First published: Thu Jun 30 2022(Updated: )
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on the WildFly application runtime.<br>This release of Red Hat JBoss Enterprise Application Platform 6.4.24 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.23 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 6.4.24 Release Notes for information about the most significant bug fixes and enhancements included in this release.<br>Security Fix(es):<br><li> tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS (CVE-2020-13935)</li> <li> jbossweb: Incomplete fix of CVE-2020-13935 for WebSocket in JBossWeb could lead to DoS (CVE-2020-14384)</li> <li> log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender (CVE-2022-23305)</li> <li> log4j: Unsafe deserialization flaw in Chainsaw log viewer (CVE-2022-23307)</li> <li> log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104)</li> <li> log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink (CVE-2022-23302)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:5458 is classified as important.
To fix RHSA-2022:5458, you should upgrade to the latest version of Red Hat JBoss Enterprise Application Platform 6.4.24.
Not addressing RHSA-2022:5458 can lead to potential vulnerabilities that could be exploited by attackers.
RHSA-2022:5458 affects Red Hat JBoss Enterprise Application Platform version 6.4.23 and earlier.
More information about RHSA-2022:5458 can be found in the official Red Hat advisory and associated bug reports.