what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Red Hat Security Advisory 2023-4507-01

Red Hat Security Advisory 2023-4507-01
Posted Aug 8, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-4507-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.12 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.11 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.12 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include a denial of service vulnerability.

tags | advisory, java, denial of service
systems | linux, redhat
advisories | CVE-2021-46877, CVE-2023-1436, CVE-2023-3223
SHA-256 | f2d69251d5e4934f5ebcb8cfacee508f2aba370163f1865135b65cb3083235b8

Red Hat Security Advisory 2023-4507-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat JBoss Enterprise Application Platform security update
Advisory ID: RHSA-2023:4507-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2023:4507
Issue date: 2023-08-07
CVE Names: CVE-2021-46877 CVE-2023-1436 CVE-2023-3223
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 7.4 for RHEL 9.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss EAP 7.4 for RHEL 9 - noarch, x86_64

3. Description:

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on the WildFly application runtime.

This release of Red Hat JBoss Enterprise Application Platform 7.4.12 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.11
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise
Application Platform 7.4.12 Release Notes for information about the most
significant bug fixes and enhancements included in this release.

Security Fix(es):

* undertow: OutOfMemoryError due to @MultipartConfig handling
(CVE-2023-3223)

* jackson-databind: Possible DoS if using JDK serialization to serialize
JsonNode (CVE-2021-46877)

* jettison: Uncontrolled Recursion in JSONArray (CVE-2023-1436)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2182788 - CVE-2023-1436 jettison: Uncontrolled Recursion in JSONArray
2185707 - CVE-2021-46877 jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode
2209689 - CVE-2023-3223 undertow: OutOfMemoryError due to @MultipartConfig handling

6. JIRA issues fixed (https://issues.redhat.com/):

JBEAP-24711 - (7.4.z) Upgrade Jettison from 1.5.2.redhat-00002 to 1.5.4.redhat-x
JBEAP-24722 - Tracker bug for the EAP 7.4.12 release for RHEL-9
JBEAP-24744 - [GSS](7.4.z) Upgrade Undertow from 2.2.24.SP1-redhat-00001 to 2.2.25.SP1
JBEAP-24745 - (7.4.z) Upgrade Elytron from 1.15.16.Final-redhat-00001 to 1.15.17.Final-redhat-00001
JBEAP-24790 - (7.4.z) Upgrade HAL from 3.3.17.Final-redhat-00001 to 3.3.18.Final-redhat-00001
JBEAP-24808 - [GSS](7.4.z) Upgrade WildFly Core from 15.0.26.Final-redhat-00001 to 15.0.27.Final-redhat-00001
JBEAP-24819 - [GSS](7.4.z) Upgrade Hibernate ORM from 5.3.29.Final-redhat-00001 to 5.3.30.Final-redhat-00001
JBEAP-24820 - [GSS](7.4.z) Upgrade PicketLink from 2.5.5.SP12-redhat-00012 to 2.5.5.SP12-redhat-00013
JBEAP-24821 - (7.4.z) Upgrade PicketLink bindings from 2.5.5.SP12-redhat-00014 to 2.5.5.SP12-redhat-00016
JBEAP-24822 - (7.4.z) Upgrade PicketLink version in PicketLink bindings.
JBEAP-24831 - [GSS](7.4.z) Upgrade xalan from 2.7.1.redhat-13 to 2.7.1.redhat-14
JBEAP-24832 - (7.4.z) Upgrade Jakarta Mail from 1.6.7.redhat-00001 to 1.6.7.redhat-00003
JBEAP-24835 - (7.4.z) Upgrade Jakarta activation from 1.2.2.redhat-00001 to 1.2.2.redhat-00002
JBEAP-24836 - (7.4.z) Upgrade jboss-ejb-client from 4.0.50.SP1-redhat-00001 to 4.0.53.Final-redhat-00001
JBEAP-24858 - (7.4.z) Upgrade Artemis from 2.16.0.redhat-00047 to 2.16.0.redhat-00048
JBEAP-24973 - (7.4.z) Upgrade insights-java-client from 1.0.1.redhat-00001 to 1.0.8.redhat-00001
JBEAP-25004 - (7.4.z) Upgrade runtimes-java-api from 1.0.8.redhat-00001 to 1.0.9.redhat-00001
JBEAP-25085 - [GSS](7.4.z) Upgrade Undertow from 2.2.25.SP1 to 2.2.25.SP2
JBEAP-25086 - [GSS](7.4.z) Upgrade WildFly Core from 15.0.27.Final-redhat-00001 to 15.0.28.Final-redhat-00001
JBEAP-25204 - [GSS](7.4.z) Upgrade Undertow from 2.2.25.SP2-redhat-00001 to 2.2.25.SP3
JBEAP-25205 - [GSS](7.4.z) Upgrade WildFly Core from 15.0.28.Final-redhat-00001 to 15.0.29.Final-redhat-00001

