RHSA-2025:4226

Vulnerability from csaf_redhat - Published: 2025-04-28 00:20 - Updated: 2026-04-01 19:07
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.10 on RHEL 7 security update
Severity
Important
Notes
Topic: A security update is now available for Red Hat JBoss Enterprise Application Platform 7.1 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.1.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.1.9 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

A flaw was found in Undertow. A buffer leak on the incoming WebSocket PONG message may lead to memory exhaustion. This flaw allows an attacker to cause a denial of service. The highest threat from this vulnerability is availability.

CWE-401 - Missing Release of Memory after Effective Lifetime
Vendor Fix Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2025:4226

A flaw was found in Undertow that tripped the client-side invocation timeout with certain calls made over HTTP2. This flaw allows an attacker to carry out denial of service attacks.

CWE-214 - Invocation of Process Using Visible Sensitive Information
Vendor Fix Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2025:4226

jsoup is a Java library for working with HTML. Those using jsoup versions prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. The issue is patched in version 1.14.2. There are a few available workarounds. Users may rate limit input parsing, limit the size of inputs based on system resources, and/or implement thread watchdogs to cap and timeout parse runtimes.

CWE-400 - Uncontrolled Resource Consumption
Vendor Fix Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2025:4226

All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.

CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Vendor Fix Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2025:4226

A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a message to another expected end. This flaw allows an attacker to send flawed requests to a server, possibly causing log contention-related performance concerns or an unwanted disk fill-up.

CWE-770 - Allocation of Resources Without Limits or Throttling
Vendor Fix Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2025:4226

A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.

CWE-252 - Unchecked Return Value
Vendor Fix Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2025:4226

A flaw was found in Undertow. AJP requests to the server may allow an attacker to send a malicious request and trigger server errors, resulting in a denial of service.

CWE-770 - Allocation of Resources Without Limits or Throttling
Vendor Fix Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2025:4226

In Apache ActiveMQ Artemis prior to 2.20.0 or 2.19.1, an attacker could partially disrupt availability (DoS) through uncontrolled resource consumption of memory.

CWE-770 - Allocation of Resources Without Limits or Throttling
Vendor Fix Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2025:4226

A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.

CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Vendor Fix Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2025:4226
Workaround Sanitize the user-provided locale name before passing it to Moment.js.

A flaw was found in gson, which is vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes. This issue may lead to availability attacks.

CWE-502 - Deserialization of Untrusted Data
Vendor Fix Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2025:4226

A flaw was found in the org.yaml.snakeyaml package. This flaw allows an attacker to cause a denial of service (DoS) due to missing nested depth limitation for collections.

CWE-400 - Uncontrolled Resource Consumption
Vendor Fix Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2025:4226

A stack-based buffer overflow vulnerability was found in Jettison, where parsing an untrusted XML or JSON data may lead to a crash. This flaw allows an attacker to supply content that causes the parser to crash by writing outside the memory bounds if the parser is running on user-supplied input, resulting in a denial of service attack.

CWE-787 - Out-of-bounds Write
Vendor Fix Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2025:4226

A flaw was found in the FasterXML/woodstox package. This flaw allows an attacker to cause a denial of service (DoS) in its target via XML serialization. An attacker may benefit from the parser sending a malicious input that may cause a crash. This vulnerability is only relevant for users using the DTD parsing functionality.

CWE-787 - Out-of-bounds Write
Vendor Fix Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2025:4226

A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.

CWE-835 - Loop with Unreachable Exit Condition ('Infinite Loop')
Vendor Fix Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2025:4226

A flaw was found in Undertow package. Using the FormAuthenticationMechanism, a malicious user could trigger a Denial of Service by sending crafted requests, leading the server to an OutofMemory error, exhausting the server's memory.

CWE-20 - Improper Input Validation
Vendor Fix Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2025:4226

A flaw was found in undertow. Servlets annotated with @MultipartConfig may cause an OutOfMemoryError due to large multipart content. This may allow unauthorized users to cause remote Denial of Service (DoS) attack. If the server uses fileSizeThreshold to limit the file size, it's possible to bypass the limit by setting the file name in the request to null.

