First published: Fri Mar 04 2022(Updated: )
A flaw was found in JBoss-client. The vulnerability occurs due to a memory leak on the JBoss client-side, when using UserTransaction repeatedly and leads to information leakage vulnerability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/eap7-wildfly-http-client | <0:1.1.11-1.SP1_redhat_00001.1.el8ea | 0:1.1.11-1.SP1_redhat_00001.1.el8ea |
redhat/eap7-wildfly-http-client | <0:1.1.11-1.SP1_redhat_00001.1.el7ea | 0:1.1.11-1.SP1_redhat_00001.1.el7ea |
redhat/rh-sso7-keycloak | <0:18.0.3-1.redhat_00001.1.el7 | 0:18.0.3-1.redhat_00001.1.el7 |
redhat/rh-sso7-keycloak | <0:18.0.3-1.redhat_00001.1.el8 | 0:18.0.3-1.redhat_00001.1.el8 |
redhat/rh-sso7 | <0:1-5.el9 | 0:1-5.el9 |
redhat/rh-sso7-javapackages-tools | <0:6.0.0-7.el9 | 0:6.0.0-7.el9 |
redhat/rh-sso7-keycloak | <0:18.0.3-1.redhat_00001.1.el9 | 0:18.0.3-1.redhat_00001.1.el9 |
Redhat Descision Manager | =7.0 | |
Redhat Jboss Enterprise Application Platform | =7.0.0 | |
Redhat Jboss Enterprise Application Platform Expansion Pack | ||
Redhat Process Automation | =7.0 | |
Redhat Single Sign-on | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-0853 is a vulnerability found in JBoss-client that leads to a memory leak and information leakage.
CVE-2022-0853 has a severity level of 7.5 (high).
The following software is affected: eap7-wildfly-http-client (el8 and el7), rh-sso7-keycloak (el7, el8, and el9), rh-sso7, rh-sso7-javapackages-tools, Redhat Descision Manager, Redhat Jboss Enterprise Application Platform, Redhat Jboss Enterprise Application Platform Expansion Pack, and Redhat Process Automation.
CVE-2022-0853 occurs due to a memory leak on the JBoss client-side when using UserTransaction repeatedly.
Yes, you can find references for CVE-2022-0853 at the following links: [link 1](https://access.redhat.com/errata/RHSA-2022:4922), [link 2](https://access.redhat.com/errata/RHSA-2022:4918), [link 3](https://access.redhat.com/errata/RHSA-2022:4919).