First published: Wed Sep 08 2021(Updated: )
This release of Red Hat JBoss Enterprise Application Platform 7.3.9 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.8, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.9 Release Notes for information about the most significant bug fixes and enhancements included in this release.<br>Security Fix(es):<br><li> undertow: buffer leak on incoming websocket PONG message may lead to DoS (CVE-2021-3690)</li> <li> undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS (CVE-2021-3597)</li> <li> jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate (CVE-2021-28170)</li> <li> apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 (CVE-2021-29425)</li> <li> wildfly-core: Invalid Sensitivity Classification of Vault Expression (CVE-2021-3644)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | =7.3.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2021:3471 has been rated as important in terms of severity.
To fix RHSA-2021:3471, update your Red Hat JBoss Enterprise Application Platform to version 7.3.9 or later.
RHSA-2021:3471 addresses several bugs and enhances the security posture of JBoss Enterprise Application Platform 7.3.8.
RHSA-2021:3471 is applicable only to users of Red Hat JBoss Enterprise Application Platform version 7.3.8.
Updating to RHSA-2021:3471 is designed to improve stability and security and should not negatively affect existing applications.