CWE-789 - Memory Allocation with Excessive Size Value
Vendor Fix Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2025:4226

A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available. At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree leaks via that task, which is added to XNIO WorkerThread. So, the workerThread points to the Undertow conduit, which contains the connections and causes the leak.

CWE-400 - Uncontrolled Resource Consumption
Vendor Fix Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2025:4226
Workaround No mitigation is currently available for this vulnerability. However, there might be some protections, such as request limits by a load balancer in front of JBoss EAP/Wildfly or even Undertow, that could minimize the impact.
References
https://access.redhat.com/errata/RHSA-2025:4226 self
https://access.redhat.com/security/updates/classi… external
https://docs.redhat.com/en/documentation/red_hat_… external
https://docs.redhat.com/en/documentation/red_hat_… external
https://bugzilla.redhat.com/show_bug.cgi?id=1991299 external
https://bugzilla.redhat.com/show_bug.cgi?id=1995259 external
https://bugzilla.redhat.com/show_bug.cgi?id=2010378 external
https://bugzilla.redhat.com/show_bug.cgi?id=2011190 external
https://bugzilla.redhat.com/show_bug.cgi?id=2063601 external
https://bugzilla.redhat.com/show_bug.cgi?id=2064226 external
https://bugzilla.redhat.com/show_bug.cgi?id=2072009 external
https://bugzilla.redhat.com/show_bug.cgi?id=2073890 external
https://bugzilla.redhat.com/show_bug.cgi?id=2080850 external
https://bugzilla.redhat.com/show_bug.cgi?id=2095862 external
https://bugzilla.redhat.com/show_bug.cgi?id=2126789 external
https://bugzilla.redhat.com/show_bug.cgi?id=2134291 external
https://bugzilla.redhat.com/show_bug.cgi?id=2135771 external
https://bugzilla.redhat.com/show_bug.cgi?id=2174246 external
https://bugzilla.redhat.com/show_bug.cgi?id=2185662 external
https://bugzilla.redhat.com/show_bug.cgi?id=2209689 external
https://bugzilla.redhat.com/show_bug.cgi?id=2264928 external
https://issues.redhat.com/browse/JBEAP-29286 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2021-3690 self
https://bugzilla.redhat.com/show_bug.cgi?id=1991299 external
https://www.cve.org/CVERecord?id=CVE-2021-3690 external
https://nvd.nist.gov/vuln/detail/CVE-2021-3690 external
https://access.redhat.com/security/cve/CVE-2021-3859 self
https://bugzilla.redhat.com/show_bug.cgi?id=2010378 external
https://www.cve.org/CVERecord?id=CVE-2021-3859 external
https://nvd.nist.gov/vuln/detail/CVE-2021-3859 external
https://access.redhat.com/security/cve/CVE-2021-37714 self
https://bugzilla.redhat.com/show_bug.cgi?id=1995259 external
https://www.cve.org/CVERecord?id=CVE-2021-37714 external
https://nvd.nist.gov/vuln/detail/CVE-2021-37714 external
https://github.com/jhy/jsoup/security/advisories/… external
https://access.redhat.com/security/cve/CVE-2021-40690 self
https://bugzilla.redhat.com/show_bug.cgi?id=2011190 external
https://www.cve.org/CVERecord?id=CVE-2021-40690 external
https://nvd.nist.gov/vuln/detail/CVE-2021-40690 external
https://lists.apache.org/thread.html/r8848751b6a5… external
https://access.redhat.com/security/cve/CVE-2022-0084 self
https://bugzilla.redhat.com/show_bug.cgi?id=2064226 external
https://www.cve.org/CVERecord?id=CVE-2022-0084 external