7. Package List:

Red Hat JBoss EAP 7.4 for RHEL 9:

Source:
eap7-activemq-artemis-2.16.0-12.redhat_00048.1.el9eap.src.rpm
eap7-glassfish-jaf-1.2.2-2.redhat_00002.1.el9eap.src.rpm
eap7-glassfish-javamail-1.6.7-2.redhat_00003.1.el9eap.src.rpm
eap7-hal-console-3.3.18-1.Final_redhat_00001.1.el9eap.src.rpm
eap7-hibernate-5.3.30-1.Final_redhat_00001.1.el9eap.src.rpm
eap7-insights-java-client-1.0.9-1.redhat_00001.1.el9eap.src.rpm
eap7-jboss-cert-helper-1.0.9-1.redhat_00001.1.el9eap.src.rpm
eap7-jboss-ejb-client-4.0.53-1.Final_redhat_00001.1.el9eap.src.rpm
eap7-jboss-server-migration-1.10.0-30.Final_redhat_00029.1.el9eap.src.rpm
eap7-jettison-1.5.4-1.redhat_00002.1.el9eap.src.rpm
eap7-picketlink-bindings-2.5.5-27.SP12_redhat_00016.1.el9eap.src.rpm
eap7-picketlink-federation-2.5.5-23.SP12_redhat_00013.1.el9eap.src.rpm
eap7-protostream-4.3.5-2.Final_redhat_00003.1.el9eap.src.rpm
eap7-undertow-2.2.25-3.SP3_redhat_00001.1.el9eap.src.rpm
eap7-wildfly-7.4.12-3.GA_redhat_00003.1.el9eap.src.rpm
eap7-wildfly-elytron-1.15.17-1.Final_redhat_00001.1.el9eap.src.rpm
eap7-xalan-j2-2.7.1-36.redhat_00014.1.el9eap.src.rpm

