in ScramServer", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3642" }, { "category": "external", "summary": "RHBZ#1981407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981407" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3642", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3642" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3642", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3642" } ], "release_date": "2021-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-elytron: possible timing attack in ScramServer" }, { "acknowledgments": [ { "names": [ "Darran Lofthouse" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2021-3644", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-02-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1976052" } ], "notes": [ { "category": "description", "text": "A flaw was found in wildfly-core in all versions. If a vault expression is in the form of a single attribute that contains multiple expressions, a user who was granted access to the management interface can potentially access a vault expression they should not be able to access and possibly retrieve the item which was stored in the vault. The highest threat from this vulnerability is data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-core: Invalid Sensitivity Classification of Vault Expression", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat CodeReady Studio 12 is not affected by this flaw as it does not ship the vulnerable component of wildfly.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3644" }, { "category": "external", "summary": "RHBZ#1976052", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976052" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3644", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3644" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3644", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3644" } ], "release_date": "2021-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "wildfly-core: Invalid Sensitivity Classification of Vault Expression" }, { "cve": "CVE-2021-3807", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2007557" } ], "notes": [ { "category": "description", "text": "A regular expression denial of service (ReDoS) vulnerability was found in nodejs-ansi-regex. This could possibly cause an application using ansi-regex to use an excessive amount of CPU time when matching crafted ANSI escape codes.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw requires crafted invalid ANSI escape codes in order to be exploited and only allows for denial of service of applications on the client side, hence the impact has been rated as Moderate.\n\nIn Red Hat Virtualization and Red Hat Quay some components use a vulnerable version of ansi-regex. However, all frontend code is executed on the client side. As the maximum impact of this vulnerability is denial of service in the client, the vulnerability is rated Moderate for those products.\n\nOpenShift Container Platform 4 (OCP) ships affected version of ansi-regex in the ose-metering-hadoop container, however the metering operator is deprecated since 4.6[1]. This issue is not currently planned to be addressed in future updates and hence hadoop container has been marked as \u0027will not fix\u0027.\n\nAdvanced Cluster Management for Kubernetes (RHACM) ships the affected version of ansi-regex in several containers, however the impact of this vulnerability is deemed low as it would result in an authenticated slowing down their own user interface. \n\n[1] https://docs.openshift.com/container-platform/4.6/metering/metering-about-metering.html", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3807" }, { "category": "external", "summary": "RHBZ#2007557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007557" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3807", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3807" }, { "category": "external", "summary": "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994", "url": "https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994" } ], "release_date": "2021-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-ansi-regex: Regular expression denial of service (ReDoS) matching ANSI escape codes" }, { "cve": "CVE-2021-3859", "cwe": { "id": "CWE-214", "name": "Invocation of Process Using Visible Sensitive Information" }, "discovery_date": "2021-09-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2010378" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow that tripped the client-side invocation timeout with certain calls made over HTTP2. This flaw allows an attacker to carry out denial of service attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: client side invocation timeout raised when calling over HTTP2", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3859" }, { "category": "external", "summary": "RHBZ#2010378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010378" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3859", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3859" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3859", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3859" } ], "release_date": "2022-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: client side invocation timeout raised when calling over HTTP2" }, { "acknowledgments": [ { "names": [ "Jordy Versmissen" ] } ], "cve": "CVE-2021-4178", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-12-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034388" } ], "notes": [ { "category": "description", "text": "A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes-client: Insecure deserialization in unmarshalYaml method", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat CodeReady Studio 12 is not affected by this flaw because it does not ship a vulnerable version of kubernetes-client; the version that it ships does not use SnakeYAML.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4178" }, { "category": "external", "summary": "RHBZ#2034388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4178", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4178" } ], "release_date": "2022-01-05T15:05:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes-client: Insecure deserialization in unmarshalYaml method" }, { "cve": "CVE-2021-22060", "discovery_date": "2022-01-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2055480" } ], "notes": [ { "category": "description", "text": "In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Framework codebase.", "title": "Vulnerability description" }, { "category": "summary", "text": "springframework: Additional Log Injection in Spring Framework (follow-up to CVE-2021-22096)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22060" }, { "category": "external", "summary": "RHBZ#2055480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2055480" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22060", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22060" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22060", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22060" } ], "release_date": "2022-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "springframework: Additional Log Injection in Spring Framework (follow-up to CVE-2021-22096)" }, { "cve": "CVE-2021-22096", "discovery_date": "2021-12-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034584" } ], "notes": [ { "category": "description", "text": "In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.", "title": "Vulnerability description" }, { "category": "summary", "text": "springframework: malicious input leads to insertion of additional log entries", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22096" }, { "category": "external", "summary": "RHBZ#2034584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034584" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22096", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22096" } ], "release_date": "2021-10-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "springframework: malicious input leads to insertion of additional log entries" }, { "cve": "CVE-2021-22119", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1977064" } ], "notes": [ { "category": "description", "text": "Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions.", "title": "Vulnerability description" }, { "category": "summary", "text": "spring-security: Denial-of-Service (DoS) attack via initiation of Authorization Request", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22119" }, { "category": "external", "summary": "RHBZ#1977064", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977064" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22119", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22119" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22119", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22119" } ], "release_date": "2021-06-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spring-security: Denial-of-Service (DoS) attack via initiation of Authorization Request" }, { "cve": "CVE-2021-22569", "cwe": { "id": "CWE-696", "name": "Incorrect Behavior Order" }, "discovery_date": "2022-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2039903" } ], "notes": [ { "category": "description", "text": "A flaw was found in protobuf-java. Google Protocol Buffer (protobuf-java) allows the interleaving of com.google.protobuf.UnknownFieldSet fields. By persuading a victim to open specially-crafted content, a remote attacker could cause a timeout in the ProtobufFuzzer function, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "protobuf-java: potential DoS in the parsing procedure for binary data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22569" }, { "category": "external", "summary": "RHBZ#2039903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22569", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22569" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22569", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22569" }, { "category": "external", "summary": "https://github.com/protocolbuffers/protobuf/commit/b3093dce58bc9d3042f085666d83c8ef1f51fe7b", "url": "https://github.com/protocolbuffers/protobuf/commit/b3093dce58bc9d3042f085666d83c8ef1f51fe7b" }, { "category": "external", "summary": "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67", "url": "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67" } ], "release_date": "2022-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "protobuf-java: potential DoS in the parsing procedure for binary data" }, { "cve": "CVE-2021-22573", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "discovery_date": "2022-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2081879" } ], "notes": [ { "category": "description", "text": "A flaw was found in Google OAuth Java client\u0027s IDToken verifier, where it does not verify if the token is properly signed. This issue could allow an attacker to provide a compromised token with a custom payload that will pass the validation on the client side, allowing access to information outside of their prescribed permissions.", "title": "Vulnerability description" }, { "category": "summary", "text": "google-oauth-client: Token signature not verified", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22573" }, { "category": "external", "summary": "RHBZ#2081879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081879" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22573", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22573" }, { "category": "external", "summary": "https://github.com/googleapis/google-oauth-java-client/pull/872", "url": "https://github.com/googleapis/google-oauth-java-client/pull/872" } ], "release_date": "2022-05-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "google-oauth-client: Token signature not verified" }, { "cve": "CVE-2021-24122", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1917209" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. When serving resources from a network location using the NTFS file system, it was possible to bypass security constraints and view the source code for JSPs in some configurations. The root cause was the unexpected behavior of the JRE API File.getCanonicalPath(), which was caused by the inconsistent behavior of the Windows API (FindFirstFileW) in some circumstances. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Information disclosure when using NTFS file system", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat OpenStack Platform\u0027s OpenDaylight, tomcat is disabled by default. Further, ODL deployments are not supported on untrusted administrator networks; even if tomcat is enabled, if random users can access it, this would be in an unsupported configuration. For this reason, the RHOSP impact has been reduced and no update will be provided at this time for the ODL tomcat package.\n\nThis flaw does not affect tomcat or pki-servlet-engine as shipped with Red Hat Enterprise Linux 6, 7, or 8 because the functionality involving FindFirstFileW() is specific to the Windows native code. Additionally, RHEL is not shipped with NTFS support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-24122" }, { "category": "external", "summary": "RHBZ#1917209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1917209" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-24122", "url": "https://www.cve.org/CVERecord?id=CVE-2021-24122" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-24122", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-24122" }, { "category": "external", "summary": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202101.mbox/%3Cf3765f21-969d-7f21-e34a-efc106175373%40apache.org%3E", "url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202101.mbox/%3Cf3765f21-969d-7f21-e34a-efc106175373%40apache.org%3E" }, { "category": "external", "summary": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.107", "url": "http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.107" }, { "category": "external", "summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60", "url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.60" }, { "category": "external", "summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40", "url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.40" } ], "release_date": "2021-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Information disclosure when using NTFS file system" }, { "cve": "CVE-2021-25122", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1934032" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. When responding to new h2c connection requests, Apache Tomcat could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A\u0027s request. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Request mix-up with h2c", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 8\u0027s Identity Management and Certificate System are using a vulnerable version of Tomcat that is bundled into the `pki-servlet-engine` component. However, HTTP/2 is not enabled in such a configuration, and it is not possible to trigger the flaw in a supported setup. A future update may fix the code. Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7 are not affected by this flaw because HTTP/2 is not supported in the shipped version of tomcat in those packages.\n\nRed Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Important and Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-25122" }, { "category": "external", "summary": "RHBZ#1934032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934032" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-25122", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25122" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-25122", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25122" }, { "category": "external", "summary": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202103.mbox/%3Cb7626398-5e6d-1639-4e9e-e41b34af84de%40apache.org%3E", "url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202103.mbox/%3Cb7626398-5e6d-1639-4e9e-e41b34af84de%40apache.org%3E" }, { "category": "external", "summary": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.2", "url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.2" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.63", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.63" }, { "category": "external", "summary": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.43", "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.43" } ], "release_date": "2021-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Request mix-up with h2c" }, { "cve": "CVE-2021-25329", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1934061" } ], "notes": [ { "category": "description", "text": "The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Incomplete fix for CVE-2020-9484 (RCE via session persistence)", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Enterprise Linux 8, Red Hat Certificate System 10 and Identity Management are using the `pki-servlet-engine` component, which embeds a vulnerable version of Tomcat. However, in these specific contexts, the prerequisites to the vulnerability are not met. The PersistentManager is not set, and a SecurityManager is used. The use of `pki-servlet-engine` outside of these contexts is not supported. As a result, the vulnerability can not be triggered in supported configurations of these products.\n\nRed Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Important and Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-25329" }, { "category": "external", "summary": "RHBZ#1934061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934061" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-25329", "url": "https://www.cve.org/CVERecord?id=CVE-2021-25329" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-25329", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25329" }, { "category": "external", "summary": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202103.mbox/%3C811bba77-e74e-9f9b-62ca-5253a09ba84f%40apache.org%3E", "url": "http://mail-archives.apache.org/mod_mbox/tomcat-announce/202103.mbox/%3C811bba77-e74e-9f9b-62ca-5253a09ba84f%40apache.org%3E" }, { "category": "external", "summary": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.2", "url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.2" }, { "category": "external", "summary": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.108", "url": "https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.108" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.63", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.63" }, { "category": "external", "summary": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.43", "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.43" } ], "release_date": "2021-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" }, { "category": "workaround", "details": "Users may configure the PersistenceManager with an appropriate value for sessionAttributeValueClassNameFilter to ensure that only application provided attributes are serialized and deserialized. For more details about the configuration, refer to the Apache Tomcat 9 Configuration Reference https://tomcat.apache.org/tomcat-9.0-doc/config/manager.html.", "product_ids": [ "Red Hat Fuse 7.11" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Incomplete fix for CVE-2020-9484 (RCE via session persistence)" }, { "cve": "CVE-2021-29505", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966735" } ], "notes": [ { "category": "description", "text": "A flaw was found in XStream. By manipulating the processed input stream, a remote attacker may be able to obtain sufficient rights to execute commands. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "XStream: remote command execution attack by manipulating the processed input stream", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) delivers Jenkins LTS package with bundled XStream library. Due to JEP-200 [1] and JEP-228 [2] Jenkins projects, OCP Jenkins package is not affected by this flaw.\n\nCodeReady Studio 12 ships a version of xstream that is affected by this flaw as a transitive dependency for the Wise framework plugin. However, the vulnerable code is not called, so this flaw has been marked as Low severity for CodeReady Studio 12.\n\n[1] https://github.com/jenkinsci/jep/blob/master/jep/200/README.adoc\n[2] https://github.com/jenkinsci/jep/blob/master/jep/228/README.adoc#security", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29505" }, { "category": "external", "summary": "RHBZ#1966735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966735" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29505", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29505" }, { "category": "external", "summary": "https://github.com/x-stream/xstream/security/advisories/GHSA-7chv-rrw6-w6fc", "url": "https://github.com/x-stream/xstream/security/advisories/GHSA-7chv-rrw6-w6fc" }, { "category": "external", "summary": "https://x-stream.github.io/CVE-2021-29505.html", "url": "https://x-stream.github.io/CVE-2021-29505.html" } ], "release_date": "2021-05-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" }, { "category": "workaround", "details": "Depending on the version of XStream used there are various usage patterns that mitigate this flaw, though we would strongly recommend using the allow list approach if at all possible as there are likely more class combinations the deny list approach may not address.\n\nAllow list approach\n```java\nXStream xstream = new XStream();\nXStream.setupDefaultSecurity(xstream);\nxstream.allowTypesByWildcard(new String[] {\"com.misc.classname\"})\n```\nDeny list for XStream 1.4.16 (this should also address some previous flaws found in 1.4.7 - \u003e 1.4.15) \n```java\nxstream.denyTypesByRegExp(new String[]{ \".*\\\\.Lazy(?:Search)?Enumeration.*\", \"(?:java|sun)\\\\.rmi\\\\..*\" });\n```\n\nDeny list for XStream 1.4.15\n```java\nxstream.denyTypes(new String[]{ \"sun.awt.datatransfer.DataTransferer$IndexOrderComparator\", \"sun.swing.SwingLazyValue\", \"com.sun.corba.se.impl.activation.ServerTableEntry\", \"com.sun.tools.javac.processing.JavacProcessingEnvironment$NameProcessIterator\" });\nxstream.denyTypesByRegExp(new String[]{ \".*\\\\$ServiceNameIterator\", \"javafx\\\\.collections\\\\.ObservableList\\\\$.*\", \".*\\\\.bcel\\\\..*\\\\.util\\\\.ClassLoader\" });\nxstream.denyTypeHierarchy(java.io.InputStream.class );\nxstream.denyTypeHierarchy(java.nio.channels.Channel.class );\nxstream.denyTypeHierarchy(javax.activation.DataSource.class );\nxstream.denyTypeHierarchy(javax.sql.rowset.BaseRowSet.class );\n```\n\nDeny list for XStream 1.4.13\n```java\nxstream.denyTypes(new String[]{ \"javax.imageio.ImageIO$ContainsFilter\" });\nxstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class });\n```\n\nDeny list for XStream 1.4.7 -\u003e 1.4.12\n```java\nxstream.denyTypes(new String[]{ \"javax.imageio.ImageIO$ContainsFilter\" });\nxstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class });\n```\n\nDeny list for versions prior to XStream 1.4.7\n```java\nxstream.registerConverter(new Converter() {\n public boolean canConvert(Class type) {\n return type != null \u0026\u0026 (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class || type == java.lang.Void.class || void.class || type.getName().equals(\"javax.imageio.ImageIO$ContainsFilter\") || Proxy.isProxy(type));\n }\n\n public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) {\n throw new ConversionException(\"Unsupported type due to security reasons.\");\n }\n\n public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) {\n throw new ConversionException(\"Unsupported type due to security reasons.\");\n }\n}, XStream.PRIORITY_LOW);\n```", "product_ids": [ "Red Hat Fuse 7.11" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "XStream: remote command execution attack by manipulating the processed input stream" }, { "cve": "CVE-2021-30640", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981544" } ], "notes": [ { "category": "description", "text": "A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: JNDI realm authentication weakness", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30640" }, { "category": "external", "summary": "RHBZ#1981544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981544" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30640", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30640" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30640", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30640" } ], "release_date": "2021-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: JNDI realm authentication weakness" }, { "cve": "CVE-2021-33037", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2021-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981533" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: HTTP request smuggling when used with a reverse proxy", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33037" }, { "category": "external", "summary": "RHBZ#1981533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981533" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33037", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33037" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33037", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33037" } ], "release_date": "2021-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: HTTP request smuggling when used with a reverse proxy" }, { "cve": "CVE-2021-33813", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2021-06-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1973413" } ], "notes": [ { "category": "description", "text": "An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a crafted HTTP request.", "title": "Vulnerability description" }, { "category": "summary", "text": "jdom: XXE allows attackers to cause a DoS via a crafted HTTP request", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), the hive and hadoop components that comprise the OCP metering stack, ship the vulnerable version of jdom.\nSince the release of OCP 4.6, the metering product has been deprecated [1], hence the affected components are marked as wontfix.\nThis may be fixed in the future.\n\nThis flaw is out of support scope for Red Hat Enterprise Linux 6 and 7. Please see the following page for more information on Red Hat Enterprise Linux support scopes: https://access.redhat.com/support/policy/updates/errata/ .\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33813" }, { "category": "external", "summary": "RHBZ#1973413", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1973413" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33813", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33813" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33813", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33813" } ], "release_date": "2021-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jdom: XXE allows attackers to cause a DoS via a crafted HTTP request" }, { "cve": "CVE-2021-35515", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2021-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981895" } ], "notes": [ { "category": "description", "text": "A flaw was found in apache-commons-compress. When reading a specially crafted 7Z archive, the construction of the list of codecs that decompress an entry can result in an infinite loop. This flaw allows the mounting of a denial of service attack against services that use Compress\u0027 SevenZ package. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-compress: infinite loop when reading a specially crafted 7Z archive", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-35515" }, { "category": "external", "summary": "RHBZ#1981895", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981895" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-35515", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35515" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-35515", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35515" }, { "category": "external", "summary": "http://www.openwall.com/lists/oss-security/2021/07/13/1", "url": "http://www.openwall.com/lists/oss-security/2021/07/13/1" }, { "category": "external", "summary": "https://commons.apache.org/proper/commons-compress/security-reports.html", "url": "https://commons.apache.org/proper/commons-compress/security-reports.html" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r19ebfd71770ec0617a9ea180e321ef927b3fefb4c81ec5d1902d20ab%40%3Cuser.commons.apache.org%3E", "url": "https://lists.apache.org/thread.html/r19ebfd71770ec0617a9ea180e321ef927b3fefb4c81ec5d1902d20ab%40%3Cuser.commons.apache.org%3E" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-compress: infinite loop when reading a specially crafted 7Z archive" }, { "cve": "CVE-2021-35516", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2021-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981900" } ], "notes": [ { "category": "description", "text": "A flaw was found in apache-commons-compress. When reading a specially crafted 7Z archive, Compress can allocate large amounts of memory that leads to an out-of-memory error for very small inputs. This flaw allows the mounting of a denial of service attack against services that use Compress\u0027 SevenZ package. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-35516" }, { "category": "external", "summary": "RHBZ#1981900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-35516", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35516" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-35516", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35516" }, { "category": "external", "summary": "http://www.openwall.com/lists/oss-security/2021/07/13/2", "url": "http://www.openwall.com/lists/oss-security/2021/07/13/2" }, { "category": "external", "summary": "https://commons.apache.org/proper/commons-compress/security-reports.html", "url": "https://commons.apache.org/proper/commons-compress/security-reports.html" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/rf68442d67eb166f4b6cf0bbbe6c7f99098c12954f37332073c9822ca%40%3Cuser.commons.apache.org%3E", "url": "https://lists.apache.org/thread.html/rf68442d67eb166f4b6cf0bbbe6c7f99098c12954f37332073c9822ca%40%3Cuser.commons.apache.org%3E" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-compress: excessive memory allocation when reading a specially crafted 7Z archive" }, { "cve": "CVE-2021-35517", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2021-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981903" } ], "notes": [ { "category": "description", "text": "A flaw was found in apache-commons-compress. When reading a specially crafted TAR archive, Compress can allocate large amounts of memory that leads to an out-of-memory error for small inputs. This flaw allows the mounting of a denial of service attack against services that use Compress\u0027 TAR package. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-35517" }, { "category": "external", "summary": "RHBZ#1981903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-35517", "url": "https://www.cve.org/CVERecord?id=CVE-2021-35517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-35517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35517" }, { "category": "external", "summary": "http://www.openwall.com/lists/oss-security/2021/07/13/3", "url": "http://www.openwall.com/lists/oss-security/2021/07/13/3" }, { "category": "external", "summary": "https://commons.apache.org/proper/commons-compress/security-reports.html", "url": "https://commons.apache.org/proper/commons-compress/security-reports.html" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r605d906b710b95f1bbe0036a53ac6968f667f2c249b6fbabada9a940%40%3Cuser.commons.apache.org%3E", "url": "https://lists.apache.org/thread.html/r605d906b710b95f1bbe0036a53ac6968f667f2c249b6fbabada9a940%40%3Cuser.commons.apache.org%3E" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-compress: excessive memory allocation when reading a specially crafted TAR archive" }, { "cve": "CVE-2021-36090", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2021-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981909" } ], "notes": [ { "category": "description", "text": "A flaw was found in apache-commons-compress. When reading a specially crafted ZIP archive, Compress can allocate large amounts of memory that leads to an out-of-memory error for small inputs. This flaw allows the mounting of a denial of service attack against services that use Compress\u0027 zip package. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-36090" }, { "category": "external", "summary": "RHBZ#1981909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981909" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-36090", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36090" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-36090", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36090" }, { "category": "external", "summary": "http://www.openwall.com/lists/oss-security/2021/07/13/4", "url": "http://www.openwall.com/lists/oss-security/2021/07/13/4" }, { "category": "external", "summary": "https://commons.apache.org/proper/commons-compress/security-reports.html", "url": "https://commons.apache.org/proper/commons-compress/security-reports.html" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/rc4134026d7d7b053d4f9f2205531122732405012c8804fd850a9b26f%40%3Cuser.commons.apache.org%3E", "url": "https://lists.apache.org/thread.html/rc4134026d7d7b053d4f9f2205531122732405012c8804fd850a9b26f%40%3Cuser.commons.apache.org%3E" } ], "release_date": "2021-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "apache-commons-compress: excessive memory allocation when reading a specially crafted ZIP archive" }, { "cve": "CVE-2021-38153", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2021-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2009041" } ], "notes": [ { "category": "description", "text": "Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-38153" }, { "category": "external", "summary": "RHBZ#2009041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009041" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-38153", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38153" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38153", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38153" } ], "release_date": "2021-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients" }, { "cve": "CVE-2021-40690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011190" } ], "notes": [ { "category": "description", "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: XPath Transform abuse allows for information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Since OpenShift Container Platform (OCP) 4.7, the logging-elasticsearch6-container is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-40690" }, { "category": "external", "summary": "RHBZ#2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" } ], "release_date": "2021-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: XPath Transform abuse allows for information disclosure" }, { "cve": "CVE-2021-41079", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2004820" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Tomcat. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet can trigger an infinite loop, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: Infinite loop while reading an unexpected TLS packet when using OpenSSL JSSE engine", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Certificate System versions 9 and older, the version of Tomcat used is not affected by this flaw.\nIn Red Hat Certificate System 10, Tomcat is affected by this flaw. However, Tomcat is configured so that it does not use OpenSSLEngine, but the Dogtag JSS SSL implementation. As a result, the flaw can not be reached.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-41079" }, { "category": "external", "summary": "RHBZ#2004820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004820" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-41079", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41079" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/rccdef0349fdf4fb73a4e4403095446d7fe6264e0a58e2df5c6799434%40%3Cannounce.tomcat.apache.org%3E", "url": "https://lists.apache.org/thread.html/rccdef0349fdf4fb73a4e4403095446d7fe6264e0a58e2df5c6799434%40%3Cannounce.tomcat.apache.org%3E" }, { "category": "external", "summary": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.4", "url": "https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.4" }, { "category": "external", "summary": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.64", "url": "https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.64" }, { "category": "external", "summary": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.44", "url": "https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.44" } ], "release_date": "2021-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: Infinite loop while reading an unexpected TLS packet when using OpenSSL JSSE engine" }, { "cve": "CVE-2021-41766", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-01-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2046282" } ], "notes": [ { "category": "description", "text": "A flaw was found in Apache Karaf. This issue allows monitoring of applications and the Java runtime by using the Java Management Extensions (JMX).", "title": "Vulnerability description" }, { "category": "summary", "text": "karaf: insecure java deserialization", "title": "Vulnerability summary" }, { "category": "other", "text": "The default JMX implementation is hardened against unauthenticated deserialization attacks. The implementation used by Apache Karaf is not protected against this kind of attack. The impact of Java deserialization vulnerabilities strongly depends on the classes available within the target\u0027s classpath. Generally speaking, deserialization of untrusted data does represent a high-security risk and should be prevented. In this case, it\u0027s limited to classes system scoped classes.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-41766" }, { "category": "external", "summary": "RHBZ#2046282", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046282" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-41766", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41766" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41766", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41766" } ], "release_date": "2022-01-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "karaf: insecure java deserialization" }, { "cve": "CVE-2021-42340", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2021-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2014356" } ], "notes": [ { "category": "description", "text": "A memory leak flaw was found in Apache Tomcat, where an HTTP upgrade connection does not release for WebSocket connections once the WebSocket connection is closed. If a sufficient number of such requests are made, an OutOfMemoryError occurs, leading to a denial of service. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Within Red Hat OpenStack Platform, Tomcat is provided as a component of OpenDaylight. This flaw will not receive a fix as OpenDaylight was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.\n\nRed Hat Satellite does not include the affected Apache Tomcat, however, Tomcat is shipped with Red Hat Enterprise Linux and consumed by the Candlepin component of Satellite. Red Hat Satellite users are therefore advised to check the impact state of Red Hat Enterprise Linux, since any necessary fixes will be distributed through the platform.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-42340" }, { "category": "external", "summary": "RHBZ#2014356", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014356" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-42340", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42340" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42340", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42340" }, { "category": "external", "summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.12", "url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.12" }, { "category": "external", "summary": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.0-M6", "url": "http://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.0-M6" }, { "category": "external", "summary": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.72", "url": "http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.72" }, { "category": "external", "summary": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.54", "url": "http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.54" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E", "url": "https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E" } ], "release_date": "2021-10-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS" }, { "cve": "CVE-2021-42550", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-12-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2033560" } ], "notes": [ { "category": "description", "text": "A flaw was found in the logback package. When using a specially-crafted configuration, this issue could allow a remote authenticated attacker to execute arbitrary code loaded from LDAP servers.", "title": "Vulnerability description" }, { "category": "summary", "text": "logback: remote code execution through JNDI call from within its configuration file", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Satellite shipped affected versions, however, it is not vulnerable because the product doesn\u0027t meet the conditions needed to perform the attack.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-42550" }, { "category": "external", "summary": "RHBZ#2033560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033560" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-42550", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42550" }, { "category": "external", "summary": "http://logback.qos.ch/news.html", "url": "http://logback.qos.ch/news.html" }, { "category": "external", "summary": "https://cve.report/CVE-2021-42550", "url": "https://cve.report/CVE-2021-42550" }, { "category": "external", "summary": "https://jira.qos.ch/browse/LOGBACK-1591", "url": "https://jira.qos.ch/browse/LOGBACK-1591" } ], "release_date": "2021-12-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "logback: remote code execution through JNDI call from within its configuration file" }, { "cve": "CVE-2021-43797", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2021-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2031958" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty, specifically in the netty-codec-http package. This flaw allows unauthorized control characters at the beginning and end of a request, does not follow the specification, and can cause HTTP request smuggling.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty: control chars in header names may lead to HTTP request smuggling", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of netty-codec-http package.\nSince the release of OCP 4.6, the Metering product has been deprecated, hence the affected components are marked as wontfix.\nThe openshift4/ose-logging-elasticsearch6 container is marked as Out of support scope because since the release of OCP 4.7 the logging functionality is delivered as an OpenShift Logging product and OCP 4.6 is already in the Maintenance Support phase.\nA fix was introduced in netty-codec-http version 4.1.72.Final.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43797" }, { "category": "external", "summary": "RHBZ#2031958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43797", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43797" }, { "category": "external", "summary": "https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq", "url": "https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq" } ], "release_date": "2021-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "netty: control chars in header names may lead to HTTP request smuggling" }, { "cve": "CVE-2021-43859", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2049783" } ], "notes": [ { "category": "description", "text": "XStream is an open source java library to serialize objects to XML and back again. Versions prior to 1.4.19 may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. XStream 1.4.19 monitors and accumulates the time it takes to add elements to collections and throws an exception if a set threshold is exceeded. Users are advised to upgrade as soon as possible. Users unable to upgrade may set the NO_REFERENCE mode to prevent recursion. See GHSA-rmr5-cpv2-vgjf for further details on a workaround if an upgrade is not possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "xstream: Injecting highly recursive collections or maps can cause a DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security has rated this issue as having Moderate security impact and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43859" }, { "category": "external", "summary": "RHBZ#2049783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43859", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43859" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43859", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43859" } ], "release_date": "2022-01-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xstream: Injecting highly recursive collections or maps can cause a DoS" }, { "cve": "CVE-2022-0084", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064226" } ], "notes": [ { "category": "description", "text": "A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a message to another expected end. This flaw allows an attacker to send flawed requests to a server, possibly causing log contention-related performance concerns or an unwanted disk fill-up.", "title": "Vulnerability description" }, { "category": "summary", "text": "xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr", "title": "Vulnerability summary" }, { "category": "other", "text": "Although the CVSS stands for 7.5 score, the impact remains Moderate as it demands previous knowledge of the environment to trigger the Denial of Service (DoS)", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0084" }, { "category": "external", "summary": "RHBZ#2064226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064226" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0084", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0084" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0084", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0084" } ], "release_date": "2022-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr" }, { "cve": "CVE-2022-1259", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2072339" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow. A potential security issue in flow control handling by the browser over HTTP/2 may cause overhead or a denial of service in the server.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629)", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw occurs because of an incomplete fix for CVE-2021-3629.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1259" }, { "category": "external", "summary": "RHBZ#2072339", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072339" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1259", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1259" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1259", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1259" } ], "release_date": "2022-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629)" }, { "cve": "CVE-2022-1319", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073890" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: Double AJP response for 400 from EAP 7 results in CPING failures", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1319" }, { "category": "external", "summary": "RHBZ#2073890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1319", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1319" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1319", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1319" } ], "release_date": "2022-04-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: Double AJP response for 400 from EAP 7 results in CPING failures" }, { "cve": "CVE-2022-21363", "cwe": { "id": "CWE-280", "name": "Improper Handling of Insufficient Permissions or Privileges " }, "discovery_date": "2022-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2047343" } ], "notes": [ { "category": "description", "text": "Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability description" }, { "category": "summary", "text": "mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21363" }, { "category": "external", "summary": "RHBZ#2047343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047343" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21363", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21363" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21363", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21363" }, { "category": "external", "summary": "https://www.oracle.com/security-alerts/cpujan2022.html#AppendixMSQL", "url": "https://www.oracle.com/security-alerts/cpujan2022.html#AppendixMSQL" } ], "release_date": "2022-01-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors" }, { "cve": "CVE-2022-21724", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "discovery_date": "2022-02-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2050863" } ], "notes": [ { "category": "description", "text": "pgjdbc is the offical PostgreSQL JDBC Driver. A security hole was found in the jdbc driver for postgresql database while doing security research. The system using the postgresql library will be attacked when attacker control the jdbc url or properties. pgjdbc instantiates plugin instances based on class names provided via `authenticationPluginClassName`, `sslhostnameverifier`, `socketFactory`, `sslfactory`, `sslpasswordcallback` connection properties. However, the driver did not verify if the class implements the expected interface before instantiating the class. This can lead to code execution loaded via arbitrary classes. Users using plugins are advised to upgrade. There are no known workarounds for this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes", "title": "Vulnerability summary" }, { "category": "other", "text": "According to the patch upstream the scoring of this issue has been severely reduced and is no longer considered an RCE. Therefore, the flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates of Red Hat Enterprise Linux 6, 7 and 8.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-21724" }, { "category": "external", "summary": "RHBZ#2050863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2050863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-21724", "url": "https://www.cve.org/CVERecord?id=CVE-2022-21724" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-21724", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-21724" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-v7wg-cpwc-24m4", "url": "https://github.com/advisories/GHSA-v7wg-cpwc-24m4" } ], "release_date": "2022-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jdbc-postgresql: Unchecked Class Instantiation when providing Plugin Classes" }, { "cve": "CVE-2022-22932", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-01-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2046279" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Apache Karaf obr:* command, where a partial path traversal issue allows a break out of the expected folder. This entry is set by the user.", "title": "Vulnerability description" }, { "category": "summary", "text": "karaf: path traversal flaws", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22932" }, { "category": "external", "summary": "RHBZ#2046279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046279" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22932", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22932" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22932", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22932" } ], "release_date": "2022-01-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "karaf: path traversal flaws" }, { "cve": "CVE-2022-22950", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-03-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2069414" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Spring Framework. This flaw allows an attacker to craft a special Spring Expression, causing a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "spring-expression: Denial of service via specially crafted SpEL expression", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22950" }, { "category": "external", "summary": "RHBZ#2069414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069414" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22950", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22950" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22950", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22950" } ], "release_date": "2022-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "spring-expression: Denial of service via specially crafted SpEL expression" }, { "cve": "CVE-2022-22968", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2022-04-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2075441" } ], "notes": [ { "category": "description", "text": "In Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path.", "title": "Vulnerability description" }, { "category": "summary", "text": "Framework: Data Binding Rules Vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22968" }, { "category": "external", "summary": "RHBZ#2075441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22968", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22968" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22968", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22968" }, { "category": "external", "summary": "https://tanzu.vmware.com/security/cve-2022-22968", "url": "https://tanzu.vmware.com/security/cve-2022-22968" } ], "release_date": "2022-04-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Framework: Data Binding Rules Vulnerability" }, { "cve": "CVE-2022-22970", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2087272" } ], "notes": [ { "category": "description", "text": "A flaw was found in Spring Framework. Applications that handle file uploads are vulnerable to a denial of service (DoS) attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.", "title": "Vulnerability description" }, { "category": "summary", "text": "springframework: DoS via data binding to multipartFile or servlet part", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22970" }, { "category": "external", "summary": "RHBZ#2087272", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087272" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22970", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22970" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22970", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22970" }, { "category": "external", "summary": "https://tanzu.vmware.com/security/cve-2022-22970", "url": "https://tanzu.vmware.com/security/cve-2022-22970" } ], "release_date": "2022-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "springframework: DoS via data binding to multipartFile or servlet part" }, { "cve": "CVE-2022-22971", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2087274" } ], "notes": [ { "category": "description", "text": "A flaw was found in Spring Framework Applications. Applications that use STOMP over the WebSocket endpoint are vulnerable to a denial of service attack caused by an authenticated user.", "title": "Vulnerability description" }, { "category": "summary", "text": "springframework: DoS with STOMP over WebSocket", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22971" }, { "category": "external", "summary": "RHBZ#2087274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087274" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22971", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22971" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22971", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22971" }, { "category": "external", "summary": "https://tanzu.vmware.com/security/cve-2022-22971", "url": "https://tanzu.vmware.com/security/cve-2022-22971" } ], "release_date": "2022-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "springframework: DoS with STOMP over WebSocket" }, { "cve": "CVE-2022-22976", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-05-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2087214" } ], "notes": [ { "category": "description", "text": "A flaw was found in Spring Framework. The encoder does not perform any salt rounds when using the BCrypt class with the maximum work factor (31) due to an integer overflow error.", "title": "Vulnerability description" }, { "category": "summary", "text": "springframework: BCrypt skips salt rounds for work factor of 31", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22976" }, { "category": "external", "summary": "RHBZ#2087214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22976", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22976" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22976", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22976" }, { "category": "external", "summary": "https://tanzu.vmware.com/security/cve-2022-22976", "url": "https://tanzu.vmware.com/security/cve-2022-22976" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "springframework: BCrypt skips salt rounds for work factor of 31" }, { "cve": "CVE-2022-22978", "cwe": { "id": "CWE-1220", "name": "Insufficient Granularity of Access Control" }, "discovery_date": "2022-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2087606" } ], "notes": [ { "category": "description", "text": "A flaw was found in Spring Security. When using RegexRequestMatcher, an easy misconfiguration can bypass some servlet containers. Applications using RegexRequestMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.", "title": "Vulnerability description" }, { "category": "summary", "text": "springframework: Authorization Bypass in RegexRequestMatcher", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22978" }, { "category": "external", "summary": "RHBZ#2087606", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087606" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22978", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22978" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22978", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22978" }, { "category": "external", "summary": "https://tanzu.vmware.com/security/cve-2022-22978", "url": "https://tanzu.vmware.com/security/cve-2022-22978" } ], "release_date": "2022-05-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "springframework: Authorization Bypass in RegexRequestMatcher" }, { "acknowledgments": [ { "names": [ "Trung Pham" ], "organization": "Viettel Cyber Security", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2022-23181", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2022-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2047417" } ], "notes": [ { "category": "description", "text": "The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: local privilege escalation vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "In Red Hat Enterprise Linux 8, Red Hat Certificate System 10 and Identity Management are using the `pki-servlet-engine` component. This component embeds a version of Tomcat which is not affected by this flaw, as it does not include the fix for CVE-2020-9484. Additionally, in these specific contexts, the prerequisites to the vulnerability are not met. The PersistentManager is not set, and a SecurityManager is used. The use of `pki-servlet-engine` outside of these contexts is not supported.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23181" }, { "category": "external", "summary": "RHBZ#2047417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047417" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23181", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23181" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23181", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23181" }, { "category": "external", "summary": "https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9", "url": "https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9" } ], "release_date": "2022-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tomcat: local privilege escalation vulnerability" }, { "cve": "CVE-2022-23221", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-01-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044596" } ], "notes": [ { "category": "description", "text": "A flaw was found in the H2 Console. This flaw allows remote attackers to execute arbitrary code via a JDBC URL, concatenating with a substring that allows remote code execution by using a script.", "title": "Vulnerability description" }, { "category": "summary", "text": "h2: Loading of custom classes from remote servers through JNDI", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP) the openshift-enterprise-3.11/metrics-hawkular-metrics-container container image ships a vulnerable version of h2 as part of the underlying images, but as it uses standard configuration and Console is not enabled/started by default, therefore the impact by this vulnerability is LOW and will not be fixed as OCP 3.x has already reached End of Full Support.\n\n[1] https://access.redhat.com/support/policy/updates/openshift_noncurrent", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23221" }, { "category": "external", "summary": "RHBZ#2044596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23221", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23221" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23221", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23221" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-45hx-wfhj-473x", "url": "https://github.com/advisories/GHSA-45hx-wfhj-473x" } ], "release_date": "2022-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "h2: Loading of custom classes from remote servers through JNDI" }, { "cve": "CVE-2022-23596", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2022-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2049778" } ], "notes": [ { "category": "description", "text": "Junrar is an open source java RAR archive library. In affected versions A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. The problem is patched in 7.4.1. There are no known workarounds and users are advised to upgrade as soon as possible.", "title": "Vulnerability description" }, { "category": "summary", "text": "junrar: A carefully crafted RAR archive can trigger an infinite loop while extracting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23596" }, { "category": "external", "summary": "RHBZ#2049778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2049778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23596", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23596" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23596", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23596" } ], "release_date": "2022-01-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "junrar: A carefully crafted RAR archive can trigger an infinite loop while extracting" }, { "cve": "CVE-2022-23913", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-02-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2063601" } ], "notes": [ { "category": "description", "text": "In Apache ActiveMQ Artemis prior to 2.20.0 or 2.19.1, an attacker could partially disrupt availability (DoS) through uncontrolled resource consumption of memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "artemis-commons: Apache ActiveMQ Artemis DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-23913" }, { "category": "external", "summary": "RHBZ#2063601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063601" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23913", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23913" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23913", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23913" }, { "category": "external", "summary": "https://lists.apache.org/thread/fjynj57rd99s814rdn5hzvmx8lz403q2", "url": "https://lists.apache.org/thread/fjynj57rd99s814rdn5hzvmx8lz403q2" } ], "release_date": "2022-02-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "artemis-commons: Apache ActiveMQ Artemis DoS" }, { "cve": "CVE-2022-24614", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-02-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2058763" } ], "notes": [ { "category": "description", "text": "When reading a specially crafted JPEG file, metadata-extractor up to 2.16.0 can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use metadata-extractor library.", "title": "Vulnerability description" }, { "category": "summary", "text": "metadata-extractor: Out-of-memory when reading a specially crafted JPEG file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-24614" }, { "category": "external", "summary": "RHBZ#2058763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2058763" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24614", "url": "https://www.cve.org/CVERecord?id=CVE-2022-24614" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24614", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24614" } ], "release_date": "2022-02-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "metadata-extractor: Out-of-memory when reading a specially crafted JPEG file" }, { "cve": "CVE-2022-25845", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-06-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2100654" } ], "notes": [ { "category": "description", "text": "A flaw was found in com.alibaba:fastjson, a fast JSON parser/generator for Java. Affected versions of this package are vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions.", "title": "Vulnerability description" }, { "category": "summary", "text": "fastjson: autoType shutdown restriction bypass leads to deserialization", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25845" }, { "category": "external", "summary": "RHBZ#2100654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25845", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25845" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25845", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25845" }, { "category": "external", "summary": "https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-2859222", "url": "https://snyk.io/vuln/SNYK-JAVA-COMALIBABA-2859222" } ], "release_date": "2022-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" }, { "category": "workaround", "details": "Users who can not upgrade to the fixed version may enable safeMode; this completely disables the autoType function and eliminates the vulnerability risk. [https://github.com/alibaba/fastjson/wiki/fastjson_safemode]", "product_ids": [ "Red Hat Fuse 7.11" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "fastjson: autoType shutdown restriction bypass leads to deserialization" }, { "cve": "CVE-2022-26336", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2022-03-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2063292" } ], "notes": [ { "category": "description", "text": "A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supply them, then a carefully crafted file can cause an Out of Memory exception. This issue affects poi-scratchpad version 5.2.0 and prior versions. Users are recommended to upgrade to poi-scratchpad 5.2.1.", "title": "Vulnerability description" }, { "category": "summary", "text": "poi-scratchpad: A carefully crafted TNEF file can cause an out of memory exception", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26336" }, { "category": "external", "summary": "RHBZ#2063292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063292" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26336", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26336" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26336", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26336" } ], "release_date": "2022-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "poi-scratchpad: A carefully crafted TNEF file can cause an out of memory exception" }, { "cve": "CVE-2022-26520", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "discovery_date": "2022-03-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064007" } ], "notes": [ { "category": "description", "text": "A flaw was found in Postgres JDBC. This flaw allows an attacker to use a method to write arbitrary files through the connection properties settings. For example, an attacker can create an executable file under the server the application is running and make it a new part of the application or server.", "title": "Vulnerability description" }, { "category": "summary", "text": "postgresql-jdbc: Arbitrary File Write Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat informs that although there\u0027s a difference from NVD CVSSv3 score there\u0027s a especial occasion in this CVE that maintain it as a moderate. The scenario for an attacker to get a benefit in this situation requires them to have access to modify a configuration file and write a file where it\u0027s needed. This require non-default configuration and also it\u0027s not expected to allow an untrusted user to perform this kind of setting.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26520" }, { "category": "external", "summary": "RHBZ#2064007", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064007" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26520", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26520" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26520", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26520" } ], "release_date": "2022-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "postgresql-jdbc: Arbitrary File Write Vulnerability" }, { "cve": "CVE-2022-30126", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "discovery_date": "2022-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2088523" } ], "notes": [ { "category": "description", "text": "In Apache Tika, a regular expression in our StandardsText class, used by the StandardsExtractingContentHandler could lead to a denial of service caused by backtracking on a specially crafted file. This only affects users who are running the StandardsExtractingContentHandler, which is a non-standard handler. This is fixed in 1.28.2 and 2.4.0", "title": "Vulnerability description" }, { "category": "summary", "text": "tika-core: Regular Expression Denial of Service in standards extractor", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Fuse 7.11" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30126" }, { "category": "external", "summary": "RHBZ#2088523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088523" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30126", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30126" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30126", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30126" } ], "release_date": "2022-05-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-07-07T14:19:49+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nInstallation instructions are available from the Fuse 7.11.0 product documentation page:\nhttps://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/", "product_ids": [ "Red Hat Fuse 7.11" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:5532" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "Red Hat Fuse 7.11" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "tika-core: Regular Expression Denial of Service in standards extractor" } ] }
rhsa-2021_5154
Vulnerability from csaf_redhat
Published
2021-12-15 14:42
Modified
2024-11-06 00:15
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.10 security update
Notes
Topic
A security update is now available for Red Hat JBoss Enterprise Application Platform 7.3.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release of Red Hat JBoss Enterprise Application Platform 7.3.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.10 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)
* wildfly-elytron: possible timing attack in ScramServer (CVE-2021-3642)
* wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users (CVE-2021-3717)
* jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)
* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)
* resteasy: Error message exposes endpoint class information (CVE-2021-20289)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References sec
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.3.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat JBoss Enterprise Application Platform 7.3.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.10 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)\n\n* wildfly-elytron: possible timing attack in ScramServer (CVE-2021-3642)\n\n* wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users (CVE-2021-3717)\n\n* jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)\n\n* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)\n\n* resteasy: Error message exposes endpoint class information (CVE-2021-20289)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References sec", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:5154", "url": "https://access.redhat.com/errata/RHSA-2021:5154" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=7.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=7.3" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/" }, { "category": "external", "summary": "1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "1981407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981407" }, { "category": "external", "summary": "1991305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991305" }, { "category": "external", "summary": "1995259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259" }, { "category": "external", "summary": "2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "JBEAP-22314", "url": "https://issues.redhat.com/browse/JBEAP-22314" }, { "category": "external", "summary": "JBEAP-22332", "url": "https://issues.redhat.com/browse/JBEAP-22332" }, { "category": "external", "summary": "JBEAP-22343", "url": "https://issues.redhat.com/browse/JBEAP-22343" }, { "category": "external", "summary": "JBEAP-22363", "url": "https://issues.redhat.com/browse/JBEAP-22363" }, { "category": "external", "summary": "JBEAP-22490", "url": "https://issues.redhat.com/browse/JBEAP-22490" }, { "category": "external", "summary": "JBEAP-22501", "url": "https://issues.redhat.com/browse/JBEAP-22501" }, { "category": "external", "summary": "JBEAP-22523", "url": "https://issues.redhat.com/browse/JBEAP-22523" }, { "category": "external", "summary": "JBEAP-22734", "url": "https://issues.redhat.com/browse/JBEAP-22734" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_5154.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.10 security update", "tracking": { "current_release_date": "2024-11-06T00:15:49+00:00", "generator": { "date": "2024-11-06T00:15:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:5154", "initial_release_date": "2021-12-15T14:42:27+00:00", "revision_history": [ { "date": "2021-12-15T14:42:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-12-15T14:42:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:15:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "EAP 7.3.10 GA", "product": { "name": "EAP 7.3.10 GA", "product_id": "EAP 7.3.10 GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3629", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1977362" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "EAP 7.3.10 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3629" }, { "category": "external", "summary": "RHBZ#1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3629", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:42:27+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "EAP 7.3.10 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5154" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "EAP 7.3.10 GA" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS" }, { "cve": "CVE-2021-3642", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "discovery_date": "2021-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981407" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Elytron where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-elytron: possible timing attack in ScramServer", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "EAP 7.3.10 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3642" }, { "category": "external", "summary": "RHBZ#1981407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981407" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3642", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3642" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3642", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3642" } ], "release_date": "2021-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:42:27+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "EAP 7.3.10 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5154" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "EAP 7.3.10 GA" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-elytron: possible timing attack in ScramServer" }, { "cve": "CVE-2021-3717", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "discovery_date": "2021-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1991305" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly. An incorrect JBOSS_LOCAL_USER challenge location when using the elytron configuration may lead to JBOSS_LOCAL_USER access to all users on the machine. The highest threat from this vulnerability is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "EAP 7.3.10 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3717" }, { "category": "external", "summary": "RHBZ#1991305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3717" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:42:27+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "EAP 7.3.10 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5154" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "EAP 7.3.10 GA" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users" }, { "acknowledgments": [ { "names": [ "Dirk Papenberg" ], "organization": "NTT DATA Germany" } ], "cve": "CVE-2021-20289", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2021-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1935927" } ], "notes": [ { "category": "description", "text": "A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method\u0027s parameter value. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "resteasy: Error message exposes endpoint class information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "EAP 7.3.10 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20289" }, { "category": "external", "summary": "RHBZ#1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20289", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20289" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289" } ], "release_date": "2021-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:42:27+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "EAP 7.3.10 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5154" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "EAP 7.3.10 GA" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "resteasy: Error message exposes endpoint class information" }, { "cve": "CVE-2021-37714", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995259" } ], "notes": [ { "category": "description", "text": "jsoup is a Java library for working with HTML. Those using jsoup versions prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. The issue is patched in version 1.14.2. There are a few available workarounds. Users may rate limit input parsing, limit the size of inputs based on system resources, and/or implement thread watchdogs to cap and timeout parse runtimes.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "EAP 7.3.10 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37714" }, { "category": "external", "summary": "RHBZ#1995259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37714", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37714" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714" }, { "category": "external", "summary": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c", "url": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:42:27+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "EAP 7.3.10 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5154" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "EAP 7.3.10 GA" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck" }, { "cve": "CVE-2021-40690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011190" } ], "notes": [ { "category": "description", "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: XPath Transform abuse allows for information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Since OpenShift Container Platform (OCP) 4.7, the logging-elasticsearch6-container is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "EAP 7.3.10 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-40690" }, { "category": "external", "summary": "RHBZ#2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" } ], "release_date": "2021-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:42:27+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "EAP 7.3.10 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5154" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "EAP 7.3.10 GA" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: XPath Transform abuse allows for information disclosure" } ] }
rhsa-2021_5170
Vulnerability from csaf_redhat
Published
2021-12-15 19:08
Modified
2024-11-06 00:15
Summary
Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 security update
Notes
Topic
A security update is now available for Red Hat Single Sign-On 7.4 from the Customer Portal.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.