https://nvd.nist.gov/vuln/detail/CVE-2022-0084 external
https://access.redhat.com/security/cve/CVE-2022-1319 self
https://bugzilla.redhat.com/show_bug.cgi?id=2073890 external
https://www.cve.org/CVERecord?id=CVE-2022-1319 external
https://nvd.nist.gov/vuln/detail/CVE-2022-1319 external
https://access.redhat.com/security/cve/CVE-2022-2053 self
https://bugzilla.redhat.com/show_bug.cgi?id=2095862 external
https://www.cve.org/CVERecord?id=CVE-2022-2053 external
https://nvd.nist.gov/vuln/detail/CVE-2022-2053 external
https://access.redhat.com/security/cve/CVE-2022-23913 self
https://bugzilla.redhat.com/show_bug.cgi?id=2063601 external
https://www.cve.org/CVERecord?id=CVE-2022-23913 external
https://nvd.nist.gov/vuln/detail/CVE-2022-23913 external
https://lists.apache.org/thread/fjynj57rd99s814rd… external
https://access.redhat.com/security/cve/CVE-2022-24785 self
https://bugzilla.redhat.com/show_bug.cgi?id=2072009 external
https://www.cve.org/CVERecord?id=CVE-2022-24785 external
https://nvd.nist.gov/vuln/detail/CVE-2022-24785 external
https://github.com/moment/moment/security/advisor… external
https://access.redhat.com/security/cve/CVE-2022-25647 self
https://bugzilla.redhat.com/show_bug.cgi?id=2080850 external
https://www.cve.org/CVERecord?id=CVE-2022-25647 external
https://nvd.nist.gov/vuln/detail/CVE-2022-25647 external
https://access.redhat.com/security/cve/CVE-2022-25857 self
https://bugzilla.redhat.com/show_bug.cgi?id=2126789 external
https://www.cve.org/CVERecord?id=CVE-2022-25857 external
https://nvd.nist.gov/vuln/detail/CVE-2022-25857 external
https://bitbucket.org/snakeyaml/snakeyaml/issues/525 external
https://access.redhat.com/security/cve/CVE-2022-40149 self
https://bugzilla.redhat.com/show_bug.cgi?id=2135771 external
https://www.cve.org/CVERecord?id=CVE-2022-40149 external
https://nvd.nist.gov/vuln/detail/CVE-2022-40149 external
https://github.com/jettison-json/jettison/release… external
https://access.redhat.com/security/cve/CVE-2022-40152 self
https://bugzilla.redhat.com/show_bug.cgi?id=2134291 external
https://www.cve.org/CVERecord?id=CVE-2022-40152 external
https://nvd.nist.gov/vuln/detail/CVE-2022-40152 external
https://github.com/advisories/GHSA-3f7h-mf4q-vrm4 external
https://access.redhat.com/security/cve/CVE-2023-1108 self
https://bugzilla.redhat.com/show_bug.cgi?id=2174246 external
https://www.cve.org/CVERecord?id=CVE-2023-1108 external
https://nvd.nist.gov/vuln/detail/CVE-2023-1108 external
https://github.com/advisories/GHSA-m4mm-pg93-fv78 external
https://access.redhat.com/security/cve/CVE-2023-1973 self
https://bugzilla.redhat.com/show_bug.cgi?id=2185662 external
https://www.cve.org/CVERecord?id=CVE-2023-1973 external
https://nvd.nist.gov/vuln/detail/CVE-2023-1973 external
https://access.redhat.com/security/cve/CVE-2023-3223 self
https://bugzilla.redhat.com/show_bug.cgi?id=2209689 external
https://www.cve.org/CVERecord?id=CVE-2023-3223 external
https://nvd.nist.gov/vuln/detail/CVE-2023-3223 external
https://access.redhat.com/security/cve/CVE-2024-1635 self
https://bugzilla.redhat.com/show_bug.cgi?id=2264928 external
https://www.cve.org/CVERecord?id=CVE-2024-1635 external
https://nvd.nist.gov/vuln/detail/CVE-2024-1635 external
Acknowledgments
System and Software Security Lab in Fudan University Keke Lian & Haoran Zhao