noarch:
eap7-activemq-artemis-2.16.0-12.redhat_00048.1.el9eap.noarch.rpm
eap7-activemq-artemis-cli-2.16.0-12.redhat_00048.1.el9eap.noarch.rpm
eap7-activemq-artemis-commons-2.16.0-12.redhat_00048.1.el9eap.noarch.rpm
eap7-activemq-artemis-core-client-2.16.0-12.redhat_00048.1.el9eap.noarch.rpm
eap7-activemq-artemis-dto-2.16.0-12.redhat_00048.1.el9eap.noarch.rpm
eap7-activemq-artemis-hornetq-protocol-2.16.0-12.redhat_00048.1.el9eap.noarch.rpm
eap7-activemq-artemis-hqclient-protocol-2.16.0-12.redhat_00048.1.el9eap.noarch.rpm
eap7-activemq-artemis-jdbc-store-2.16.0-12.redhat_00048.1.el9eap.noarch.rpm
eap7-activemq-artemis-jms-client-2.16.0-12.redhat_00048.1.el9eap.noarch.rpm
eap7-activemq-artemis-jms-server-2.16.0-12.redhat_00048.1.el9eap.noarch.rpm
eap7-activemq-artemis-journal-2.16.0-12.redhat_00048.1.el9eap.noarch.rpm
eap7-activemq-artemis-ra-2.16.0-12.redhat_00048.1.el9eap.noarch.rpm
eap7-activemq-artemis-selector-2.16.0-12.redhat_00048.1.el9eap.noarch.rpm
eap7-activemq-artemis-server-2.16.0-12.redhat_00048.1.el9eap.noarch.rpm
eap7-activemq-artemis-service-extensions-2.16.0-12.redhat_00048.1.el9eap.noarch.rpm
eap7-activemq-artemis-tools-2.16.0-12.redhat_00048.1.el9eap.noarch.rpm
eap7-glassfish-jaf-1.2.2-2.redhat_00002.1.el9eap.noarch.rpm
eap7-glassfish-javamail-1.6.7-2.redhat_00003.1.el9eap.noarch.rpm
eap7-hal-console-3.3.18-1.Final_redhat_00001.1.el9eap.noarch.rpm
eap7-hibernate-5.3.30-1.Final_redhat_00001.1.el9eap.noarch.rpm
eap7-hibernate-core-5.3.30-1.Final_redhat_00001.1.el9eap.noarch.rpm
eap7-hibernate-envers-5.3.30-1.Final_redhat_00001.1.el9eap.noarch.rpm
eap7-insights-java-client-1.0.9-1.redhat_00001.1.el9eap.noarch.rpm
eap7-jboss-ejb-client-4.0.53-1.Final_redhat_00001.1.el9eap.noarch.rpm
eap7-jboss-server-migration-1.10.0-30.Final_redhat_00029.1.el9eap.noarch.rpm
eap7-jboss-server-migration-cli-1.10.0-30.Final_redhat_00029.1.el9eap.noarch.rpm
eap7-jboss-server-migration-core-1.10.0-30.Final_redhat_00029.1.el9eap.noarch.rpm
eap7-jettison-1.5.4-1.redhat_00002.1.el9eap.noarch.rpm
eap7-picketlink-api-2.5.5-23.SP12_redhat_00013.1.el9eap.noarch.rpm
eap7-picketlink-bindings-2.5.5-27.SP12_redhat_00016.1.el9eap.noarch.rpm
eap7-picketlink-common-2.5.5-23.SP12_redhat_00013.1.el9eap.noarch.rpm
eap7-picketlink-config-2.5.5-23.SP12_redhat_00013.1.el9eap.noarch.rpm
eap7-picketlink-federation-2.5.5-23.SP12_redhat_00013.1.el9eap.noarch.rpm
eap7-picketlink-idm-api-2.5.5-23.SP12_redhat_00013.1.el9eap.noarch.rpm
eap7-picketlink-idm-impl-2.5.5-23.SP12_redhat_00013.1.el9eap.noarch.rpm
eap7-picketlink-idm-simple-schema-2.5.5-23.SP12_redhat_00013.1.el9eap.noarch.rpm
eap7-picketlink-impl-2.5.5-23.SP12_redhat_00013.1.el9eap.noarch.rpm
eap7-picketlink-wildfly8-2.5.5-27.SP12_redhat_00016.1.el9eap.noarch.rpm
eap7-protostream-4.3.5-2.Final_redhat_00003.1.el9eap.noarch.rpm
eap7-undertow-2.2.25-3.SP3_redhat_00001.1.el9eap.noarch.rpm
eap7-wildfly-7.4.12-3.GA_redhat_00003.1.el9eap.noarch.rpm
eap7-wildfly-elytron-1.15.17-1.Final_redhat_00001.1.el9eap.noarch.rpm
eap7-wildfly-elytron-tool-1.15.17-1.Final_redhat_00001.1.el9eap.noarch.rpm
eap7-wildfly-java-jdk11-7.4.12-3.GA_redhat_00003.1.el9eap.noarch.rpm
eap7-wildfly-java-jdk17-7.4.12-3.GA_redhat_00003.1.el9eap.noarch.rpm
eap7-wildfly-java-jdk8-7.4.12-3.GA_redhat_00003.1.el9eap.noarch.rpm
eap7-wildfly-javadocs-7.4.12-3.GA_redhat_00003.1.el9eap.noarch.rpm
eap7-wildfly-modules-7.4.12-3.GA_redhat_00003.1.el9eap.noarch.rpm
eap7-xalan-j2-2.7.1-36.redhat_00014.1.el9eap.noarch.rpm

x86_64:
eap7-jboss-cert-helper-1.0.9-1.redhat_00001.1.el9eap.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

8. References:

https://access.redhat.com/security/cve/CVE-2021-46877
https://access.redhat.com/security/cve/CVE-2023-1436
https://access.redhat.com/security/cve/CVE-2023-3223
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/

9. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=AoAF
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close