This release of Red Hat Single Sign-On 7.4.10 serves as a replacement for Red Hat Single Sign-On 7.4.9, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)
* wildfly-elytron: possible timing attack in ScramServer (CVE-2021-3642)
* wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users (CVE-2021-3717)
* jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)
* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)
* resteasy: Error message exposes endpoint class information (CVE-2021-20289)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat Single Sign-On 7.4 from the Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.4.10 serves as a replacement for Red Hat Single Sign-On 7.4.9, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)\n\n* wildfly-elytron: possible timing attack in ScramServer (CVE-2021-3642)\n\n* wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users (CVE-2021-3717)\n\n* jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)\n\n* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)\n\n* resteasy: Error message exposes endpoint class information (CVE-2021-20289)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:5170", "url": "https://access.redhat.com/errata/RHSA-2021:5170" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso\u0026downloadType=securityPatches\u0026version=7.4", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso\u0026downloadType=securityPatches\u0026version=7.4" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.4/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.4/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.4/html/release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.4/html/release_notes/index" }, { "category": "external", "summary": "1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "1981407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981407" }, { "category": "external", "summary": "1991305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991305" }, { "category": "external", "summary": "1995259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259" }, { "category": "external", "summary": "2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_5170.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.4.10 security update", "tracking": { "current_release_date": "2024-11-06T00:15:55+00:00", "generator": { "date": "2024-11-06T00:15:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:5170", "initial_release_date": "2021-12-15T19:08:11+00:00", "revision_history": [ { "date": "2021-12-15T19:08:11+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-12-15T19:08:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:15:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Single Sign-On 7.4.10", "product": { "name": "Red Hat Single Sign-On 7.4.10", "product_id": "Red Hat Single Sign-On 7.4.10", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3629", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1977362" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.4.10" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3629" }, { "category": "external", "summary": "RHBZ#1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3629", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T19:08:11+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.4.10" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5170" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7.4.10" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS" }, { "cve": "CVE-2021-3642", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "discovery_date": "2021-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981407" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Elytron where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-elytron: possible timing attack in ScramServer", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.4.10" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3642" }, { "category": "external", "summary": "RHBZ#1981407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981407" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3642", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3642" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3642", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3642" } ], "release_date": "2021-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T19:08:11+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.4.10" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5170" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7.4.10" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-elytron: possible timing attack in ScramServer" }, { "cve": "CVE-2021-3717", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "discovery_date": "2021-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1991305" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly. An incorrect JBOSS_LOCAL_USER challenge location when using the elytron configuration may lead to JBOSS_LOCAL_USER access to all users on the machine. The highest threat from this vulnerability is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.4.10" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3717" }, { "category": "external", "summary": "RHBZ#1991305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3717" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T19:08:11+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.4.10" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5170" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7.4.10" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users" }, { "acknowledgments": [ { "names": [ "Dirk Papenberg" ], "organization": "NTT DATA Germany" } ], "cve": "CVE-2021-20289", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2021-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1935927" } ], "notes": [ { "category": "description", "text": "A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method\u0027s parameter value. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "resteasy: Error message exposes endpoint class information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.4.10" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20289" }, { "category": "external", "summary": "RHBZ#1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20289", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20289" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289" } ], "release_date": "2021-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T19:08:11+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.4.10" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5170" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7.4.10" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "resteasy: Error message exposes endpoint class information" }, { "cve": "CVE-2021-37714", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995259" } ], "notes": [ { "category": "description", "text": "jsoup is a Java library for working with HTML. Those using jsoup versions prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. The issue is patched in version 1.14.2. There are a few available workarounds. Users may rate limit input parsing, limit the size of inputs based on system resources, and/or implement thread watchdogs to cap and timeout parse runtimes.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.4.10" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37714" }, { "category": "external", "summary": "RHBZ#1995259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37714", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37714" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714" }, { "category": "external", "summary": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c", "url": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T19:08:11+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.4.10" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5170" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7.4.10" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck" }, { "cve": "CVE-2021-40690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011190" } ], "notes": [ { "category": "description", "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: XPath Transform abuse allows for information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Since OpenShift Container Platform (OCP) 4.7, the logging-elasticsearch6-container is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Single Sign-On 7.4.10" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-40690" }, { "category": "external", "summary": "RHBZ#2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" } ], "release_date": "2021-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T19:08:11+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "Red Hat Single Sign-On 7.4.10" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5170" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Single Sign-On 7.4.10" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: XPath Transform abuse allows for information disclosure" } ] }
rhsa-2021_5151
Vulnerability from csaf_redhat
Published
2021-12-15 14:42
Modified
2024-11-06 00:16
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.10 security update on RHEL 8
Notes
Topic
A security update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release of Red Hat JBoss Enterprise Application Platform 7.3.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.10 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)
* wildfly-elytron: possible timing attack in ScramServer (CVE-2021-3642)
* wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users (CVE-2021-3717)
* jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)
* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)
* resteasy: Error message exposes endpoint class information (CVE-2021-20289)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat JBoss Enterprise Application Platform 7.3.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.10 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)\n\n* wildfly-elytron: possible timing attack in ScramServer (CVE-2021-3642)\n\n* wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users (CVE-2021-3717)\n\n* jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)\n\n* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)\n\n* resteasy: Error message exposes endpoint class information (CVE-2021-20289)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:5151", "url": "https://access.redhat.com/errata/RHSA-2021:5151" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/" }, { "category": "external", "summary": "1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "1981407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981407" }, { "category": "external", "summary": "1991305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991305" }, { "category": "external", "summary": "1995259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259" }, { "category": "external", "summary": "2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "JBEAP-22145", "url": "https://issues.redhat.com/browse/JBEAP-22145" }, { "category": "external", "summary": "JBEAP-22314", "url": "https://issues.redhat.com/browse/JBEAP-22314" }, { "category": "external", "summary": "JBEAP-22332", "url": "https://issues.redhat.com/browse/JBEAP-22332" }, { "category": "external", "summary": "JBEAP-22343", "url": "https://issues.redhat.com/browse/JBEAP-22343" }, { "category": "external", "summary": "JBEAP-22363", "url": "https://issues.redhat.com/browse/JBEAP-22363" }, { "category": "external", "summary": "JBEAP-22490", "url": "https://issues.redhat.com/browse/JBEAP-22490" }, { "category": "external", "summary": "JBEAP-22501", "url": "https://issues.redhat.com/browse/JBEAP-22501" }, { "category": "external", "summary": "JBEAP-22523", "url": "https://issues.redhat.com/browse/JBEAP-22523" }, { "category": "external", "summary": "JBEAP-22734", "url": "https://issues.redhat.com/browse/JBEAP-22734" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_5151.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.10 security update on RHEL 8", "tracking": { "current_release_date": "2024-11-06T00:16:10+00:00", "generator": { "date": "2024-11-06T00:16:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:5151", "initial_release_date": "2021-12-15T14:42:38+00:00", "revision_history": [ { "date": "2021-12-15T14:42:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-12-15T14:42:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:16:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.3 for BaseOS-8", "product": { "name": "Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.10.15-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "product": { "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "product_id": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.3.12-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "product": { "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "product_id": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow@2.0.41-1.SP1_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "product": { "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "product_id": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j@2.2.7-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.43-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy@3.11.5-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src", "product": { "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src", "product_id": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xml-security@2.1.7-1.redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "product": { "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "product_id": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.14.2-1.redhat_00002.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "product": { "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "product_id": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jakarta-el@3.0.3-3.redhat_00007.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "product_id": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.7.2-10.Final_redhat_00011.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "product": { "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "product_id": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.3-1.Final_redhat_00001.1.el8eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "product": { "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "product_id": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.3.10-2.GA_redhat_00003.1.el8eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.10.15-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron-tool@1.10.15-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.3.12-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-rt@3.3.12-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-services@3.3.12-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-tools@3.3.12-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "product_id": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow@2.0.41-1.SP1_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j@2.2.7-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-bindings@2.2.7-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-policy@2.2.7-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-common@2.2.7-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-dom@2.2.7-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-policy-stax@2.2.7-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-stax@2.2.7-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.43-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-client@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-client-microprofile@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.11.5-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "product_id": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xml-security@2.1.7-1.redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "product": { "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "product_id": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.14.2-1.redhat_00002.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "product": { "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "product_id": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jakarta-el@3.0.3-3.redhat_00007.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4-to-eap7.3@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.0@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.1@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.2@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.2-to-eap7.3@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.3-server@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.0@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.1@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly11.0@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly12.0@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly13.0-server@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly14.0-server@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly15.0-server@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly16.0-server@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly17.0-server@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly18.0-server@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly8.2@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly9.0@1.7.2-10.Final_redhat_00011.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.3-1.Final_redhat_00001.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "product": { "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "product_id": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.3.10-2.GA_redhat_00003.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.3.10-2.GA_redhat_00003.1.el8eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "product_id": "eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.3.10-2.GA_redhat_00003.1.el8eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch" }, "product_reference": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src" }, "product_reference": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch" }, "product_reference": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src" }, "product_reference": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src" }, "product_reference": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch" }, "product_reference": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "relates_to_product_reference": "8Base-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.3 for BaseOS-8", "product_id": "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" }, "product_reference": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src", "relates_to_product_reference": "8Base-JBEAP-7.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3629", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1977362" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3629" }, { "category": "external", "summary": "RHBZ#1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3629", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:42:38+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5151" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS" }, { "cve": "CVE-2021-3642", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "discovery_date": "2021-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981407" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Elytron where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-elytron: possible timing attack in ScramServer", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3642" }, { "category": "external", "summary": "RHBZ#1981407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981407" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3642", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3642" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3642", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3642" } ], "release_date": "2021-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:42:38+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5151" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-elytron: possible timing attack in ScramServer" }, { "cve": "CVE-2021-3717", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "discovery_date": "2021-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1991305" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly. An incorrect JBOSS_LOCAL_USER challenge location when using the elytron configuration may lead to JBOSS_LOCAL_USER access to all users on the machine. The highest threat from this vulnerability is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3717" }, { "category": "external", "summary": "RHBZ#1991305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3717" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:42:38+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5151" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users" }, { "acknowledgments": [ { "names": [ "Dirk Papenberg" ], "organization": "NTT DATA Germany" } ], "cve": "CVE-2021-20289", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2021-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1935927" } ], "notes": [ { "category": "description", "text": "A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method\u0027s parameter value. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "resteasy: Error message exposes endpoint class information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20289" }, { "category": "external", "summary": "RHBZ#1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20289", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20289" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289" } ], "release_date": "2021-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:42:38+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5151" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "resteasy: Error message exposes endpoint class information" }, { "cve": "CVE-2021-37714", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995259" } ], "notes": [ { "category": "description", "text": "jsoup is a Java library for working with HTML. Those using jsoup versions prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. The issue is patched in version 1.14.2. There are a few available workarounds. Users may rate limit input parsing, limit the size of inputs based on system resources, and/or implement thread watchdogs to cap and timeout parse runtimes.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37714" }, { "category": "external", "summary": "RHBZ#1995259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37714", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37714" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714" }, { "category": "external", "summary": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c", "url": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:42:38+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5151" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck" }, { "cve": "CVE-2021-40690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011190" } ], "notes": [ { "category": "description", "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: XPath Transform abuse allows for information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Since OpenShift Container Platform (OCP) 4.7, the logging-elasticsearch6-container is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-40690" }, { "category": "external", "summary": "RHBZ#2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" } ], "release_date": "2021-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:42:38+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5151" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el8eap.src", "8Base-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el8eap.src", "8Base-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.noarch", "8Base-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el8eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: XPath Transform abuse allows for information disclosure" } ] }
rhsa-2022_0146
Vulnerability from csaf_redhat
Published
2022-01-17 12:02
Modified
2024-11-06 00:19
Summary
Red Hat Security Advisory: EAP XP 2 security update to CVE fixes in the EAP 7.3.x base
Notes
Topic
This advisory resolves CVE issues filed against XP2 releases that have been fixed in the underlying EAP 7.3.x base. There are no changes to the EAP XP2 code base.
NOTE: This advisory is informational only. There are no code changes associated with it. No action is required.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
These are CVE issues filed against XP2 releases that have been fixed in the underlying EAP 7.3.x base. There are no changes to the EAP XP2 code base.
Security Fix(es):
* undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)
* wildfly-elytron: possible timing attack in ScramServer (CVE-2021-3642)
* wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users (CVE-2021-3717)
* jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)
* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)
* resteasy: Error message exposes endpoint class information (CVE-2021-20289)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "This advisory resolves CVE issues filed against XP2 releases that have been fixed in the underlying EAP 7.3.x base. There are no changes to the EAP XP2 code base.\n\nNOTE: This advisory is informational only. There are no code changes associated with it. No action is required.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "These are CVE issues filed against XP2 releases that have been fixed in the underlying EAP 7.3.x base. There are no changes to the EAP XP2 code base.\n\nSecurity Fix(es):\n\n* undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)\n\n* wildfly-elytron: possible timing attack in ScramServer (CVE-2021-3642)\n\n* wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users (CVE-2021-3717)\n\n* jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)\n\n* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)\n\n* resteasy: Error message exposes endpoint class information (CVE-2021-20289)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0146", "url": "https://access.redhat.com/errata/RHSA-2022:0146" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/" }, { "category": "external", "summary": "https://access.redhat.com/articles/5975301", "url": "https://access.redhat.com/articles/5975301" }, { "category": "external", "summary": "1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "1981407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981407" }, { "category": "external", "summary": "1991305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991305" }, { "category": "external", "summary": "1995259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259" }, { "category": "external", "summary": "2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "JBEAP-22652", "url": "https://issues.redhat.com/browse/JBEAP-22652" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0146.json" } ], "title": "Red Hat Security Advisory: EAP XP 2 security update to CVE fixes in the EAP 7.3.x base", "tracking": { "current_release_date": "2024-11-06T00:19:21+00:00", "generator": { "date": "2024-11-06T00:19:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0146", "initial_release_date": "2022-01-17T12:02:48+00:00", "revision_history": [ { "date": "2022-01-17T12:02:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-01-17T12:02:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:19:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat EAP-XP 2 via EAP 7.3.x base", "product": { "name": "Red Hat EAP-XP 2 via EAP 7.3.x base", "product_id": "Red Hat EAP-XP 2 via EAP 7.3.x base", "product_identification_helper": { "cpe": "cpe:/a:redhat:jbosseapxp" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3629", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1977362" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3629" }, { "category": "external", "summary": "RHBZ#1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3629", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T12:02:48+00:00", "details": "This advisory is informational only. There are no code changes associated with it. No action is required.", "product_ids": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0146" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS" }, { "cve": "CVE-2021-3642", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "discovery_date": "2021-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981407" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Elytron where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-elytron: possible timing attack in ScramServer", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3642" }, { "category": "external", "summary": "RHBZ#1981407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981407" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3642", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3642" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3642", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3642" } ], "release_date": "2021-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T12:02:48+00:00", "details": "This advisory is informational only. There are no code changes associated with it. No action is required.", "product_ids": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0146" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-elytron: possible timing attack in ScramServer" }, { "cve": "CVE-2021-3717", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "discovery_date": "2021-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1991305" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly. An incorrect JBOSS_LOCAL_USER challenge location when using the elytron configuration may lead to JBOSS_LOCAL_USER access to all users on the machine. The highest threat from this vulnerability is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3717" }, { "category": "external", "summary": "RHBZ#1991305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3717" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T12:02:48+00:00", "details": "This advisory is informational only. There are no code changes associated with it. No action is required.", "product_ids": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0146" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users" }, { "acknowledgments": [ { "names": [ "Dirk Papenberg" ], "organization": "NTT DATA Germany" } ], "cve": "CVE-2021-20289", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2021-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1935927" } ], "notes": [ { "category": "description", "text": "A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method\u0027s parameter value. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "resteasy: Error message exposes endpoint class information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20289" }, { "category": "external", "summary": "RHBZ#1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20289", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20289" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289" } ], "release_date": "2021-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T12:02:48+00:00", "details": "This advisory is informational only. There are no code changes associated with it. No action is required.", "product_ids": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0146" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "resteasy: Error message exposes endpoint class information" }, { "cve": "CVE-2021-37714", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995259" } ], "notes": [ { "category": "description", "text": "jsoup is a Java library for working with HTML. Those using jsoup versions prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. The issue is patched in version 1.14.2. There are a few available workarounds. Users may rate limit input parsing, limit the size of inputs based on system resources, and/or implement thread watchdogs to cap and timeout parse runtimes.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37714" }, { "category": "external", "summary": "RHBZ#1995259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37714", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37714" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714" }, { "category": "external", "summary": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c", "url": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T12:02:48+00:00", "details": "This advisory is informational only. There are no code changes associated with it. No action is required.", "product_ids": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0146" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck" }, { "cve": "CVE-2021-40690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011190" } ], "notes": [ { "category": "description", "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: XPath Transform abuse allows for information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Since OpenShift Container Platform (OCP) 4.7, the logging-elasticsearch6-container is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-40690" }, { "category": "external", "summary": "RHBZ#2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" } ], "release_date": "2021-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T12:02:48+00:00", "details": "This advisory is informational only. There are no code changes associated with it. No action is required.", "product_ids": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0146" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat EAP-XP 2 via EAP 7.3.x base" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: XPath Transform abuse allows for information disclosure" } ] }
rhsa-2022_1013
Vulnerability from csaf_redhat
Published
2022-03-22 15:33
Modified
2024-11-06 00:36
Summary
Red Hat Security Advisory: Red Hat Integration Camel Extensions for Quarkus 2.2.1 security update
Notes
Topic
A security update to Red Hat Integration Camel Extensions for Quarkus 2.2 is now available. The purpose of this text-only errata is to inform you about the security issues fixed.