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.1 for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.1.10 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.1.9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.1.9 Release Notes for information about the most significant bug fixes and enhancements included in this release.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2025:4226",
        "url": "https://access.redhat.com/errata/RHSA-2025:4226"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1",
        "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1/html-single/installation_guide/index",
        "url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.1/html-single/installation_guide/index"
      },
      {
        "category": "external",
        "summary": "1991299",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991299"
      },
      {
        "category": "external",
        "summary": "1995259",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259"
      },
      {
        "category": "external",
        "summary": "2010378",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010378"
      },
      {
        "category": "external",
        "summary": "2011190",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190"
      },
      {
        "category": "external",
        "summary": "2063601",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063601"
      },
      {
        "category": "external",
        "summary": "2064226",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064226"
      },
      {
        "category": "external",
        "summary": "2072009",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009"
      },
      {
        "category": "external",
        "summary": "2073890",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073890"
      },
      {
        "category": "external",
        "summary": "2080850",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080850"
      },
      {
        "category": "external",
        "summary": "2095862",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095862"
      },
      {
        "category": "external",
        "summary": "2126789",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789"
      },
      {
        "category": "external",
        "summary": "2134291",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134291"
      },
      {
        "category": "external",
        "summary": "2135771",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135771"
      },
      {
        "category": "external",
        "summary": "2174246",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
      },
      {
        "category": "external",
        "summary": "2185662",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185662"
      },
      {
        "category": "external",
        "summary": "2209689",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209689"
      },
      {
        "category": "external",
        "summary": "2264928",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264928"
      },
      {
        "category": "external",
        "summary": "JBEAP-29286",
        "url": "https://issues.redhat.com/browse/JBEAP-29286"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_4226.json"
      }
    ],
    "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.1.10 on RHEL 7 security update",
    "tracking": {
      "current_release_date": "2026-04-01T19:07:41+00:00",
      "generator": {
        "date": "2026-04-01T19:07:41+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.7.4"
        }
      },
      "id": "RHSA-2025:4226",
      "initial_release_date": "2025-04-28T00:20:32+00:00",
      "revision_history": [
        {
          "date": "2025-04-28T00:20:32+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-04-28T00:20:32+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2026-04-01T19:07:41+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
                "product": {
                  "name": "Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
                  "product_id": "7Server-JBEAP-7.1-EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat JBoss Enterprise Application Platform"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
                "product": {
                  "name": "eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
                  "product_id": "eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.5.11-1.Final_redhat_00001.1.ep7.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
                "product": {
                  "name": "eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
                  "product_id": "eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-woodstox-core@5.0.3-2.redhat_00002.1.ep7.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src",
                "product": {
                  "name": "eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src",
                  "product_id": "eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-xml-security@2.0.10-2.redhat_00002.1.ep7.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
                "product": {
                  "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
                  "product_id": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-jsoup@1.14.2-1.redhat_00002.1.ep7.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
                "product": {
                  "name": "eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
                  "product_id": "eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-activemq-artemis@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
                "product": {
                  "name": "eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
                  "product_id": "eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-undertow@1.4.18-14.SP13_redhat_00001.1.ep7.el7?arch=src"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
                "product": {
                  "name": "eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
                  "product_id": "eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-artemis-native@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
                "product": {
                  "name": "eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
                  "product_id": "eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-wildfly@7.1.10-2.GA_redhat_00002.1.ep7.el7?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-jboss-xnio-base@3.5.11-1.Final_redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
                  "product_id": "eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-woodstox-core@5.0.3-2.redhat_00002.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
                  "product_id": "eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-xml-security@2.0.10-2.redhat_00002.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
