RedHat: RHSA-2021-3216:01 Important: Red Hat JBoss Enterprise Appli...

Advisories

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 7.3 security update
Advisory ID:       RHSA-2021:3216-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:3216
Issue date:        2021-08-18
CVE Names:         CVE-2021-3690 
=====================================================================

1. Summary:

A security update is now available for Red Hat JBoss Enterprise Application
Platform 7.3.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on the WildFly application runtime.

This asynchronous patch is a security update for Red Hat JBoss Enterprise
Application Platform 7.3.

Security Fix(es):

* undertow: buffer leak on incoming websocket PONG message may lead to DoS
(CVE-2021-3690)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, see the CVE page(s) listed in the
References section.

3. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (https://bugzilla.redhat.com/):

1991299 - CVE-2021-3690 undertow: buffer leak on incoming websocket PONG message may lead to DoS

5. References:

https://access.redhat.com/security/cve/CVE-2021-3690
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches&product=appplatform&version=7.3
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=+QnO
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-3216:01 Important: Red Hat JBoss Enterprise Application

A security update is now available for Red Hat JBoss Enterprise Application Platform 7.3

Summary

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.
This asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.3.
Security Fix(es):
* undertow: buffer leak on incoming websocket PONG message may lead to DoS (CVE-2021-3690)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.

Solution

Before applying this update, back up your existing Red Hat JBoss EnterpriseApplication Platform installation and deployed applications.The References section of this erratum contains a download link (you mustlog in to download the update).

References

https://access.redhat.com/security/cve/CVE-2021-3690 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches&product=appplatform&version=7.3 https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/ https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/

Package List

Severity
Advisory ID: RHSA-2021:3216-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3216
Issued Date: : 2021-08-18
CVE Names: CVE-2021-3690

Topic

A security update is now available for Red Hat JBoss Enterprise ApplicationPlatform 7.3.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.

Relevant Releases Architectures

Bugs Fixed

1991299 - CVE-2021-3690 undertow: buffer leak on incoming websocket PONG message may lead to DoS

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.