First published: Mon Jan 17 2022(Updated: )
These are CVE issues filed against XP2 releases that have been fixed in the underlying EAP 7.3.x base. There are no changes to the EAP XP2 code base.<br>Security Fix(es):<br><li> undertow: potential security issue in flow control over HTTP/2 may lead to DOS (CVE-2021-3629)</li> <li> wildfly-elytron: possible timing attack in ScramServer (CVE-2021-3642)</li> <li> wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users (CVE-2021-3717)</li> <li> jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck (CVE-2021-37714)</li> <li> xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)</li> <li> resteasy: Error message exposes endpoint class information (CVE-2021-20289)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat JBoss Enterprise Application Platform (EAP) | <=2 | |
Red Hat JBoss EAP | >=7.3.0<7.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:0146 is classified as moderate due to potential denial of service issues.
To fix RHSA-2022:0146, update to the latest version of EAP 7.3.x that addresses the reported vulnerabilities.
RHSA-2022:0146 addresses potential denial of service issues in HTTP/2 flow control (CVE-2021-3629).
No, RHSA-2022:0146 does not involve changes to the EAP XP2 code base.
Users of EAP 7.3.x who implement the XP2 release are affected by RHSA-2022:0146.