                  "product_id": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-jsoup@1.14.2-1.redhat_00002.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-activemq-artemis@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-activemq-artemis-cli@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-activemq-artemis-commons@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-activemq-artemis-core-client@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-activemq-artemis-dto@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-activemq-artemis-hornetq-protocol@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-activemq-artemis-hqclient-protocol@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-activemq-artemis-jdbc-store@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-activemq-artemis-jms-client@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-activemq-artemis-jms-server@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-activemq-artemis-journal@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-activemq-artemis-native@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-activemq-artemis-ra@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-activemq-artemis-selector@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-activemq-artemis-server@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-activemq-artemis-service-extensions@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
                  "product_id": "eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-undertow@1.4.18-14.SP13_redhat_00001.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
                  "product_id": "eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-wildfly@7.1.10-2.GA_redhat_00002.1.ep7.el7?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
                "product": {
                  "name": "eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
                  "product_id": "eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.1.10-2.GA_redhat_00002.1.ep7.el7?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
                "product": {
                  "name": "eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
                  "product_id": "eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-artemis-native@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
                "product": {
                  "name": "eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
                  "product_id": "eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-artemis-native-wildfly@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
                "product": {
                  "name": "eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
                  "product_id": "eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/eap7-artemis-native-debuginfo@1.5.5.016-1.redhat_00001.1.ep7.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src"
        },
        "product_reference": "eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src"
        },
        "product_reference": "eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64"
        },
        "product_reference": "eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64"
        },
        "product_reference": "eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64 as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64"
        },
        "product_reference": "eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src"
        },
        "product_reference": "eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src"
        },
        "product_reference": "eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src"
        },
        "product_reference": "eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src"
        },
        "product_reference": "eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src"
        },
        "product_reference": "eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch"
        },
        "product_reference": "eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src as a component of Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7 Server",
          "product_id": "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        },
        "product_reference": "eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src",
        "relates_to_product_reference": "7Server-JBEAP-7.1-EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-3690",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "discovery_date": "2021-08-06T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1991299"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Undertow. A buffer leak on the incoming WebSocket PONG message may lead to memory exhaustion. This flaw allows an attacker to cause a denial of service. The highest threat from this vulnerability is availability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "undertow: buffer leak on incoming websocket PONG message may lead to DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Although Red Hat OpenStack Platform packages the vulnerable code in Opendaylight, it does not use or support the undertow-encapsulating features. The security impact for RHOSP is therefore rated as Low and no update will be provided at this time.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3690"
        },
        {
          "category": "external",
          "summary": "RHBZ#1991299",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991299"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3690",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3690"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3690",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3690"
        }
      ],
      "release_date": "2021-07-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-28T00:20:32+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:4226"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "undertow: buffer leak on incoming websocket PONG message may lead to DoS"
    },
    {
      "cve": "CVE-2021-3859",
      "cwe": {
        "id": "CWE-214",
        "name": "Invocation of Process Using Visible Sensitive Information"
      },
      "discovery_date": "2021-09-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2010378"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Undertow that tripped the client-side invocation timeout with certain calls made over HTTP2. This flaw allows an attacker to carry out denial of service attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "undertow: client side invocation timeout raised when calling over HTTP2",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat OpenStack Platform\u0027s OpenDaylight will not be updated for this flaw because it was deprecated as of OpenStack Platform 14 and is only receiving security fixes for Critical flaws.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-3859"
        },
        {
          "category": "external",
          "summary": "RHBZ#2010378",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010378"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3859",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-3859"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3859",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3859"
        }
      ],
      "release_date": "2022-02-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-28T00:20:32+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:4226"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "undertow: client side invocation timeout raised when calling over HTTP2"
    },
    {
      "cve": "CVE-2021-37714",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2021-08-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1995259"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "jsoup is a Java library for working with HTML. Those using jsoup versions prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack. The issue is patched in version 1.14.2. There are a few available workarounds. Users may rate limit input parsing, limit the size of inputs based on system resources, and/or implement thread watchdogs to cap and timeout parse runtimes.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-37714"
        },
        {
          "category": "external",