Red Hat Product Security has rated this update as having an impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Integration - Camel Extensions for Quarkus 2.2.1 serves as a replacement for 2.2 and includes the following security Fix(es):
Security Fix(es):
* cron-utils: template Injection leading to unauthenticated Remote Code Execution (CVE-2021-41269)
* maven: Block repositories using http by default (CVE-2021-26291)
* bouncycastle: Timing issue within the EC math library (CVE-2020-15522)
* mysql-connector-java: unauthorized access to critical (CVE-2021-2471)
* kubernetes-client: Insecure deserialization in unmarshalYaml method (CVE-2021-4178)
* protobuf-java: potential DoS in the parsing procedure for binary data (CVE-2021-22569)
* jersey: Local information disclosure via system temporary directory (CVE-2021-28168)
* jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate (CVE-2021-28170)
* mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server (CVE-2021-30129)
* netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data (CVE-2021-37136)
* netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way (CVE-2021-37137)
* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)
* h2: Remote Code Execution in Console (CVE-2021-42392)
* guava: local information disclosure via temporary directory created with unsafe permissions (CVE-2020-8908)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update to Red Hat Integration Camel Extensions for Quarkus 2.2 is now available. The purpose of this text-only errata is to inform you about the security issues fixed.\n\nRed Hat Product Security has rated this update as having an impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Integration - Camel Extensions for Quarkus 2.2.1 serves as a replacement for 2.2 and includes the following security Fix(es):\n\nSecurity Fix(es):\n\n* cron-utils: template Injection leading to unauthenticated Remote Code Execution (CVE-2021-41269)\n\n* maven: Block repositories using http by default (CVE-2021-26291)\n\n* bouncycastle: Timing issue within the EC math library (CVE-2020-15522)\n\n* mysql-connector-java: unauthorized access to critical (CVE-2021-2471)\n\n* kubernetes-client: Insecure deserialization in unmarshalYaml method (CVE-2021-4178)\n\n* protobuf-java: potential DoS in the parsing procedure for binary data (CVE-2021-22569)\n\n* jersey: Local information disclosure via system temporary directory (CVE-2021-28168)\n\n* jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate (CVE-2021-28170)\n\n* mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server (CVE-2021-30129)\n\n* netty-codec: Bzip2Decoder doesn\u0027t allow setting size restrictions for decompressed data (CVE-2021-37136)\n\n* netty-codec: SnappyFrameDecoder doesn\u0027t restrict chunk length and may buffer skippable chunks in an unnecessary way (CVE-2021-37137)\n\n* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)\n\n* h2: Remote Code Execution in Console (CVE-2021-42392)\n\n* guava: local information disclosure via temporary directory created with unsafe permissions (CVE-2020-8908)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:1013", "url": "https://access.redhat.com/errata/RHSA-2022:1013" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=red.hat.integration\u0026version=2022-Q2", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=red.hat.integration\u0026version=2022-Q2" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_integration/2022.q2", "url": "https://access.redhat.com/documentation/en-us/red_hat_integration/2022.q2" }, { "category": "external", "summary": "1906919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906919" }, { "category": "external", "summary": "1953024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953024" }, { "category": "external", "summary": "1955739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955739" }, { "category": "external", "summary": "1962879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962879" }, { "category": "external", "summary": "1965497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965497" }, { "category": "external", "summary": "1981527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981527" }, { "category": "external", "summary": "2004133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004133" }, { "category": "external", "summary": "2004135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004135" }, { "category": "external", "summary": "2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "2020583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020583" }, { "category": "external", "summary": "2024632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024632" }, { "category": "external", "summary": "2034388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034388" }, { "category": "external", "summary": "2039403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039403" }, { "category": "external", "summary": "2039903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039903" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1013.json" } ], "title": "Red Hat Security Advisory: Red Hat Integration Camel Extensions for Quarkus 2.2.1 security update", "tracking": { "current_release_date": "2024-11-06T00:36:03+00:00", "generator": { "date": "2024-11-06T00:36:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:1013", "initial_release_date": "2022-03-22T15:33:40+00:00", "revision_history": [ { "date": "2022-03-22T15:33:40+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-03-22T15:33:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:36:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHINT Camel-Q 2.2.1", "product": { "name": "RHINT Camel-Q 2.2.1", "product_id": "RHINT Camel-Q 2.2.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:camel_quarkus:2.2.1" } } } ], "category": "product_family", "name": "Red Hat Integration" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-8908", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2020-12-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1906919" } ], "notes": [ { "category": "description", "text": "A flaw was found in Guava that creates temporary directories with default permissions similar to /tmp. This issue may allow local users access, possibly permitting information exposure.", "title": "Vulnerability description" }, { "category": "summary", "text": "guava: local information disclosure via temporary directory created with unsafe permissions", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Important and Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Camel-Q 2.2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-8908" }, { "category": "external", "summary": "RHBZ#1906919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906919" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-8908", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8908" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-8908", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8908" } ], "release_date": "2020-09-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-22T15:33:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Camel-Q 2.2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1013" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "RHINT Camel-Q 2.2.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "guava: local information disclosure via temporary directory created with unsafe permissions" }, { "cve": "CVE-2020-15522", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2021-05-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1962879" } ], "notes": [ { "category": "description", "text": "A flaw was found in bouncycastle. A timing issue within the EC math library can expose information about the private key when an attacker is able to observe timing information for the generation of multiple deterministic ECDSA signatures.", "title": "Vulnerability description" }, { "category": "summary", "text": "bouncycastle: Timing issue within the EC math library", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Camel-Q 2.2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-15522" }, { "category": "external", "summary": "RHBZ#1962879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962879" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-15522", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15522" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-15522", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15522" } ], "release_date": "2021-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-22T15:33:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Camel-Q 2.2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1013" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "RHINT Camel-Q 2.2.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "bouncycastle: Timing issue within the EC math library" }, { "cve": "CVE-2021-2471", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-11-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2020583" } ], "notes": [ { "category": "description", "text": "MySQL Connector/J has no security check when external general entities are included in XML sources, consequently, there exists an XML External Entity(XXE) vulnerability. A successful attack can access critical data and gain full control/access to all MySQL Connectors\u0027 accessible data without any authorization.", "title": "Vulnerability description" }, { "category": "summary", "text": "mysql-connector-java: unauthorized access to critical", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), the Presto component is part of the OCP Metering stack and it ships the vulnerable version of the MySQL Connector/J package. Since the release of OCP 4.6, the Metering product has been deprecated and is removed from OCP starting from 4.9 version [1], hence the affected component is marked as wontfix.\n\n[1] https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html#ocp-4-9-deprecated-removed-features", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Camel-Q 2.2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-2471" }, { "category": "external", "summary": "RHBZ#2020583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2020583" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-2471", "url": "https://www.cve.org/CVERecord?id=CVE-2021-2471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-2471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-2471" }, { "category": "external", "summary": "https://www.oracle.com/security-alerts/cpuoct2021.html", "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ], "release_date": "2021-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-22T15:33:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Camel-Q 2.2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1013" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "RHINT Camel-Q 2.2.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "mysql-connector-java: unauthorized access to critical" }, { "acknowledgments": [ { "names": [ "Jordy Versmissen" ] } ], "cve": "CVE-2021-4178", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2021-12-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034388" } ], "notes": [ { "category": "description", "text": "A arbitrary code execution flaw was found in the Fabric 8 Kubernetes client affecting versions 5.0.0-beta-1 and above. Due to an improperly configured YAML parsing, this will allow a local and privileged attacker to supply malicious YAML.", "title": "Vulnerability description" }, { "category": "summary", "text": "kubernetes-client: Insecure deserialization in unmarshalYaml method", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat CodeReady Studio 12 is not affected by this flaw because it does not ship a vulnerable version of kubernetes-client; the version that it ships does not use SnakeYAML.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Camel-Q 2.2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4178" }, { "category": "external", "summary": "RHBZ#2034388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4178", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4178" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4178", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4178" } ], "release_date": "2022-01-05T15:05:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-22T15:33:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Camel-Q 2.2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1013" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "RHINT Camel-Q 2.2.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kubernetes-client: Insecure deserialization in unmarshalYaml method" }, { "cve": "CVE-2021-22569", "cwe": { "id": "CWE-696", "name": "Incorrect Behavior Order" }, "discovery_date": "2022-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2039903" } ], "notes": [ { "category": "description", "text": "A flaw was found in protobuf-java. Google Protocol Buffer (protobuf-java) allows the interleaving of com.google.protobuf.UnknownFieldSet fields. By persuading a victim to open specially-crafted content, a remote attacker could cause a timeout in the ProtobufFuzzer function, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "protobuf-java: potential DoS in the parsing procedure for binary data", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Camel-Q 2.2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-22569" }, { "category": "external", "summary": "RHBZ#2039903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-22569", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22569" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-22569", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22569" }, { "category": "external", "summary": "https://github.com/protocolbuffers/protobuf/commit/b3093dce58bc9d3042f085666d83c8ef1f51fe7b", "url": "https://github.com/protocolbuffers/protobuf/commit/b3093dce58bc9d3042f085666d83c8ef1f51fe7b" }, { "category": "external", "summary": "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67", "url": "https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67" } ], "release_date": "2022-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-22T15:33:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Camel-Q 2.2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1013" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHINT Camel-Q 2.2.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "protobuf-java: potential DoS in the parsing procedure for binary data" }, { "cve": "CVE-2021-26291", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-04-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1955739" } ], "notes": [ { "category": "description", "text": "A flaw was found in maven. Repositories that are defined in a dependency\u2019s Project Object Model (pom), which may be unknown to users, are used by default resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "maven: Block repositories using http by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Camel-Q 2.2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-26291" }, { "category": "external", "summary": "RHBZ#1955739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1955739" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-26291", "url": "https://www.cve.org/CVERecord?id=CVE-2021-26291" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26291", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26291" }, { "category": "external", "summary": "https://maven.apache.org/docs/3.8.1/release-notes.html#cve-2021-26291", "url": "https://maven.apache.org/docs/3.8.1/release-notes.html#cve-2021-26291" } ], "release_date": "2021-04-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-22T15:33:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Camel-Q 2.2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1013" }, { "category": "workaround", "details": "To avoid possible man-in-the-middle related attacks with this flaw, ensure any linked repositories in maven POMs use https and not http.", "product_ids": [ "RHINT Camel-Q 2.2.1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "RHINT Camel-Q 2.2.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "maven: Block repositories using http by default" }, { "cve": "CVE-2021-28168", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1953024" } ], "notes": [ { "category": "description", "text": "Eclipse Jersey 2.28 to 2.33 and Eclipse Jersey 3.0.0 to 3.0.1 contains a local information disclosure vulnerability. This is due to the use of the File.createTempFile which creates a file inside of the system temporary directory with the permissions: -rw-r--r--. Thus the contents of this file are viewable by all other users locally on the system. As such, if the contents written is security sensitive, it can be disclosed to other local users.", "title": "Vulnerability description" }, { "category": "summary", "text": "jersey: Local information disclosure via system temporary directory", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Important and Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Camel-Q 2.2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-28168" }, { "category": "external", "summary": "RHBZ#1953024", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953024" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28168", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28168" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28168", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28168" } ], "release_date": "2021-04-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-22T15:33:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Camel-Q 2.2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1013" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "RHINT Camel-Q 2.2.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jersey: Local information disclosure via system temporary directory" }, { "cve": "CVE-2021-28170", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-05-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965497" } ], "notes": [ { "category": "description", "text": "In the Jakarta Expression Language implementation 3.0.3 and earlier, a bug in the ELParserTokenManager enables invalid EL expressions to be evaluated as if they were valid.", "title": "Vulnerability description" }, { "category": "summary", "text": "jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Camel-Q 2.2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-28170" }, { "category": "external", "summary": "RHBZ#1965497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965497" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28170", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28170" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28170", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28170" }, { "category": "external", "summary": "https://securitylab.github.com/advisories/GHSL-2020-021-jakarta-el/", "url": "https://securitylab.github.com/advisories/GHSL-2020-021-jakarta-el/" } ], "release_date": "2021-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-22T15:33:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Camel-Q 2.2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1013" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "RHINT Camel-Q 2.2.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate" }, { "cve": "CVE-2021-30129", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-07-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981527" } ], "notes": [ { "category": "description", "text": "A vulnerability in sshd-core of Apache Mina SSHD allows an attacker to overflow the server causing an OutOfMemory error. This issue affects the SFTP and port forwarding features of Apache Mina SSHD version 2.0.0 and later versions. It was addressed in Apache Mina SSHD 2.7.0", "title": "Vulnerability description" }, { "category": "summary", "text": "mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Camel-Q 2.2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30129" }, { "category": "external", "summary": "RHBZ#1981527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981527" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30129", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30129" } ], "release_date": "2021-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-22T15:33:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Camel-Q 2.2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1013" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHINT Camel-Q 2.2.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "mina-sshd-core: Memory leak denial of service in Apache Mina SSHD Server" }, { "cve": "CVE-2021-37136", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2004133" } ], "notes": [ { "category": "description", "text": "A flaw was found in Netty\u0027s netty-codec due to size restrictions for decompressed data in the Bzip2Decoder. By sending a specially-crafted input, a remote attacker could cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty-codec: Bzip2Decoder doesn\u0027t allow setting size restrictions for decompressed data", "title": "Vulnerability summary" }, { "category": "other", "text": "In the OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack ship the vulnerable version of netty-codec package. Since the release of OCP 4.6, the Metering product has been deprecated [1], so the affected components are marked as wontfix. This may be fixed in the future.\n\nStarting in OCP 4.7, the elasticsearch component is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Camel-Q 2.2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37136" }, { "category": "external", "summary": "RHBZ#2004133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004133" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37136", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37136" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37136", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37136" }, { "category": "external", "summary": "https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv", "url": "https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv" } ], "release_date": "2021-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-22T15:33:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Camel-Q 2.2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1013" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHINT Camel-Q 2.2.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "netty-codec: Bzip2Decoder doesn\u0027t allow setting size restrictions for decompressed data" }, { "cve": "CVE-2021-37137", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2004135" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Netty\u0027s netty-codec due to unrestricted chunk lengths in the SnappyFrameDecoder. By sending a specially-crafted input, a remote attacker could cause excessive memory usage resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "netty-codec: SnappyFrameDecoder doesn\u0027t restrict chunk length and may buffer skippable chunks in an unnecessary way", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP), the Hive/Presto/Hadoop components that comprise the OCP Metering stack, ship the vulnerable version of netty-codec package.\nSince the release of OCP 4.6, the Metering product has been deprecated [1], hence the affected components are marked as wontfix.\nThis may be fixed in the future.\n\nStarting in OCP 4.7, the elasticsearch component is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Camel-Q 2.2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37137" }, { "category": "external", "summary": "RHBZ#2004135", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004135" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37137", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37137" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37137", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37137" }, { "category": "external", "summary": "https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv", "url": "https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv" } ], "release_date": "2021-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-22T15:33:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Camel-Q 2.2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1013" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "RHINT Camel-Q 2.2.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "netty-codec: SnappyFrameDecoder doesn\u0027t restrict chunk length and may buffer skippable chunks in an unnecessary way" }, { "cve": "CVE-2021-40690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011190" } ], "notes": [ { "category": "description", "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: XPath Transform abuse allows for information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Since OpenShift Container Platform (OCP) 4.7, the logging-elasticsearch6-container is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Camel-Q 2.2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-40690" }, { "category": "external", "summary": "RHBZ#2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" } ], "release_date": "2021-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-22T15:33:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Camel-Q 2.2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1013" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "RHINT Camel-Q 2.2.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: XPath Transform abuse allows for information disclosure" }, { "cve": "CVE-2021-41269", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2021-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2024632" } ], "notes": [ { "category": "description", "text": "A flaw was found in cron-utils. This flaw allows an attacker to perform unauthenticated Remote Code Execution (RCE) via Java Expression Language (EL) injection.", "title": "Vulnerability description" }, { "category": "summary", "text": "cron-utils: template Injection leading to unauthenticated Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Only projects using the @Cron annotation to validate untrusted Cron expressions are affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Camel-Q 2.2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-41269" }, { "category": "external", "summary": "RHBZ#2024632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2024632" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-41269", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41269" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41269", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41269" } ], "release_date": "2021-11-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-22T15:33:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Camel-Q 2.2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1013" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "RHINT Camel-Q 2.2.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "cron-utils: template Injection leading to unauthenticated Remote Code Execution" }, { "cve": "CVE-2021-42392", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2039403" } ], "notes": [ { "category": "description", "text": "A flaw was found in h2. The org.h2.util.JdbcUtils.getConnection method of the H2 database takes as parameters the class name of the driver and URL of the database. This flaw allows an attacker to use this URL to send another server\u2019s code, causing remote code execution. This issue is exploited through various attack vectors, most notably through the H2 Console, which leads to unauthenticated remote code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "h2: Remote Code Execution in Console", "title": "Vulnerability summary" }, { "category": "other", "text": "In OpenShift Container Platform (OCP) the openshift4/ose-metering-presto container image ships the vulnerable version of h2, but as it uses default configuration the impact by this vulnerability is LOW. Additionally, the Presto component is part of the OCP Metering stack and since the release of OCP 4.6, the Metering product has been deprecated [1], hence the affected component is marked as wontfix.\n\n[1] https://docs.openshift.com/container-platform/4.6/release_notes/ocp-4-6-release-notes.html#ocp-4-6-metering-operator-deprecated", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Camel-Q 2.2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-42392" }, { "category": "external", "summary": "RHBZ#2039403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039403" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-42392", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42392" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42392", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42392" }, { "category": "external", "summary": "https://github.com/h2database/h2database/security/advisories/GHSA-h376-j262-vhq6", "url": "https://github.com/h2database/h2database/security/advisories/GHSA-h376-j262-vhq6" } ], "release_date": "2022-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-03-22T15:33:40+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Camel-Q 2.2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:1013" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "RHINT Camel-Q 2.2.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "h2: Remote Code Execution in Console" } ] }
rhsa-2021_5150
Vulnerability from csaf_redhat
Published
2021-12-15 14:38
Modified
2024-11-06 00:16
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.10 security update on RHEL 7
Notes
Topic
A security update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release of Red Hat JBoss Enterprise Application Platform 7.3.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.10 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)
* wildfly-elytron: possible timing attack in ScramServer (CVE-2021-3642)
* wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users (CVE-2021-3717)
* jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)
* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)
* resteasy: Error message exposes endpoint class information (CVE-2021-20289)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat JBoss Enterprise Application Platform 7.3.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.10 Release Notes for information about the most significant bug fixes and enhancements included in this release.\n\nSecurity Fix(es):\n\n* undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)\n\n* wildfly-elytron: possible timing attack in ScramServer (CVE-2021-3642)\n\n* wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users (CVE-2021-3717)\n\n* jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)\n\n* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)\n\n* resteasy: Error message exposes endpoint class information (CVE-2021-20289)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:5150", "url": "https://access.redhat.com/errata/RHSA-2021:5150" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/" }, { "category": "external", "summary": "1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "1981407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981407" }, { "category": "external", "summary": "1991305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991305" }, { "category": "external", "summary": "1995259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259" }, { "category": "external", "summary": "2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "JBEAP-22144", "url": "https://issues.redhat.com/browse/JBEAP-22144" }, { "category": "external", "summary": "JBEAP-22314", "url": "https://issues.redhat.com/browse/JBEAP-22314" }, { "category": "external", "summary": "JBEAP-22332", "url": "https://issues.redhat.com/browse/JBEAP-22332" }, { "category": "external", "summary": "JBEAP-22343", "url": "https://issues.redhat.com/browse/JBEAP-22343" }, { "category": "external", "summary": "JBEAP-22363", "url": "https://issues.redhat.com/browse/JBEAP-22363" }, { "category": "external", "summary": "JBEAP-22490", "url": "https://issues.redhat.com/browse/JBEAP-22490" }, { "category": "external", "summary": "JBEAP-22501", "url": "https://issues.redhat.com/browse/JBEAP-22501" }, { "category": "external", "summary": "JBEAP-22523", "url": "https://issues.redhat.com/browse/JBEAP-22523" }, { "category": "external", "summary": "JBEAP-22734", "url": "https://issues.redhat.com/browse/JBEAP-22734" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_5150.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.10 security update on RHEL 7", "tracking": { "current_release_date": "2024-11-06T00:16:02+00:00", "generator": { "date": "2024-11-06T00:16:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2021:5150", "initial_release_date": "2021-12-15T14:38:03+00:00", "revision_history": [ { "date": "2021-12-15T14:38:03+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-12-15T14:38:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:16:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product": { "name": "Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.10.15-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.43-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src", "product": { "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src", "product_id": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xml-security@2.1.7-1.redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy@3.11.5-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "product": { "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "product_id": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j@2.2.7-1.redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "product": { "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "product_id": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.3.12-1.redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "product": { "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "product_id": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow@2.0.41-1.SP1_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "product": { "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "product_id": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.14.2-1.redhat_00002.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "product": { "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "product_id": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jakarta-el@3.0.3-3.redhat_00007.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "product": { "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "product_id": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.7.2-10.Final_redhat_00011.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "product": { "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "product_id": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.3-1.Final_redhat_00001.1.el7eap?arch=src" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "product": { "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "product_id": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.3.10-2.GA_redhat_00003.1.el7eap?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron@1.10.15-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-elytron-tool@1.10.15-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-ejb-client@4.0.43-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-xml-security@2.1.7-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-atom-provider@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-cdi@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-client@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-client-microprofile@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-crypto@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jackson-provider@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jackson2-provider@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jaxb-provider@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jaxrs@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jettison-provider@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jose-jwt@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-jsapi@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-json-binding-provider@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-json-p-provider@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-multipart-provider@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-rxjava2@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-spring@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-validator-provider-11@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-resteasy-yaml-provider@3.11.5-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j@2.2.7-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-bindings@2.2.7-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-policy@2.2.7-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-common@2.2.7-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-dom@2.2.7-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-policy-stax@2.2.7-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wss4j-ws-security-stax@2.2.7-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf@3.3.12-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-rt@3.3.12-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-services@3.3.12-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "product_id": "eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-apache-cxf-tools@3.3.12-1.redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "product_id": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-undertow@2.0.41-1.SP1_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "product": { "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "product_id": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jsoup@1.14.2-1.redhat_00002.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "product": { "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "product_id": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jakarta-el@3.0.3-3.redhat_00007.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-cli@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-core@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap6.4-to-eap7.3@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.0@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.1@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.2@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.2-to-eap7.3@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-eap7.3-server@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.0@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly10.1@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly11.0@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly12.0@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly13.0-server@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly14.0-server@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly15.0-server@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly16.0-server@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly17.0-server@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly18.0-server@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly8.2@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_id": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-jboss-server-migration-wildfly9.0@1.7.2-10.Final_redhat_00011.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar@1.5.3-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-api@1.5.3-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-impl@1.5.3-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-common-spi@1.5.3-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-api@1.5.3-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-core-impl@1.5.3-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-deployers-common@1.5.3-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-jdbc@1.5.3-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product": { "name": "eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_id": "eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-ironjacamar-validator@1.5.3-1.Final_redhat_00001.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "product": { "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "product_id": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly@7.3.10-2.GA_redhat_00003.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.3.10-2.GA_redhat_00003.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "product": { "name": "eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "product_id": "eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.3.10-2.GA_redhat_00003.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "product": { "name": "eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "product_id": "eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.3.10-2.GA_redhat_00003.1.el7eap?arch=noarch" } } }, { "category": "product_version", "name": "eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "product": { "name": "eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "product_id": "eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.3.10-2.GA_redhat_00003.1.el7eap?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch" }, "product_reference": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src" }, "product_reference": "eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src" }, "product_reference": "eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch" }, "product_reference": "eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch" }, "product_reference": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src" }, "product_reference": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src" }, "product_reference": "eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch" }, "product_reference": "eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch" }, "product_reference": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "relates_to_product_reference": "7Server-JBEAP-7.3" }, { "category": "default_component_of", "full_product_name": { "name": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" }, "product_reference": "eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src", "relates_to_product_reference": "7Server-JBEAP-7.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-3629", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1977362" } ], "notes": [ { "category": "description", "text": "A flaw was found in Undertow. A potential security issue in flow control handling by the browser over http/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3629" }, { "category": "external", "summary": "RHBZ#1977362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3629", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3629" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:38:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5150" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "undertow: potential security issue in flow control over HTTP/2 may lead to DOS" }, { "cve": "CVE-2021-3642", "cwe": { "id": "CWE-203", "name": "Observable Discrepancy" }, "discovery_date": "2021-06-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981407" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly Elytron where ScramServer may be susceptible to Timing Attack if enabled. The highest threat of this vulnerability is confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly-elytron: possible timing attack in ScramServer", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3642" }, { "category": "external", "summary": "RHBZ#1981407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981407" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3642", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3642" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3642", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3642" } ], "release_date": "2021-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:38:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5150" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly-elytron: possible timing attack in ScramServer" }, { "cve": "CVE-2021-3717", "cwe": { "id": "CWE-552", "name": "Files or Directories Accessible to External Parties" }, "discovery_date": "2021-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1991305" } ], "notes": [ { "category": "description", "text": "A flaw was found in Wildfly. An incorrect JBOSS_LOCAL_USER challenge location when using the elytron configuration may lead to JBOSS_LOCAL_USER access to all users on the machine. The highest threat from this vulnerability is to confidentiality, integrity, and availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3717" }, { "category": "external", "summary": "RHBZ#1991305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3717", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3717" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:38:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5150" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users" }, { "acknowledgments": [ { "names": [ "Dirk Papenberg" ], "organization": "NTT DATA Germany" } ], "cve": "CVE-2021-20289", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2021-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1935927" } ], "notes": [ { "category": "description", "text": "A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method\u0027s parameter value. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "resteasy: Error message exposes endpoint class information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20289" }, { "category": "external", "summary": "RHBZ#1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20289", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20289" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289" } ], "release_date": "2021-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:38:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5150" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "resteasy: Error message exposes endpoint class information" }, { "cve": "CVE-2021-37714", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-08-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995259" } ], "notes": [ { "category": "description", "text": "jsoup is a Java library for working with HTML. Those using jsoup versions prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. The issue is patched in version 1.14.2. There are a few available workarounds. Users may rate limit input parsing, limit the size of inputs based on system resources, and/or implement thread watchdogs to cap and timeout parse runtimes.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-37714" }, { "category": "external", "summary": "RHBZ#1995259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37714", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37714" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714" }, { "category": "external", "summary": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c", "url": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c" } ], "release_date": "2021-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:38:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5150" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck" }, { "cve": "CVE-2021-40690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011190" } ], "notes": [ { "category": "description", "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: XPath Transform abuse allows for information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Since OpenShift Container Platform (OCP) 4.7, the logging-elasticsearch6-container is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-40690" }, { "category": "external", "summary": "RHBZ#2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" } ], "release_date": "2021-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-12-15T14:38:03+00:00", "details": "Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:5150" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-0:3.3.12-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-apache-cxf-rt-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-services-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-apache-cxf-tools-0:3.3.12-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-0:1.5.3-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-ironjacamar-common-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-common-spi-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-api-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-core-impl-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-deployers-common-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-jdbc-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-ironjacamar-validator-0:1.5.3-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jakarta-el-0:3.0.3-3.redhat_00007.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-ejb-client-0:4.0.43-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-0:1.7.2-10.Final_redhat_00011.1.el7eap.src", "7Server-JBEAP-7.3:eap7-jboss-server-migration-cli-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-core-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap6.4-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.2-to-eap7.3-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-eap7.3-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly10.1-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly11.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly12.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly13.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly14.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly15.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly16.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly17.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly18.0-server-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly8.2-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jboss-server-migration-wildfly9.0-0:1.7.2-10.Final_redhat_00011.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-jsoup-0:1.14.2-1.redhat_00002.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-0:3.11.5-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-resteasy-atom-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-cdi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-client-microprofile-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-crypto-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jackson2-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxb-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jaxrs-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jettison-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jose-jwt-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-jsapi-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-binding-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-json-p-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-multipart-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-rxjava2-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-spring-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-validator-provider-11-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-resteasy-yaml-provider-0:3.11.5-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-undertow-0:2.0.41-1.SP1_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-0:7.3.10-2.GA_redhat_00003.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-elytron-0:1.10.15-1.Final_redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wildfly-elytron-tool-0:1.10.15-1.Final_redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk11-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-java-jdk8-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-javadocs-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wildfly-modules-0:7.3.10-2.GA_redhat_00003.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-0:2.2.7-1.redhat_00001.1.el7eap.src", "7Server-JBEAP-7.3:eap7-wss4j-bindings-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-policy-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-common-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-dom-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-policy-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-wss4j-ws-security-stax-0:2.2.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.noarch", "7Server-JBEAP-7.3:eap7-xml-security-0:2.1.7-1.redhat_00001.1.el7eap.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: XPath Transform abuse allows for information disclosure" } ] }
rhsa-2022_0155
Vulnerability from csaf_redhat
Published
2022-01-17 21:45
Modified
2024-11-06 00:19
Summary
Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 security update
Notes
Topic
A security update is now available for Red Hat Single Sign-On 7.5 from the Customer Portal.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Red Hat Single Sign-On 7.5 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.
