First published: Mon Sep 13 2021(Updated: )
These are CVE issues filed against XP2 releases that have been fixed in the underlying EAP 7.3.x base, so no changes to the EAP XP2 code base.<br>Security Fix(es):<br><li> undertow: buffer leak on incoming websocket PONG message may lead to DoS (CVE-2021-3690)</li> <li> undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS (CVE-2021-3597)</li> <li> jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate (CVE-2021-28170)</li> <li> apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 (CVE-2021-29425)</li> <li> wildfly-core: Invalid Sensitivity Classification of Vault Expression (CVE-2021-3644)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss EAP | >=7.3.0 | |
Apache Commons IO | >=2.2<=2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:3516 is high due to potential denial of service vulnerabilities.
To fix RHSA-2021:3516, update your EAP to the latest version as recommended in the advisory.
RHSA-2021:3516 addresses buffer leak issues in the undertow component related to WebSocket PONG messages.
Users of EAP 7.3.x and XP2 releases are affected by the vulnerabilities outlined in RHSA-2021:3516.
There are no specific workarounds mentioned for RHSA-2021:3516; the recommended solution is to apply the relevant updates.