          "summary": "RHBZ#1995259",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995259"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-37714",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-37714"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37714"
        },
        {
          "category": "external",
          "summary": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c",
          "url": "https://github.com/jhy/jsoup/security/advisories/GHSA-m72m-mhq2-9p6c"
        }
      ],
      "release_date": "2021-08-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-28T00:20:32+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:4226"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck"
    },
    {
      "cve": "CVE-2021-40690",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "discovery_date": "2021-09-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2011190"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xml-security: XPath Transform abuse allows for information disclosure",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Since OpenShift Container Platform (OCP) 4.7, the logging-elasticsearch6-container is shipping as a part of the OpenShift Logging product (openshift-logging/elasticsearch6-rhel8). The elasticsearch component delivered in OCP 4.6 is marked as `Out of support scope` because these versions are already under Maintenance Phase of the support.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2021-40690"
        },
        {
          "category": "external",
          "summary": "RHBZ#2011190",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2021-40690",
          "url": "https://www.cve.org/CVERecord?id=CVE-2021-40690"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E",
          "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E"
        }
      ],
      "release_date": "2021-09-17T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-28T00:20:32+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:4226"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xml-security: XPath Transform abuse allows for information disclosure"
    },
    {
      "cve": "CVE-2022-0084",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "discovery_date": "2022-03-15T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2064226"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a message to another expected end. This flaw allows an attacker to send flawed requests to a server, possibly causing log contention-related performance concerns or an unwanted disk fill-up.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Although the CVSS stands for 7.5 score, the impact remains Moderate as it demands previous knowledge of the environment to trigger the Denial of Service (DoS)",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-0084"
        },
        {
          "category": "external",
          "summary": "RHBZ#2064226",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064226"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0084",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-0084"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0084",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0084"
        }
      ],
      "release_date": "2022-03-15T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-28T00:20:32+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:4226"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr"
    },
    {
      "cve": "CVE-2022-1319",
      "cwe": {
        "id": "CWE-252",
        "name": "Unchecked Return Value"
      },
      "discovery_date": "2022-04-11T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2073890"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "undertow: Double AJP response for 400 from EAP 7 results in CPING failures",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-1319"
        },
        {
          "category": "external",
          "summary": "RHBZ#2073890",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073890"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1319",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-1319"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1319",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1319"
        }
      ],
      "release_date": "2022-04-11T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-28T00:20:32+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:4226"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "undertow: Double AJP response for 400 from EAP 7 results in CPING failures"
    },
    {
      "cve": "CVE-2022-2053",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "discovery_date": "2022-06-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2095862"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Undertow. AJP requests to the server may allow an attacker to send a malicious request and trigger server errors, resulting in a denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "undertow: Large AJP request may cause DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Fuse 7 is now in Maintenance Support Phase and is marked Fixed. However, Red Hat Fuse Online does not contain the fix for this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-2053"
        },
        {
          "category": "external",
          "summary": "RHBZ#2095862",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2095862"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2053",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-2053"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2053",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2053"
        }
      ],
      "release_date": "2022-06-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-28T00:20:32+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:4226"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "undertow: Large AJP request may cause DoS"
    },
    {
      "cve": "CVE-2022-23913",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "discovery_date": "2022-02-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2063601"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "In Apache ActiveMQ Artemis prior to 2.20.0 or 2.19.1, an attacker could partially disrupt availability (DoS) through uncontrolled resource consumption of memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "artemis-commons: Apache ActiveMQ Artemis DoS",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-23913"
        },
        {
          "category": "external",
          "summary": "RHBZ#2063601",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2063601"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-23913",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-23913"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-23913",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23913"
        },
        {
          "category": "external",
          "summary": "https://lists.apache.org/thread/fjynj57rd99s814rdn5hzvmx8lz403q2",
          "url": "https://lists.apache.org/thread/fjynj57rd99s814rdn5hzvmx8lz403q2"
        }
      ],
      "release_date": "2022-02-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-28T00:20:32+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:4226"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "artemis-commons: Apache ActiveMQ Artemis DoS"
    },
    {
      "cve": "CVE-2022-24785",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "discovery_date": "2022-04-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2072009"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A path traversal vulnerability was found in Moment.js that impacts npm (server) users. This issue occurs if a user-provided locale string is directly used to switch moment locale, which an attacker can exploit to change the correct path to one of their choice. This can result in a loss of integrity.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Moment.js: Path traversal  in moment.locale",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "In Quay 3.10 and above, no version of affected momentjs is present.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-24785"