This release of Red Hat Single Sign-On 7.5.1 serves as a replacement for Red Hat Single Sign-On 7.5.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* Keycloak: Incorrect authorization allows unpriviledged users to create other users (CVE-2021-4133)
* keycloak-server-spi-private: ECP SAML binding bypasses authentication flows (CVE-2021-3827)
* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)
* resteasy: Error message exposes endpoint class information (CVE-2021-20289)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A security update is now available for Red Hat Single Sign-On 7.5 from the Customer Portal.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat Single Sign-On 7.5 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis release of Red Hat Single Sign-On 7.5.1 serves as a replacement for Red Hat Single Sign-On 7.5.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.\n\nSecurity Fix(es):\n\n* Keycloak: Incorrect authorization allows unpriviledged users to create other users (CVE-2021-4133)\n\n* keycloak-server-spi-private: ECP SAML binding bypasses authentication flows (CVE-2021-3827)\n\n* xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)\n\n* resteasy: Error message exposes endpoint class information (CVE-2021-20289)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0155", "url": "https://access.redhat.com/errata/RHSA-2022:0155" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=core.service.rhsso\u0026version=7.5", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=core.service.rhsso\u0026version=7.5" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.5/", "url": "https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.5/" }, { "category": "external", "summary": "1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "2007512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007512" }, { "category": "external", "summary": "2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "2033602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033602" }, { "category": "external", "summary": "CIAM-1176", "url": "https://issues.redhat.com/browse/CIAM-1176" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0155.json" } ], "title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.5.1 security update", "tracking": { "current_release_date": "2024-11-06T00:19:29+00:00", "generator": { "date": "2024-11-06T00:19:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0155", "initial_release_date": "2022-01-17T21:45:58+00:00", "revision_history": [ { "date": "2022-01-17T21:45:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-01-17T21:45:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:19:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHSSO 7.5.1", "product": { "name": "RHSSO 7.5.1", "product_id": "RHSSO 7.5.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:red_hat_single_sign_on:7" } } } ], "category": "product_family", "name": "Red Hat Single Sign-On" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Aaron Sachau" ], "organization": "SRAM" } ], "cve": "CVE-2021-3827", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-09-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2007512" } ], "notes": [ { "category": "description", "text": "A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user\u0027s credentials. The highest threat from this vulnerability is to confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "keycloak-server-spi-private: ECP SAML binding bypasses authentication flows", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHSSO 7.5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3827" }, { "category": "external", "summary": "RHBZ#2007512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2007512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3827", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3827" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3827", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3827" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v" } ], "release_date": "2021-09-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T21:45:58+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "RHSSO 7.5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0155" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "RHSSO 7.5.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "keycloak-server-spi-private: ECP SAML binding bypasses authentication flows" }, { "acknowledgments": [ { "names": [ "Grzegorz Soba\u0144ski" ], "organization": "MLabs" } ], "cve": "CVE-2021-4133", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-12-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2033602" } ], "notes": [ { "category": "description", "text": "A flaw was found in Keycloak version from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled.", "title": "Vulnerability description" }, { "category": "summary", "text": "Keycloak: Incorrect authorization allows unpriviledged users to create other users", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw affects only Red Hat Single Sign-on 7.5.0. Red Hat Single Sign-on 7.4.x releases are NOT affected. Fix is available for download from customer portal which can be applied on RH-SSO 7.5.0", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHSSO 7.5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4133" }, { "category": "external", "summary": "RHBZ#2033602", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033602" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4133", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4133" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4133", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4133" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/issues/9247", "url": "https://github.com/keycloak/keycloak/issues/9247" }, { "category": "external", "summary": "https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487", "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487" } ], "release_date": "2021-12-16T17:05:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T21:45:58+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "RHSSO 7.5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0155" }, { "category": "workaround", "details": "Access to the user-creation functionality in the REST endpoint can be deactivated using CLI commands in undertow.\nrun:\n\nbin/jboss-cli.sh --connect\n/subsystem=undertow/configuration=filter/expression-filter=keycloakPathOverrideUsersCreateEndpoint:add( \\\n expression=\"(regex(\u0027^/auth/admin/realms/(.*)/users$\u0027) and method(POST))-\u003e response-code(400)\" \\\n)\n/subsystem=undertow/server=default-server/host=default-host/filter-ref=keycloakPathOverrideUsersCreateEndpoint:add()", "product_ids": [ "RHSSO 7.5.1" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H", "version": "3.1" }, "products": [ "RHSSO 7.5.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Keycloak: Incorrect authorization allows unpriviledged users to create other users" }, { "acknowledgments": [ { "names": [ "Dirk Papenberg" ], "organization": "NTT DATA Germany" } ], "cve": "CVE-2021-20289", "cwe": { "id": "CWE-209", "name": "Generation of Error Message Containing Sensitive Information" }, "discovery_date": "2021-03-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1935927" } ], "notes": [ { "category": "description", "text": "A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method\u0027s parameter value. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "resteasy: Error message exposes endpoint class information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHSSO 7.5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20289" }, { "category": "external", "summary": "RHBZ#1935927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20289", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20289" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289" } ], "release_date": "2021-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T21:45:58+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "RHSSO 7.5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0155" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "RHSSO 7.5.1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "resteasy: Error message exposes endpoint class information" }, { "cve": "CVE-2021-40690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011190" } ], "notes": [ { "category": "description", "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: XPath Transform abuse allows for information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Since OpenShift Container Platform (OCP) 4.7, the logging-elasticsearch6-container is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHSSO 7.5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-40690" }, { "category": "external", "summary": "RHBZ#2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" } ], "release_date": "2021-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-01-17T21:45:58+00:00", "details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link (you must log in to download the update).", "product_ids": [ "RHSSO 7.5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0155" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "RHSSO 7.5.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: XPath Transform abuse allows for information disclosure" } ] }
rhsa-2022_0501
Vulnerability from csaf_redhat
Published
2022-02-09 16:18
Modified
2024-11-06 00:27
Summary
Red Hat Security Advisory: Red Hat Integration - Service Registry release and security update [2.0.3.GA]
Notes
Topic
An update to the images for Red Hat Integration Service Registry is now available from the Red Hat Container Catalog. The purpose of this text-only errata is to inform you about the security issues fixed in this release.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
This release of Red Hat Integration - Service registry 2.0.3.GA serves as a replacement for 2.0.2.GA, and includes the below security fixes.
Security Fix(es):
* kafka-clients: Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients (CVE-2021-38153)
* xmlsec: xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update to the images for Red Hat Integration Service Registry is now available from the Red Hat Container Catalog. The purpose of this text-only errata is to inform you about the security issues fixed in this release.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release of Red Hat Integration - Service registry 2.0.3.GA serves as a replacement for 2.0.2.GA, and includes the below security fixes.\n\nSecurity Fix(es):\n\n* kafka-clients: Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients (CVE-2021-38153)\n\n* xmlsec: xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:0501", "url": "https://access.redhat.com/errata/RHSA-2022:0501" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2009041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009041" }, { "category": "external", "summary": "2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0501.json" } ], "title": "Red Hat Security Advisory: Red Hat Integration - Service Registry release and security update [2.0.3.GA]", "tracking": { "current_release_date": "2024-11-06T00:27:18+00:00", "generator": { "date": "2024-11-06T00:27:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2022:0501", "initial_release_date": "2022-02-09T16:18:09+00:00", "revision_history": [ { "date": "2022-02-09T16:18:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-02-09T16:18:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-06T00:27:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHINT Service Registry 2.0.3 GA", "product": { "name": "RHINT Service Registry 2.0.3 GA", "product_id": "RHINT Service Registry 2.0.3 GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:service_registry:2.0.3" } } } ], "category": "product_family", "name": "Red Hat Integration" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-38153", "cwe": { "id": "CWE-367", "name": "Time-of-check Time-of-use (TOCTOU) Race Condition" }, "discovery_date": "2021-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2009041" } ], "notes": [ { "category": "description", "text": "Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.0.3 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-38153" }, { "category": "external", "summary": "RHBZ#2009041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009041" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-38153", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38153" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-38153", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38153" } ], "release_date": "2021-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-09T16:18:09+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.0.3 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0501" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "RHINT Service Registry 2.0.3 GA" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kafka: Timing Attack Vulnerability for Apache Kafka Connect and Clients" }, { "cve": "CVE-2021-40690", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2011190" } ], "notes": [ { "category": "description", "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security: XPath Transform abuse allows for information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Since OpenShift Container Platform (OCP) 4.7, the logging-elasticsearch6-container is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "RHINT Service Registry 2.0.3 GA" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-40690" }, { "category": "external", "summary": "RHBZ#2011190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40690", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" }, { "category": "external", "summary": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" } ], "release_date": "2021-09-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-02-09T16:18:09+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "RHINT Service Registry 2.0.3 GA" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:0501" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "RHINT Service Registry 2.0.3 GA" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security: XPath Transform abuse allows for information disclosure" } ] }
wid-sec-w-2023-1018
Vulnerability from csaf_certbund
Published
2023-04-18 22:00
Modified
2023-04-18 22:00
Summary
Oracle Enterprise Manager: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Enterprise Manager (OEM) ist ein Set von System Management Werkzeugen von Oracle für Oracle Umgebungen. Es beinhaltet Werkzeuge zum Monitoring von Oracle Umgebung und zur Automatisierung von Datenbank- und Applikations Administration.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Enterprise Manager ausnutzen, um die Vertraulichkeit und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Enterprise Manager (OEM) ist ein Set von System Management Werkzeugen von Oracle f\u00fcr Oracle Umgebungen. Es beinhaltet Werkzeuge zum Monitoring von Oracle Umgebung und zur Automatisierung von Datenbank- und Applikations Administration.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Enterprise Manager ausnutzen, um die Vertraulichkeit und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1018 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1018.json" }, { "category": "self", "summary": "WID-SEC-2023-1018 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1018" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2023 - Appendix Oracle Enterprise Manager vom 2023-04-18", "url": "https://www.oracle.com/security-alerts/cpuapr2023.html#AppendixEM" } ], "source_lang": "en-US", "title": "Oracle Enterprise Manager: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:24:37.884+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1018", "initial_release_date": "2023-04-18T22:00:00.000+00:00", "revision_history": [ { "date": "2023-04-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Enterprise Manager 12.4.0.0", "product": { "name": "Oracle Enterprise Manager 12.4.0.0", "product_id": "T018973", "product_identification_helper": { "cpe": "cpe:/a:oracle:enterprise_manager:12.4.0.0" } } }, { "category": "product_name", "name": "Oracle Enterprise Manager 13.3.0.1", "product": { "name": "Oracle Enterprise Manager 13.3.0.1", "product_id": "T018974", "product_identification_helper": { "cpe": "cpe:/a:oracle:enterprise_manager:13.3.0.1" } } } ], "category": "product_name", "name": "Enterprise Manager" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Oracle Enterprise Manager existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018973", "T018974" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In Oracle Enterprise Manager existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018973", "T018974" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2022-23437" }, { "cve": "CVE-2021-40690", "notes": [ { "category": "description", "text": "In Oracle Enterprise Manager existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018973", "T018974" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-40690" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Oracle Enterprise Manager existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018973", "T018974" ] }, "release_date": "2023-04-18T22:00:00Z", "title": "CVE-2021-36374" } ] }
wid-sec-w-2023-2676
Vulnerability from csaf_certbund
Published
2023-10-17 22:00
Modified
2023-10-17 22:00
Summary
Oracle Enterprise Manager: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Enterprise Manager (OEM) ist ein Set von System Management Werkzeugen von Oracle für Oracle Umgebungen. Es beinhaltet Werkzeuge zum Monitoring von Oracle Umgebung und zur Automatisierung von Datenbank- und Applikations Administration.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Enterprise Manager ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Enterprise Manager (OEM) ist ein Set von System Management Werkzeugen von Oracle f\u00fcr Oracle Umgebungen. Es beinhaltet Werkzeuge zum Monitoring von Oracle Umgebung und zur Automatisierung von Datenbank- und Applikations Administration.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Enterprise Manager ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2676 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2676.json" }, { "category": "self", "summary": "WID-SEC-2023-2676 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2676" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - October 2023 - Appendix Oracle Enterprise Manager vom 2023-10-17", "url": "https://www.oracle.com/security-alerts/cpuoct2023.html#AppendixEM" } ], "source_lang": "en-US", "title": "Oracle Enterprise Manager: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-10-17T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:48:10.582+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2676", "initial_release_date": "2023-10-17T22:00:00.000+00:00", "revision_history": [ { "date": "2023-10-17T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Enterprise Manager 12.4.0.0", "product": { "name": "Oracle Enterprise Manager 12.4.0.0", "product_id": "T018973", "product_identification_helper": { "cpe": "cpe:/a:oracle:enterprise_manager:12.4.0.0" } } }, { "category": "product_name", "name": "Oracle Enterprise Manager 13.3.0.1", "product": { "name": "Oracle Enterprise Manager 13.3.0.1", "product_id": "T018974", "product_identification_helper": { "cpe": "cpe:/a:oracle:enterprise_manager:13.3.0.1" } } }, { "category": "product_name", "name": "Oracle Enterprise Manager 13.5.0.0", "product": { "name": "Oracle Enterprise Manager 13.5.0.0", "product_id": "T020692", "product_identification_helper": { "cpe": "cpe:/a:oracle:enterprise_manager:13.5.0.0" } } }, { "category": "product_name", "name": "Oracle Enterprise Manager 13.5.1.1", "product": { "name": "Oracle Enterprise Manager 13.5.1.1", "product_id": "T022832", "product_identification_helper": { "cpe": "cpe:/a:oracle:enterprise_manager:13.5.1.1" } } } ], "category": "product_name", "name": "Enterprise Manager" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "In Oracle Enterprise Manager existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018973", "T018974", "T022832", "T020692" ] }, "release_date": "2023-10-17T22:00:00Z", "title": "CVE-2023-23914" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Oracle Enterprise Manager existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018973", "T018974", "T022832", "T020692" ] }, "release_date": "2023-10-17T22:00:00Z", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Oracle Enterprise Manager existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018973", "T018974", "T022832", "T020692" ] }, "release_date": "2023-10-17T22:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2021-40690", "notes": [ { "category": "description", "text": "In Oracle Enterprise Manager existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018973", "T018974", "T022832", "T020692" ] }, "release_date": "2023-10-17T22:00:00Z", "title": "CVE-2021-40690" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Oracle Enterprise Manager existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL-HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018973", "T018974", "T022832", "T020692" ] }, "release_date": "2023-10-17T22:00:00Z", "title": "CVE-2020-36518" } ] }
wid-sec-w-2023-2993
Vulnerability from csaf_certbund
Published
2023-11-21 23:00
Modified
2023-12-12 23:00
Summary
Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence and Atlassian Jira Software: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Bamboo ist ein Werkzeug zur kontinuierlichen Integration und Bereitstellung, das automatisierte Builds, Tests und Freigaben in einem einzigen Arbeitsablauf verbindet.
