First published: Mon Jan 17 2022(Updated: )
These are CVE issues filed against XP2 releases that have been fixed in the underlying EAP 7.3.x base. There are no changes to the EAP XP2 code base.<br>Security Fix(es):<br><li> undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)</li> <li> wildfly-elytron: possible timing attack in ScramServer (CVE-2021-3642)</li> <li> wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users (CVE-2021-3717)</li> <li> jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)</li> <li> xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)</li> <li> resteasy: Error message exposes endpoint class information (CVE-2021-20289)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.