        },
        {
          "category": "external",
          "summary": "RHBZ#2072009",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2072009"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-24785",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-24785"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24785"
        },
        {
          "category": "external",
          "summary": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4",
          "url": "https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4"
        }
      ],
      "release_date": "2022-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-28T00:20:32+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:4226"
        },
        {
          "category": "workaround",
          "details": "Sanitize the user-provided locale name before passing it to Moment.js.",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "Moment.js: Path traversal  in moment.locale"
    },
    {
      "cve": "CVE-2022-25647",
      "cwe": {
        "id": "CWE-502",
        "name": "Deserialization of Untrusted Data"
      },
      "discovery_date": "2022-05-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2080850"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in gson, which is vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes. This issue may lead to availability attacks.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-25647"
        },
        {
          "category": "external",
          "summary": "RHBZ#2080850",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2080850"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25647",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-25647"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25647",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25647"
        }
      ],
      "release_date": "2022-05-01T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-28T00:20:32+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:4226"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson"
    },
    {
      "cve": "CVE-2022-25857",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2022-09-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2126789"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the org.yaml.snakeyaml package. This flaw allows an attacker to cause a denial of service (DoS) due to missing nested depth limitation for collections.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "snakeyaml: Denial of Service due to missing nested depth limitation for collections",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "For RHEL-8 it\u0027s downgraded to moderate because \"snakeyaml\" itself in RHEL 8 or RHEL-9 isn\u0027t shipped and \"prometheus-jmx-exporter\" is needed as build dependency. And it\u0027s not directly exploitable, hence severity marked as moderate.\nRed Hat Integration and AMQ products are not vulnerable to this flaw, so their severity has been lowered to moderate.\nRed Hat Single Sign-On uses snakeyaml from liquibase-core and is only used when performing migrations and would require administrator privileges to execute, hence severity marked as Low.\nRed Hat Fuse 7 is now in Maintenance Support Phase and details about its fix should be present soon. However, Red Hat Fuse Online (Syndesis) does will not contain the fix for this flaw.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-25857"
        },
        {
          "category": "external",
          "summary": "RHBZ#2126789",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126789"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25857",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25857"
        },
        {
          "category": "external",
          "summary": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525",
          "url": "https://bitbucket.org/snakeyaml/snakeyaml/issues/525"
        }
      ],
      "release_date": "2022-08-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-28T00:20:32+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:4226"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "snakeyaml: Denial of Service due to missing nested depth limitation for collections"
    },
    {
      "cve": "CVE-2022-40149",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-10-18T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2135771"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A stack-based buffer overflow vulnerability was found in Jettison, where parsing an untrusted XML or JSON data may lead to a crash. This flaw allows an attacker to supply content that causes the parser to crash by writing outside the memory bounds if the parser is running on user-supplied input, resulting in a denial of service attack.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "jettison: parser crash by stackoverflow",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-40149"
        },
        {
          "category": "external",
          "summary": "RHBZ#2135771",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135771"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-40149",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-40149"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40149",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40149"
        },
        {
          "category": "external",
          "summary": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1",
          "url": "https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1"
        }
      ],
      "release_date": "2022-09-20T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-28T00:20:32+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:4226"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "jettison: parser crash by stackoverflow"
    },
    {
      "cve": "CVE-2022-40152",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2022-10-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2134291"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the FasterXML/woodstox package. This flaw allows an attacker to cause a denial of service (DoS) in its target via XML serialization. An attacker may benefit from the parser sending a malicious input that may cause a crash. This vulnerability is only relevant for users using the DTD parsing functionality.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-40152"
        },
        {
          "category": "external",
          "summary": "RHBZ#2134291",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134291"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-40152",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-40152"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-40152",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40152"
        },
        {
          "category": "external",
          "summary": "https://github.com/advisories/GHSA-3f7h-mf4q-vrm4",
          "url": "https://github.com/advisories/GHSA-3f7h-mf4q-vrm4"
        }
      ],
      "release_date": "2022-09-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-28T00:20:32+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:4226"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "woodstox-core: woodstox to serialise XML data was vulnerable to Denial of Service attacks"
    },
    {