Bitbucket ist ein Git-Server zur Sourcecode-Versionskontrolle.
Confluence ist eine kommerzielle Wiki-Software.
Jira ist eine Webanwendung zur Softwareentwicklung.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuführen, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Bamboo ist ein Werkzeug zur kontinuierlichen Integration und Bereitstellung, das automatisierte Builds, Tests und Freigaben in einem einzigen Arbeitsablauf verbindet.\r\nBitbucket ist ein Git-Server zur Sourcecode-Versionskontrolle.\r\nConfluence ist eine kommerzielle Wiki-Software.\r\nJira ist eine Webanwendung zur Softwareentwicklung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2993 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2993.json" }, { "category": "self", "summary": "WID-SEC-2023-2993 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2993" }, { "category": "external", "summary": "Atlassian Security Bulletin vom 2023-11-21", "url": "https://confluence.atlassian.com/security/security-bulletin-november-21-2023-1318881573.html" }, { "category": "external", "summary": "Atlassian Security Bulletin December 12 2023 vom 2023-12-12", "url": "https://confluence.atlassian.com/security/security-bulletin-december-12-2023-1319249520.html" } ], "source_lang": "en-US", "title": "Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence and Atlassian Jira Software: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-12-12T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:52:18.317+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-2993", "initial_release_date": "2023-11-21T23:00:00.000+00:00", "revision_history": [ { "date": "2023-11-21T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-11-23T23:00:00.000+00:00", "number": "2", "summary": "Bewertung angepasst" }, { "date": "2023-12-12T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates aufgenommen" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Atlassian Bamboo \u003c 9.2.7", "product": { "name": "Atlassian Bamboo \u003c 9.2.7", "product_id": "1529586", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bamboo:9.2.7" } } }, { "category": "product_name", "name": "Atlassian Bamboo \u003c 9.2.7", "product": { "name": "Atlassian Bamboo \u003c 9.2.7", "product_id": "T031322", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bamboo:9.2.7" } } }, { "category": "product_name", "name": "Atlassian Bamboo \u003c 9.3.4", "product": { "name": "Atlassian Bamboo \u003c 9.3.4", "product_id": "T031323", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bamboo:9.3.4" } } }, { "category": "product_name", "name": "Atlassian Bamboo \u003c 9.3.5", "product": { "name": "Atlassian Bamboo \u003c 9.3.5", "product_id": "T031324", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bamboo:9.3.5" } } } ], "category": "product_name", "name": "Bamboo" }, { "branches": [ { "category": "product_name", "name": "Atlassian Bitbucket \u003c 7.21.18", "product": { "name": "Atlassian Bitbucket \u003c 7.21.18", "product_id": "T031325", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bitbucket:7.21.18" } } }, { "category": "product_name", "name": "Atlassian Bitbucket \u003c 8.9.7", "product": { "name": "Atlassian Bitbucket \u003c 8.9.7", "product_id": "T031614", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bitbucket:8.9.7" } } }, { "category": "product_name", "name": "Atlassian Bitbucket \u003c 8.11.6", "product": { "name": "Atlassian Bitbucket \u003c 8.11.6", "product_id": "T031615", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bitbucket:8.11.6" } } }, { "category": "product_name", "name": "Atlassian Bitbucket \u003c 8.12.4", "product": { "name": "Atlassian Bitbucket \u003c 8.12.4", "product_id": "T031616", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bitbucket:8.12.4" } } }, { "category": "product_name", "name": "Atlassian Bitbucket \u003c 8.13.3", "product": { "name": "Atlassian Bitbucket \u003c 8.13.3", "product_id": "T031617", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bitbucket:8.13.3" } } }, { "category": "product_name", "name": "Atlassian Bitbucket \u003c 8.14.2", "product": { "name": "Atlassian Bitbucket \u003c 8.14.2", "product_id": "T031618", "product_identification_helper": { "cpe": "cpe:/a:atlassian:bitbucket:8.14.2" } } } ], "category": "product_name", "name": "Bitbucket" }, { "branches": [ { "category": "product_name", "name": "Atlassian Confluence \u003c 8.3.4", "product": { "name": "Atlassian Confluence \u003c 8.3.4", "product_id": "T030846", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:8.3.4" } } }, { "category": "product_name", "name": "Atlassian Confluence \u003c 8.6.1", "product": { "name": "Atlassian Confluence \u003c 8.6.1", "product_id": "T031326", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:8.6.1" } } }, { "category": "product_name", "name": "Atlassian Confluence \u003c 7.19.17", "product": { "name": "Atlassian Confluence \u003c 7.19.17", "product_id": "T031609", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:7.19.17" } } }, { "category": "product_name", "name": "Atlassian Confluence \u003c 8.4.5", "product": { "name": "Atlassian Confluence \u003c 8.4.5", "product_id": "T031610", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:8.4.5" } } }, { "category": "product_name", "name": "Atlassian Confluence \u003c 8.5.4", "product": { "name": "Atlassian Confluence \u003c 8.5.4", "product_id": "T031611", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:8.5.4" } } }, { "category": "product_name", "name": "Atlassian Confluence \u003c 8.6.2", "product": { "name": "Atlassian Confluence \u003c 8.6.2", "product_id": "T031612", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:8.6.2" } } }, { "category": "product_name", "name": "Atlassian Confluence \u003c 8.7.1", "product": { "name": "Atlassian Confluence \u003c 8.7.1", "product_id": "T031613", "product_identification_helper": { "cpe": "cpe:/a:atlassian:confluence:8.7.1" } } } ], "category": "product_name", "name": "Confluence" }, { "branches": [ { "category": "product_name", "name": "Atlassian Jira Software \u003c 9.11.3", "product": { "name": "Atlassian Jira Software \u003c 9.11.3", "product_id": "T031327", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:9.11.3" } } }, { "category": "product_name", "name": "Atlassian Jira Software \u003c 9.4.13", "product": { "name": "Atlassian Jira Software \u003c 9.4.13", "product_id": "T031606", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:9.4.13" } } }, { "category": "product_name", "name": "Atlassian Jira Software Service Management \u003c 4.20.28", "product": { "name": "Atlassian Jira Software Service Management \u003c 4.20.28", "product_id": "T031607", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:service_management__4.20.28" } } }, { "category": "product_name", "name": "Atlassian Jira Software Service Management \u003c 5.4.12", "product": { "name": "Atlassian Jira Software Service Management \u003c 5.4.12", "product_id": "T031608", "product_identification_helper": { "cpe": "cpe:/a:atlassian:jira_software:service_management__5.4.12" } } } ], "category": "product_name", "name": "Jira Software" } ], "category": "vendor", "name": "Atlassian" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-42794", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2023-42794" }, { "cve": "CVE-2023-34396", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2023-34396" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-22521", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2023-22521" }, { "cve": "CVE-2023-22516", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2023-22516" }, { "cve": "CVE-2022-45143", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2022-45143" }, { "cve": "CVE-2022-42890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2022-42890" }, { "cve": "CVE-2022-42252", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2022-42252" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-41704", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2022-41704" }, { "cve": "CVE-2022-40146", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2022-40146" }, { "cve": "CVE-2022-28366", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2022-28366" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2022-25647" }, { "cve": "CVE-2021-46877", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2021-46877" }, { "cve": "CVE-2021-40690", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2021-40690" }, { "cve": "CVE-2021-37714", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2021-37714" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2021-28165" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2017-9735", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2017-9735" }, { "cve": "CVE-2017-7656", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Atlassian Bamboo, Atlassian Bitbucket, Atlassian Confluence und Atlassian Jira Software. Diese Fehler bestehen unter anderem in verschiedenen Komponenten wie com.google.guava:guava oder jackson-databind. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. F\u00fcr eine erfolgreiche Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig." } ], "product_status": { "known_affected": [ "T031610", "T031612", "T031611", "T031614", "T031613", "1529586", "T030846", "T031616", "T031615", "T031607", "T031618", "T031606", "T031617", "T031609", "T031608" ] }, "release_date": "2023-11-21T23:00:00Z", "title": "CVE-2017-7656" } ] }
wid-sec-w-2023-1815
Vulnerability from csaf_certbund
Published
2023-07-18 22:00
Modified
2023-07-18 22:00
Summary
Oracle Commerce: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Commerce ist eine elektronische Handelsplattform.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Commerce ausnutzen, um die Vertraulichkeit, Integrität und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Commerce ist eine elektronische Handelsplattform.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Commerce ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1815 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1815.json" }, { "category": "self", "summary": "WID-SEC-2023-1815 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1815" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - July 2023 - Appendix Oracle Commerce vom 2023-07-18", "url": "https://www.oracle.com/security-alerts/cpujul2023.html#AppendixOCOM" } ], "source_lang": "en-US", "title": "Oracle Commerce: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-07-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:37:26.030+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-1815", "initial_release_date": "2023-07-18T22:00:00.000+00:00", "revision_history": [ { "date": "2023-07-18T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Commerce 11.3.0", "product": { "name": "Oracle Commerce 11.3.0", "product_id": "T018931", "product_identification_helper": { "cpe": "cpe:/a:oracle:commerce:11.3.0" } } }, { "category": "product_name", "name": "Oracle Commerce 11.3.1", "product": { "name": "Oracle Commerce 11.3.1", "product_id": "T018932", "product_identification_helper": { "cpe": "cpe:/a:oracle:commerce:11.3.1" } } }, { "category": "product_name", "name": "Oracle Commerce 11.3.2", "product": { "name": "Oracle Commerce 11.3.2", "product_id": "T018933", "product_identification_helper": { "cpe": "cpe:/a:oracle:commerce:11.3.2" } } } ], "category": "product_name", "name": "Commerce" } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-28439", "notes": [ { "category": "description", "text": "In Oracle Commerce existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018931", "T018932", "T018933" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-28439" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Oracle Commerce existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018931", "T018932", "T018933" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2023-24998" }, { "cve": "CVE-2022-45143", "notes": [ { "category": "description", "text": "In Oracle Commerce existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018931", "T018932", "T018933" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-45143" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Oracle Commerce existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018931", "T018932", "T018933" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In Oracle Commerce existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018931", "T018932", "T018933" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2022-23437" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "In Oracle Commerce existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018931", "T018932", "T018933" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-40690", "notes": [ { "category": "description", "text": "In Oracle Commerce existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018931", "T018932", "T018933" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2021-40690" }, { "cve": "CVE-2019-10086", "notes": [ { "category": "description", "text": "In Oracle Commerce existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T018931", "T018932", "T018933" ] }, "release_date": "2023-07-18T22:00:00Z", "title": "CVE-2019-10086" } ] }
wid-sec-w-2022-1738
Vulnerability from csaf_certbund
Published
2022-10-16 22:00
Modified
2023-09-27 22:00
Summary
IBM InfoSphere Information Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM InfoSphere Information Server ist eine Softwareplattform zur Integration heterogener Daten.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM InfoSphere Information Server ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM InfoSphere Information Server ist eine Softwareplattform zur Integration heterogener Daten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM InfoSphere Information Server ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1738 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1738.json" }, { "category": "self", "summary": "WID-SEC-2022-1738 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1738" }, { "category": "external", "summary": "IBM Security Bulletin 7038982 vom 2023-09-28", "url": "https://www.ibm.com/support/pages/node/7038982" }, { "category": "external", "summary": "IBM Security Bulletin: 6829353 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829353" }, { "category": "external", "summary": "IBM Security Bulletin: 6829371 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829371" }, { "category": "external", "summary": "IBM Security Bulletin: 6829373 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829373" }, { "category": "external", "summary": "IBM Security Bulletin: 6829335 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829335" }, { "category": "external", "summary": "IBM Security Bulletin: 6829311 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829311" }, { "category": "external", "summary": "IBM Security Bulletin: 6829369 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829369" }, { "category": "external", "summary": "IBM Security Bulletin: 6829325 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829325" }, { "category": "external", "summary": "IBM Security Bulletin: 6829365 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829365" }, { "category": "external", "summary": "IBM Security Bulletin: 6829361 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829361" }, { "category": "external", "summary": "IBM Security Bulletin: 6829339 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829339" }, { "category": "external", "summary": "IBM Security Bulletin: 6829349 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829349" }, { "category": "external", "summary": "IBM Security Bulletin: 6829363 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829363" }, { "category": "external", "summary": "IBM Security Bulletin: 6829327 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829327" }, { "category": "external", "summary": "IBM Security Bulletin 6955819 vom 2023-02-15", "url": "https://www.ibm.com/support/pages/node/6955819" } ], "source_lang": "en-US", "title": "IBM InfoSphere Information Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-09-27T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:00:50.645+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1738", "initial_release_date": "2022-10-16T22:00:00.000+00:00", "revision_history": [ { "date": "2022-10-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-11-03T23:00:00.000+00:00", "number": "2", "summary": "CVE erg\u00e4nzt" }, { "date": "2023-02-15T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-09-27T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM InfoSphere Information Server 11.7", "product": { "name": "IBM InfoSphere Information Server 11.7", "product_id": "444803", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:11.7" } } }, { "category": "product_name", "name": "IBM QRadar SIEM", "product": { "name": "IBM QRadar SIEM", "product_id": "T021415", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:-" } } } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0217", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2009-0217" }, { "cve": "CVE-2009-2625", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2009-2625" }, { "cve": "CVE-2012-0881", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2012-0881" }, { "cve": "CVE-2012-2098", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2012-2098" }, { "cve": "CVE-2013-2172", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2013-2172" }, { "cve": "CVE-2013-4002", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2013-4002" }, { "cve": "CVE-2013-4517", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2013-4517" }, { "cve": "CVE-2015-4852", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2015-4852" }, { "cve": "CVE-2015-6420", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2015-6420" }, { "cve": "CVE-2015-7501", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2015-7501" }, { "cve": "CVE-2017-15708", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2017-15708" }, { "cve": "CVE-2019-13116", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2019-13116" }, { "cve": "CVE-2021-33813", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-33813" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-40690", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-40690" }, { "cve": "CVE-2021-41089", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-41089" }, { "cve": "CVE-2021-41091", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-41091" }, { "cve": "CVE-2022-22442", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-22442" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-23437" }, { "cve": "CVE-2022-24769", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-24769" }, { "cve": "CVE-2022-30608", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-30608" }, { "cve": "CVE-2022-30615", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-30615" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-35642", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-35642" }, { "cve": "CVE-2022-35717", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-35717" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-40235", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-40235" }, { "cve": "CVE-2022-40747", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-40747" } ] }
wid-sec-w-2022-0607
Vulnerability from csaf_certbund
Published
2022-07-07 22:00
Modified
2024-05-21 22:00
Summary
Red Hat FUSE: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Fuse ist eine Open-Source-Integrationsplattform, die auf Apache Camel basiert.
Angriff
Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Red Hat FUSE ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuführen, einen Denial of Service Zustand herbeizuführen, Sicherheitsmaßnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern.
