-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 7.4.7 Security update
Advisory ID:       RHSA-2022:6825-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:6825
Issue date:        2022-10-05
CVE Names:         CVE-2022-1259 CVE-2022-2053 CVE-2022-25857 
====================================================================
1. Summary:

A security update is now available for Red Hat JBoss Enterprise Application
Platform 7.4.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on the WildFly application runtime. This release of Red
Hat JBoss Enterprise Application Platform 7.4.7 serves as a replacement for
Red Hat JBoss Enterprise Application Platform 7.4.6, and includes bug fixes
and enhancements. See the Red Hat JBoss Enterprise Application Platform
7.4.7 Release Notes for information about the most significant bug fixes
and enhancements included in this release.

Security Fix(es):

* undertow: Large AJP request may cause DoS (CVE-2022-2053)

* undertow: potential security issue in flow control over HTTP/2 may lead
to DOS. Incomplete fix for CVE-2021-3629 (CVE-2022-1259)

* snakeyaml: Denial of Service due missing to nested depth limitation for
collections. (CVE-2022-25857)

3. Solution:

Before applying this update, ensure all previously released errata relevant
to your system have been applied. For details about how to apply this
update, see: https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2072339 - CVE-2022-1259 undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629)
2095862 - CVE-2022-2053 undertow: Large AJP request may cause DoS
2126789 - CVE-2022-25857 snakeyaml: Denial of Service due to missing nested depth limitation for collections

5. JIRA issues fixed (https://issues.redhat.com/):

JBEAP-23687 - [GSS](7.4.z) Upgrade Ironjacamar from 1.5.3.SP1-redhat-00001 to 1.5.3.SP2-redhat-00001
JBEAP-23738 - (7.4.z) Upgrade jastow from 2.0.9.Final-redhat-00001 to 2.0.11.Final-redhat-00001
JBEAP-23741 - [GSS](7.4.z) Upgrade Undertow from 2.2.18.SP2-redhat-00001 to 2.2.19.SP2-redhat-00001
JBEAP-23753 - (7.4.z) Upgrade HAL from 3.3.13.Final-redhat-00001 to 3.3.14.Final-redhat-00001
JBEAP-23772 - [GSS](7.4.z) Upgrade Mojarra from 2.3.14.SP05-redhat-00001 to 2.3.14.SP06-redhat-00001
JBEAP-23794 - (7.4.z) Upgrade Elytron from 1.15.13.Final-redhat-00001 to 1.15.14.Final-redhat-00001
JBEAP-23802 - (7.4.z) Upgrade WildFly Core from 15.0.15.Final-redhat-00001 to 15.0.17.Final-redhat-00001
JBEAP-23803 - (7.4.z) Upgrade Artemis from 2.16.0.redhat-00042 to 2.16.0.redhat-00045
JBEAP-23805 - (7.4.z) Upgrade jboss-ejb-client from 4.0.44.Final-redhat-00001 to 4.0.45.Final-redhat-00001
JBEAP-23816 - (7.4.z) Upgrade RESTEasy from 3.15.3.Final-redhat-00001 to 3.15.4.Final-redhat-00001
JBEAP-23818 - [GSS](7.4.z) WFLY-16607 - Application deployment fails with EJB components in EAP 7.4 Update 5 and works fine with Update 1
JBEAP-23869 - [GSS](7.4.z) Upgrade JBoss VFS from 3.2.16.Final-redhat-00001 to 3.2.17.Final-redhat-00001
JBEAP-23881 - [GSS](7.4.z) Upgrade Hibernate ORM from 5.3.27.Final-redhat-00001 to 5.3.28.Final-redhat-00001
JBEAP-23912 - (7.4.z) Upgrade WildFly Core from 15.0.17.Final-redhat-00001 to 15.0.18.Final-redhat-00001

6. References:

https://access.redhat.com/security/cve/CVE-2022-1259
https://access.redhat.com/security/cve/CVE-2022-2053
https://access.redhat.com/security/cve/CVE-2022-25857
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/

7. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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HC+w
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-6825:01 Important: Red Hat JBoss Enterprise Application

A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4

Summary

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.7 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.6, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.7 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Security Fix(es):
* undertow: Large AJP request may cause DoS (CVE-2022-2053)
* undertow: potential security issue in flow control over HTTP/2 may lead to DOS. Incomplete fix for CVE-2021-3629 (CVE-2022-1259)
* snakeyaml: Denial of Service due missing to nested depth limitation for collections. (CVE-2022-25857)



Summary


Solution

Before applying this update, ensure all previously released errata relevant to your system have been applied. For details about how to apply this update, see: https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2022-1259 https://access.redhat.com/security/cve/CVE-2022-2053 https://access.redhat.com/security/cve/CVE-2022-25857 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/ https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/

Package List


Severity
Advisory ID: RHSA-2022:6825-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2022:6825
Issued Date: : 2022-10-05
CVE Names: CVE-2022-1259 CVE-2022-2053 CVE-2022-25857

Topic

A security update is now available for Red Hat JBoss Enterprise ApplicationPlatform 7.4.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

2072339 - CVE-2022-1259 undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629)

2095862 - CVE-2022-2053 undertow: Large AJP request may cause DoS

2126789 - CVE-2022-25857 snakeyaml: Denial of Service due to missing nested depth limitation for collections

5. JIRA issues fixed (https://issues.redhat.com/):

JBEAP-23687 - [GSS](7.4.z) Upgrade Ironjacamar from 1.5.3.SP1-redhat-00001 to 1.5.3.SP2-redhat-00001

JBEAP-23738 - (7.4.z) Upgrade jastow from 2.0.9.Final-redhat-00001 to 2.0.11.Final-redhat-00001

JBEAP-23741 - [GSS](7.4.z) Upgrade Undertow from 2.2.18.SP2-redhat-00001 to 2.2.19.SP2-redhat-00001

JBEAP-23753 - (7.4.z) Upgrade HAL from 3.3.13.Final-redhat-00001 to 3.3.14.Final-redhat-00001

JBEAP-23772 - [GSS](7.4.z) Upgrade Mojarra from 2.3.14.SP05-redhat-00001 to 2.3.14.SP06-redhat-00001

JBEAP-23794 - (7.4.z) Upgrade Elytron from 1.15.13.Final-redhat-00001 to 1.15.14.Final-redhat-00001

JBEAP-23802 - (7.4.z) Upgrade WildFly Core from 15.0.15.Final-redhat-00001 to 15.0.17.Final-redhat-00001

JBEAP-23803 - (7.4.z) Upgrade Artemis from 2.16.0.redhat-00042 to 2.16.0.redhat-00045

JBEAP-23805 - (7.4.z) Upgrade jboss-ejb-client from 4.0.44.Final-redhat-00001 to 4.0.45.Final-redhat-00001

JBEAP-23816 - (7.4.z) Upgrade RESTEasy from 3.15.3.Final-redhat-00001 to 3.15.4.Final-redhat-00001

JBEAP-23818 - [GSS](7.4.z) WFLY-16607 - Application deployment fails with EJB components in EAP 7.4 Update 5 and works fine with Update 1

JBEAP-23869 - [GSS](7.4.z) Upgrade JBoss VFS from 3.2.16.Final-redhat-00001 to 3.2.17.Final-redhat-00001

JBEAP-23881 - [GSS](7.4.z) Upgrade Hibernate ORM from 5.3.27.Final-redhat-00001 to 5.3.28.Final-redhat-00001

JBEAP-23912 - (7.4.z) Upgrade WildFly Core from 15.0.17.Final-redhat-00001 to 15.0.18.Final-redhat-00001


Related News