      "cve": "CVE-2023-1108",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "discovery_date": "2023-02-07T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2174246"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "Undertow: Infinite loop in SslConduit during close",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-1108"
        },
        {
          "category": "external",
          "summary": "RHBZ#2174246",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174246"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1108",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-1108"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1108"
        },
        {
          "category": "external",
          "summary": "https://github.com/advisories/GHSA-m4mm-pg93-fv78",
          "url": "https://github.com/advisories/GHSA-m4mm-pg93-fv78"
        }
      ],
      "release_date": "2023-03-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-28T00:20:32+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:4226"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "Undertow: Infinite loop in SslConduit during close"
    },
    {
      "cve": "CVE-2023-1973",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "discovery_date": "2023-02-20T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2185662"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Undertow package. Using the FormAuthenticationMechanism, a malicious user could trigger a Denial of Service by sending crafted requests, leading the server to an OutofMemory error, exhausting the server\u0027s memory.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "undertow: unrestricted request storage leads to memory exhaustion",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-1973"
        },
        {
          "category": "external",
          "summary": "RHBZ#2185662",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185662"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1973",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-1973"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1973",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1973"
        }
      ],
      "release_date": "2024-04-04T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-28T00:20:32+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:4226"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "undertow: unrestricted request storage leads to memory exhaustion"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Keke Lian \u0026 Haoran Zhao"
          ],
          "organization": "System and Software Security Lab in Fudan University"
        }
      ],
      "cve": "CVE-2023-3223",
      "cwe": {
        "id": "CWE-789",
        "name": "Memory Allocation with Excessive Size Value"
      },
      "discovery_date": "2023-05-24T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2209689"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in undertow. Servlets annotated with @MultipartConfig may cause an OutOfMemoryError due to large multipart content. This may allow unauthorized users to cause remote Denial of Service (DoS) attack. If the server uses fileSizeThreshold to limit the file size, it\u0027s possible to bypass the limit by setting the file name in the request to null.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "undertow: OutOfMemoryError due to @MultipartConfig handling",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-3223"
        },
        {
          "category": "external",
          "summary": "RHBZ#2209689",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209689"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-3223",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-3223"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3223",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3223"
        }
      ],
      "release_date": "2023-08-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-28T00:20:32+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:4226"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "undertow: OutOfMemoryError due to @MultipartConfig handling"
    },
    {
      "cve": "CVE-2024-1635",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2024-02-19T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2264928"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available. \r\n\r\nAt HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree leaks via that task, which is added to XNIO WorkerThread. So, the workerThread points to the Undertow conduit, which contains the connections and causes the leak.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This is rated as Important due to the fact that this might be an unauthenticated remote issue exploited by a malicious user, causing a denial of service (DoS) to the affected server.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
          "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-1635"
        },
        {
          "category": "external",
          "summary": "RHBZ#2264928",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264928"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-1635",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-1635"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-1635",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1635"
        }
      ],
      "release_date": "2023-10-27T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-04-28T00:20:32+00:00",
          "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:4226"
        },
        {
          "category": "workaround",
          "details": "No mitigation is currently available for this vulnerability. However, there might be some protections, such as request limits by a load balancer in front of JBoss EAP/Wildfly or even Undertow, that could minimize the impact.",
          "product_ids": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-0:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-cli-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-commons-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-core-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-dto-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hornetq-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-hqclient-protocol-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jdbc-store-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-client-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-jms-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-journal-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-native-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-ra-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-selector-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-server-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-activemq-artemis-service-extensions-0:1.5.5.016-1.redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-debuginfo-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-artemis-native-wildfly-1:1.5.5.016-1.redhat_00001.1.ep7.el7.x86_64",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jboss-xnio-base-0:3.5.11-1.Final_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-jsoup-0:1.14.2-1.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-undertow-0:1.4.18-14.SP13_redhat_00001.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-wildfly-modules-0:7.1.10-2.GA_redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-woodstox-core-0:5.0.3-2.redhat_00002.1.ep7.el7.src",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.noarch",
            "7Server-JBEAP-7.1-EUS:eap7-xml-security-0:2.0.10-2.redhat_00002.1.ep7.el7.src"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…