Betroffene Betriebssysteme
- Linux
- UNIX
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Fuse ist eine Open-Source-Integrationsplattform, die auf Apache Camel basiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Red Hat FUSE ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0607 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0607.json" }, { "category": "self", "summary": "WID-SEC-2022-0607 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0607" }, { "category": "external", "summary": "RHSA-2022:5532 - Security Advisory vom 2022-07-07", "url": "https://access.redhat.com/errata/RHSA-2022:5532" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5596 vom 2022-07-20", "url": "https://access.redhat.com/errata/RHSA-2022:5596" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-125 vom 2022-07-28", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-125/index.html" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-124 vom 2022-07-28", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-124/index.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5196 vom 2022-07-31", "url": "https://lists.debian.org/debian-security-announce/2022/msg00165.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:5903 vom 2022-08-04", "url": "https://access.redhat.com/errata/RHSA-2022:5903" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6787 vom 2022-10-04", "url": "https://access.redhat.com/errata/RHSA-2022:6787" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6783 vom 2022-10-04", "url": "https://access.redhat.com/errata/RHSA-2022:6783" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6782 vom 2022-10-04", "url": "https://access.redhat.com/errata/RHSA-2022:6782" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6822 vom 2022-10-05", "url": "https://access.redhat.com/errata/RHSA-2022:6822" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6823 vom 2022-10-05", "url": "https://access.redhat.com/errata/RHSA-2022:6823" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6825 vom 2022-10-05", "url": "https://access.redhat.com/errata/RHSA-2022:6825" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6821 vom 2022-10-05", "url": "https://access.redhat.com/errata/RHSA-2022:6821" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6813 vom 2022-10-05", "url": "https://access.redhat.com/errata/RHSA-2022:6813" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:6835 vom 2022-10-06", "url": "https://access.redhat.com/errata/RHSA-2022:6835" }, { "category": "external", "summary": "NetApp Security Advisory NTAP-20221014-0006 vom 2022-10-14", "url": "https://security.netapp.com/advisory/ntap-20221014-0006/" }, { "category": "external", "summary": "IBM Security Bulletin 6831855 vom 2022-10-26", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-qradar-siem-is-vulnerable-to-using-components-with-known-vulnerabilities-14/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7177 vom 2022-10-25", "url": "https://access.redhat.com/errata/RHSA-2022:7177" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7257 vom 2022-10-29", "url": "https://access.redhat.com/errata/RHSA-2022:7257" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-135 vom 2022-11-01", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-135/index.html" }, { "category": "external", "summary": "Hitachi Vulnerability Information HITACHI-SEC-2022-137 vom 2022-11-01", "url": "https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2022-137/index.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7417 vom 2022-11-03", "url": "https://access.redhat.com/errata/RHSA-2022:7417" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7409 vom 2022-11-03", "url": "https://access.redhat.com/errata/RHSA-2022:7409" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7411 vom 2022-11-03", "url": "https://access.redhat.com/errata/RHSA-2022:7411" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7410 vom 2022-11-03", "url": "https://access.redhat.com/errata/RHSA-2022:7410" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7896 vom 2022-11-09", "url": "https://access.redhat.com/errata/RHSA-2022:7896" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8761 vom 2022-12-14", "url": "https://access.redhat.com/errata/RHSA-2022:8761" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0272 vom 2023-02-06", "url": "https://access.redhat.com/errata/RHSA-2023:0272" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-070 vom 2024-02-03", "url": "https://www.dell.com/support/kbdoc/000221770/dsa-2024-=" }, { "category": "external", "summary": "IBM Security Bulletin 7144861 vom 2024-03-20", "url": "https://www.ibm.com/support/pages/node/7144861" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:3061 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:3061" } ], "source_lang": "en-US", "title": "Red Hat FUSE: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-21T22:00:00.000+00:00", "generator": { "date": "2024-05-22T09:10:48.527+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-0607", "initial_release_date": "2022-07-07T22:00:00.000+00:00", "revision_history": [ { "date": "2022-07-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-07-19T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-07-28T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2022-07-31T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-08-03T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-10-04T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-10-05T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-10-06T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-10-16T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von NetApp aufgenommen" }, { "date": "2022-10-25T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von IBM und Red Hat aufgenommen" }, { "date": "2022-10-30T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-10-31T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von HITACHI aufgenommen" }, { "date": "2022-11-03T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-11-09T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-12-14T23:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-02-06T23:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-02-04T23:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2024-03-20T23:00:00.000+00:00", "number": "18", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "19", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "19" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "EMC Avamar", "product": { "name": "EMC Avamar", "product_id": "T014381", "product_identification_helper": { "cpe": "cpe:/a:emc:avamar:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "category": "product_name", "name": "Hitachi Ops Center", "product": { "name": "Hitachi Ops Center", "product_id": "T017562", "product_identification_helper": { "cpe": "cpe:/a:hitachi:ops_center:-" } } } ], "category": "vendor", "name": "Hitachi" }, { "branches": [ { "branches": [ { "category": "product_version", "name": "7.5", "product": { "name": "IBM QRadar SIEM 7.5", "product_id": "T022954", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.5" } } }, { "category": "product_version", "name": "7.4", "product": { "name": "IBM QRadar SIEM 7.4", "product_id": "T024775", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:7.4" } } } ], "category": "product_name", "name": "QRadar SIEM" }, { "branches": [ { "category": "product_version", "name": "Plus 10.1", "product": { "name": "IBM Spectrum Protect Plus 10.1", "product_id": "T015895", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:plus_10.1" } } } ], "category": "product_name", "name": "Spectrum Protect" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "NetApp ActiveIQ Unified Manager", "product": { "name": "NetApp ActiveIQ Unified Manager", "product_id": "658714", "product_identification_helper": { "cpe": "cpe:/a:netapp:active_iq_unified_manager:-::~~~vmware_vsphere~~" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version_range", "name": "\u003c7.11.0", "product": { "name": "Red Hat FUSE \u003c7.11.0", "product_id": "723344", "product_identification_helper": { "cpe": "cpe:/a:redhat:fuse:6.0.0" } } } ], "category": "product_name", "name": "FUSE" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-25689", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2020-25689" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-7020", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2020-7020" }, { "cve": "CVE-2020-9484", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2020-9484" }, { "cve": "CVE-2021-22060", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-22060" }, { "cve": "CVE-2021-22096", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-22096" }, { "cve": "CVE-2021-22119", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-22119" }, { "cve": "CVE-2021-22569", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-22569" }, { "cve": "CVE-2021-22573", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-22573" }, { "cve": "CVE-2021-24122", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-24122" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25122", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-25122" }, { "cve": "CVE-2021-25329", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-25329" }, { "cve": "CVE-2021-29505", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-29505" }, { "cve": "CVE-2021-30640", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-30640" }, { "cve": "CVE-2021-33037", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-33037" }, { "cve": "CVE-2021-33813", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-33813" }, { "cve": "CVE-2021-35515", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-35515" }, { "cve": "CVE-2021-35516", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-35516" }, { "cve": "CVE-2021-35517", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-35517" }, { "cve": "CVE-2021-36090", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-36090" }, { "cve": "CVE-2021-3629", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-3629" }, { "cve": "CVE-2021-3642", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-3642" }, { "cve": "CVE-2021-3644", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-3644" }, { "cve": "CVE-2021-3807", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-3807" }, { "cve": "CVE-2021-38153", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-38153" }, { "cve": "CVE-2021-3859", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-3859" }, { "cve": "CVE-2021-40690", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-40690" }, { "cve": "CVE-2021-41079", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-41079" }, { "cve": "CVE-2021-41766", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-41766" }, { "cve": "CVE-2021-4178", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-4178" }, { "cve": "CVE-2021-42340", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-42340" }, { "cve": "CVE-2021-42550", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-42550" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-43859", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2021-43859" }, { "cve": "CVE-2022-0084", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-0084" }, { "cve": "CVE-2022-1259", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-1259" }, { "cve": "CVE-2022-1319", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-1319" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21724", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-21724" }, { "cve": "CVE-2022-22932", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-22932" }, { "cve": "CVE-2022-22950", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-22950" }, { "cve": "CVE-2022-22968", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-22968" }, { "cve": "CVE-2022-22970", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-22970" }, { "cve": "CVE-2022-22971", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-22971" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-23181", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-23181" }, { "cve": "CVE-2022-23221", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-23221" }, { "cve": "CVE-2022-23596", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-23596" }, { "cve": "CVE-2022-23913", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-23913" }, { "cve": "CVE-2022-24614", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-24614" }, { "cve": "CVE-2022-25845", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-25845" }, { "cve": "CVE-2022-26336", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-26336" }, { "cve": "CVE-2022-26520", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-26520" }, { "cve": "CVE-2022-30126", "notes": [ { "category": "description", "text": "In Red Hat FUSE existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Elasticsearch, Apache Tomcat, JUnit4, WildFly, JetBrains Kotlin, Jackson Databind, MySQL, Undertow, Node.js, Fabric 8 Kubernetes, Spring Framework, XStream, JDOM, Apache Commons, Apache Kafka, Apache Santuario, Apache Karaf, Netty, XNIO, PostgreSQL, Spring Security, H2 Console, Junrar, ActiveMQ Artemis, fast JSON, Apache POI, Postgres JDBC und Apache Tika. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen, beliebigen Code auszuf\u00fchren, einen Denial of Service Zustand herbeizuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Daten und Informationen zu manipulieren und seine Privilegien zu erweitern. Die erfolgreiche Ausnutzung einiger dieser Sicherheitsl\u00fccken erfordert eine Benutzerinteraktion und erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T022954", "T014381", "2951", "67646", "T024775", "658714", "T015895", "T017562" ] }, "release_date": "2022-07-07T22:00:00Z", "title": "CVE-2022-30126" } ] }
gsd-2021-40690
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-40690", "description": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "id": "GSD-2021-40690", "references": [ "https://www.suse.com/security/cve/CVE-2021-40690.html", "https://www.debian.org/security/2021/dsa-5010", "https://access.redhat.com/errata/RHSA-2022:0501", "https://access.redhat.com/errata/RHSA-2022:0164", "https://access.redhat.com/errata/RHSA-2022:0155", "https://access.redhat.com/errata/RHSA-2022:0152", "https://access.redhat.com/errata/RHSA-2022:0151", "https://access.redhat.com/errata/RHSA-2022:0146", "https://access.redhat.com/errata/RHSA-2021:5170", "https://access.redhat.com/errata/RHSA-2021:5154", "https://access.redhat.com/errata/RHSA-2021:5151", "https://access.redhat.com/errata/RHSA-2021:5150", "https://access.redhat.com/errata/RHSA-2021:5149", "https://access.redhat.com/errata/RHSA-2022:1013", "https://access.redhat.com/errata/RHSA-2022:5532", "https://ubuntu.com/security/CVE-2021-40690", "https://access.redhat.com/errata/RHSA-2021:4679", "https://access.redhat.com/errata/RHSA-2022:6407" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-40690" ], "details": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "id": "GSD-2021-40690", "modified": "2023-12-13T01:23:25.859121Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2021-40690", "STATE": "PUBLIC", "TITLE": "Bypass of the secureValidation property" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Santuario", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "XML Security for Java", "version_value": "2.2.3,2.1.7" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "An Trinh, Calif." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": [ {} ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "refsource": "MISC", "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" }, { "name": "[tomee-commits] 20210922 [tomee] 02/02: Update xmlsec to 2.2.3 to mitigate CVE-2021-40690", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E" }, { "name": "[tomee-commits] 20210923 [jira] [Resolved] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E" }, { "name": "[tomee-commits] 20210923 [jira] [Created] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E" }, { "name": "[tomee-commits] 20210923 [jira] [Assigned] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E" }, { "name": "[tomee-commits] 20210923 [jira] [Updated] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E" }, { "name": "[poi-user] 20210923 Re: CVE-2021-40690 on xmlsec jar", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E" }, { "name": "[debian-lts-announce] 20210927 [SECURITY] [DLA 2767-1] libxml-security-java security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html" }, { "name": "[cxf-issues] 20211027 [jira] [Created] (CXF-8613) High Security issues reported with Apache Santuario library bundled in CXF 3.4.4", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E" }, { "name": "[tomee-commits] 20211028 [jira] [Updated] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E" }, { "name": "DSA-5010", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-5010" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "https://www.oracle.com/security-alerts/cpujul2022.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "https://security.netapp.com/advisory/ntap-20230818-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20230818-0002/" } ] }, "source": { "discovery": "UNKNOWN" } }, "gitlab.com": { "advisories": [ { "affected_range": "[3.4.4]", "affected_versions": "Version 3.4.4", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-200", "CWE-937" ], "date": "2023-08-18", "description": "Apache Santuario - XML Security for Java is vulnerable to an issue where the `secureValidation` property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "fixed_versions": [ "3.4.5" ], "identifier": "CVE-2021-40690", "identifiers": [ "CVE-2021-40690" ], "not_impacted": "All versions before 3.4.4, all versions after 3.4.4", "package_slug": "maven/org.apache.cxf/cxf", "pubdate": "2021-09-19", "solution": "Upgrade to version 3.4.5 or above.", "title": "Exposure of Sensitive Information to an Unauthorized Actor", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-40690", "https://issues.apache.org/jira/browse/CXF-8613", "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E", "https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E", "https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E", "https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E", "https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E", "https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E", "https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html", "https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E", "https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E", "https://www.debian.org/security/2021/dsa-5010" ], "uuid": "5bc587b1-3cce-44d3-ab10-6b72f9c22497" }, { "affected_range": "(,2.1.7),[2.2.0,2.2.3)", "affected_versions": "All versions before 2.1.7, all versions starting from 2.2.0 before 2.2.3", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-200", "CWE-937" ], "date": "2023-08-18", "description": "Apache Santuario - XML Security for Java is vulnerable to an issue where the `secureValidation` property is not passed correctly when creating a `KeyInfo` from a `KeyInfoReference` element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a `RetrievalMethod` element.", "fixed_versions": [ "2.1.7", "2.2.3" ], "identifier": "CVE-2021-40690", "identifiers": [ "CVE-2021-40690" ], "not_impacted": "All versions starting from 2.1.7 before 2.2.0, all versions starting from 2.2.3", "package_slug": "maven/org.apache.santuario/xmlsec", "pubdate": "2021-09-19", "solution": "Upgrade to versions 2.1.7, 2.2.3 or above.", "title": "Exposure of Sensitive Information to an Unauthorized Actor", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" ], "uuid": "2304b624-0d1a-429d-b2de-ab16b2e9e356" }, { "affected_range": "(,8.0.8)", "affected_versions": "All versions before 8.0.8", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-200", "CWE-937" ], "date": "2023-08-18", "description": "All versions of Apache Santuario - XML Security for Java is vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "fixed_versions": [ "8.0.8" ], "identifier": "CVE-2021-40690", "identifiers": [ "CVE-2021-40690" ], "not_impacted": "All versions starting from 8.0.8", "package_slug": "maven/org.apache.tomee/openejb-lite", "pubdate": "2021-09-19", "solution": "Upgrade to version 8.0.8 or above.", "title": "Exposure of Sensitive Information to an Unauthorized Actor", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" ], "uuid": "df83d941-4d47-41e0-a154-59bfe3bd9e0d" }, { "affected_range": "(,8.0.8)", "affected_versions": "All versions before 8.0.8", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-200", "CWE-937" ], "date": "2023-08-18", "description": "All versions of Apache Santuario - XML Security for Java is vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "fixed_versions": [ "8.0.8" ], "identifier": "CVE-2021-40690", "identifiers": [ "CVE-2021-40690" ], "not_impacted": "All versions starting from 8.0.8", "package_slug": "maven/org.apache.tomee/tomee-webapp", "pubdate": "2021-09-19", "solution": "Upgrade to version 8.0.8 or above.", "title": "Exposure of Sensitive Information to an Unauthorized Actor", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" ], "uuid": "f9b6c0f1-d35e-4373-94d8-8d4c0914c9cd" }, { "affected_range": "(,8.0.8)", "affected_versions": "All versions before 8.0.8", "cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "cwe_ids": [ "CWE-1035", "CWE-200", "CWE-937" ], "date": "2023-08-18", "description": "All versions of Apache Santuario - XML Security for Java is vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "fixed_versions": [ "8.0.8" ], "identifier": "CVE-2021-40690", "identifiers": [ "CVE-2021-40690" ], "not_impacted": "All versions starting from 8.0.8", "package_slug": "maven/org.apache.tomee/tomee", "pubdate": "2021-09-19", "solution": "Upgrade to version 8.0.8 or above.", "title": "Exposure of Sensitive Information to an Unauthorized Actor", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" ], "uuid": "8976062c-9323-4e8e-92b4-08433bf87301" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.1.7", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.2.3", "versionStartIncluding": "2.2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:tomee:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.0.8", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:cxf:3.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:agile_plm:9.3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:outside_in_technology:8.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:retail_merchandising_system:16.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:retail_service_backbone:16.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:retail_financial_integration:16.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:retail_integration_bus:16.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:retail_service_backbone:15.0.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:retail_service_backbone:14.1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:retail_merchandising_system:19.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:retail_integration_bus:14.1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:retail_financial_integration:14.1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:retail_integration_bus:15.0.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:retail_financial_integration:15.0.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:commerce_platform:11.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:retail_service_backbone:19.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:retail_integration_bus:19.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:retail_financial_integration:19.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.1.0", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.2.3", "versionStartIncluding": "8.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:retail_bulk_data_integration:16.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2021-40690" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E", "refsource": "MISC", "tags": [ "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" }, { "name": "[tomee-commits] 20210922 [tomee] 02/02: Update xmlsec to 2.2.3 to mitigate CVE-2021-40690", "refsource": "MLIST", "tags": [ "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E" }, { "name": "[tomee-commits] 20210923 [jira] [Resolved] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "refsource": "MLIST", "tags": [ "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E" }, { "name": "[tomee-commits] 20210923 [jira] [Assigned] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "refsource": "MLIST", "tags": [ "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E" }, { "name": "[tomee-commits] 20210923 [jira] [Updated] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "refsource": "MLIST", "tags": [ "Exploit", "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E" }, { "name": "[tomee-commits] 20210923 [jira] [Created] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "refsource": "MLIST", "tags": [ "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E" }, { "name": "[poi-user] 20210923 Re: CVE-2021-40690 on xmlsec jar", "refsource": "MLIST", "tags": [ "Exploit", "Issue Tracking", "Mailing List", "Patch", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E" }, { "name": "[debian-lts-announce] 20210927 [SECURITY] [DLA 2767-1] libxml-security-java security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html" }, { "name": "[cxf-issues] 20211027 [jira] [Created] (CXF-8613) High Security issues reported with Apache Santuario library bundled in CXF 3.4.4", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E" }, { "name": "[tomee-commits] 20211028 [jira] [Updated] (TOMEE-3798) TomEE (8.0.8) is affected by CVE-2021-40690 vulnerability", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E" }, { "name": "DSA-5010", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-5010" }, { "name": "https://www.oracle.com/security-alerts/cpuapr2022.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "name": "N/A", "refsource": "N/A", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "name": "https://security.netapp.com/advisory/ntap-20230818-0002/", "refsource": "CONFIRM", "tags": [], "url": "https://security.netapp.com/advisory/ntap-20230818-0002/" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2023-08-18T14:15Z", "publishedDate": "2021-09-19T18:15Z" } } }
ghsa-j8wc-gxx9-82hx
Vulnerability from github
Published
2021-09-20 23:18
Modified
2021-10-04 14:16
Severity ?
Summary
Exposure of Sensitive Information to an Unauthorized Actor in Apache Santuario
Details
All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.apache.santuario:xmlsec" }, "ranges": [ { "events": [ { "introduced": "2.2.0" }, { "fixed": "2.2.3" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.santuario:xmlsec" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.1.7" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2021-40690" ], "database_specific": { "cwe_ids": [ "CWE-200" ], "github_reviewed": true, "github_reviewed_at": "2021-09-20T20:24:35Z", "nvd_published_at": "2021-09-19T18:15:00Z", "severity": "HIGH" }, "details": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.", "id": "GHSA-j8wc-gxx9-82hx", "modified": "2021-10-04T14:16:41Z", "published": "2021-09-20T23:18:41Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20230818-0002" }, { "type": "WEB", "url": "https://www.debian.org/security/2021/dsa-5010" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "type": "WEB", "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Exposure of Sensitive Information to an Unauthorized Actor in Apache Santuario" }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.