-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat JBoss Enterprise Application Platform security update Advisory ID: RHSA-2023:4505-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2023:4505 Issue date: 2023-08-07 CVE Names: CVE-2021-46877 CVE-2023-1436 CVE-2023-3223 ===================================================================== 1. Summary: An update is now available for Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss EAP 7.4 for RHEL 7 Server - noarch, x86_64 3. Description: Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.12 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.11 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.12 Release Notes for information about the most significant bug fixes and enhancements included in this release. Security Fix(es): * undertow: OutOfMemoryError due to @MultipartConfig handling (CVE-2023-3223) * jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode (CVE-2021-46877) * jettison: Uncontrolled Recursion in JSONArray (CVE-2023-1436) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications. For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2182788 - CVE-2023-1436 jettison: Uncontrolled Recursion in JSONArray 2185707 - CVE-2021-46877 jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode 2209689 - CVE-2023-3223 undertow: OutOfMemoryError due to @MultipartConfig handling 6. JIRA issues fixed (https://issues.redhat.com/): JBEAP-24711 - (7.4.z) Upgrade Jettison from 1.5.2.redhat-00002 to 1.5.4.redhat-x JBEAP-24720 - Tracker bug for the EAP 7.4.12 release for RHEL-7 JBEAP-24744 - [GSS](7.4.z) Upgrade Undertow from 2.2.24.SP1-redhat-00001 to 2.2.25.SP1 JBEAP-24745 - (7.4.z) Upgrade Elytron from 1.15.16.Final-redhat-00001 to 1.15.17.Final-redhat-00001 JBEAP-24790 - (7.4.z) Upgrade HAL from 3.3.17.Final-redhat-00001 to 3.3.18.Final-redhat-00001 JBEAP-24808 - [GSS](7.4.z) Upgrade WildFly Core from 15.0.26.Final-redhat-00001 to 15.0.27.Final-redhat-00001 JBEAP-24819 - [GSS](7.4.z) Upgrade Hibernate ORM from 5.3.29.Final-redhat-00001 to 5.3.30.Final-redhat-00001 JBEAP-24820 - [GSS](7.4.z) Upgrade PicketLink from 2.5.5.SP12-redhat-00012 to 2.5.5.SP12-redhat-00013 JBEAP-24821 - (7.4.z) Upgrade PicketLink bindings from 2.5.5.SP12-redhat-00014 to 2.5.5.SP12-redhat-00016 JBEAP-24822 - (7.4.z) Upgrade PicketLink version in PicketLink bindings. JBEAP-24831 - [GSS](7.4.z) Upgrade xalan from 2.7.1.redhat-13 to 2.7.1.redhat-14 JBEAP-24832 - (7.4.z) Upgrade Jakarta Mail from 1.6.7.redhat-00001 to 1.6.7.redhat-00003 JBEAP-24835 - (7.4.z) Upgrade Jakarta activation from 1.2.2.redhat-00001 to 1.2.2.redhat-00002 JBEAP-24836 - (7.4.z) Upgrade jboss-ejb-client from 4.0.50.SP1-redhat-00001 to 4.0.53.Final-redhat-00001 JBEAP-24858 - (7.4.z) Upgrade Artemis from 2.16.0.redhat-00047 to 2.16.0.redhat-00048 JBEAP-24973 - (7.4.z) Upgrade insights-java-client from 1.0.1.redhat-00001 to 1.0.8.redhat-00001 JBEAP-25004 - (7.4.z) Upgrade runtimes-java-api from 1.0.8.redhat-00001 to 1.0.9.redhat-00001 JBEAP-25085 - [GSS](7.4.z) Upgrade Undertow from 2.2.25.SP1 to 2.2.25.SP2 JBEAP-25086 - [GSS](7.4.z) Upgrade WildFly Core from 15.0.27.Final-redhat-00001 to 15.0.28.Final-redhat-00001 JBEAP-25204 - [GSS](7.4.z) Upgrade Undertow from 2.2.25.SP2-redhat-00001 to 2.2.25.SP3 JBEAP-25205 - [GSS](7.4.z) Upgrade WildFly Core from 15.0.28.Final-redhat-00001 to 15.0.29.Final-redhat-00001 7. Package List: Red Hat JBoss EAP 7.4 for RHEL 7 Server: Source: eap7-activemq-artemis-2.16.0-12.redhat_00048.1.el7eap.src.rpm eap7-glassfish-jaf-1.2.2-2.redhat_00002.1.el7eap.src.rpm eap7-glassfish-javamail-1.6.7-2.redhat_00003.1.el7eap.src.rpm eap7-hal-console-3.3.18-1.Final_redhat_00001.1.el7eap.src.rpm eap7-hibernate-5.3.30-1.Final_redhat_00001.1.el7eap.src.rpm eap7-insights-java-client-1.0.9-1.redhat_00001.1.el7eap.src.rpm eap7-jboss-cert-helper-1.0.9-1.redhat_00001.1.el7eap.src.rpm eap7-jboss-ejb-client-4.0.53-1.Final_redhat_00001.1.el7eap.src.rpm eap7-jboss-server-migration-1.10.0-30.Final_redhat_00029.1.el7eap.src.rpm eap7-jettison-1.5.4-1.redhat_00002.1.el7eap.src.rpm eap7-picketlink-bindings-2.5.5-27.SP12_redhat_00016.1.el7eap.src.rpm eap7-picketlink-federation-2.5.5-23.SP12_redhat_00013.1.el7eap.src.rpm eap7-protostream-4.3.5-2.Final_redhat_00003.1.el7eap.src.rpm eap7-undertow-2.2.25-3.SP3_redhat_00001.1.el7eap.src.rpm eap7-wildfly-7.4.12-3.GA_redhat_00003.1.el7eap.src.rpm eap7-wildfly-elytron-1.15.17-1.Final_redhat_00001.1.el7eap.src.rpm eap7-xalan-j2-2.7.1-36.redhat_00014.1.el7eap.src.rpm noarch: eap7-activemq-artemis-2.16.0-12.redhat_00048.1.el7eap.noarch.rpm eap7-activemq-artemis-cli-2.16.0-12.redhat_00048.1.el7eap.noarch.rpm eap7-activemq-artemis-commons-2.16.0-12.redhat_00048.1.el7eap.noarch.rpm eap7-activemq-artemis-core-client-2.16.0-12.redhat_00048.1.el7eap.noarch.rpm eap7-activemq-artemis-dto-2.16.0-12.redhat_00048.1.el7eap.noarch.rpm eap7-activemq-artemis-hornetq-protocol-2.16.0-12.redhat_00048.1.el7eap.noarch.rpm eap7-activemq-artemis-hqclient-protocol-2.16.0-12.redhat_00048.1.el7eap.noarch.rpm eap7-activemq-artemis-jdbc-store-2.16.0-12.redhat_00048.1.el7eap.noarch.rpm eap7-activemq-artemis-jms-client-2.16.0-12.redhat_00048.1.el7eap.noarch.rpm eap7-activemq-artemis-jms-server-2.16.0-12.redhat_00048.1.el7eap.noarch.rpm eap7-activemq-artemis-journal-2.16.0-12.redhat_00048.1.el7eap.noarch.rpm eap7-activemq-artemis-ra-2.16.0-12.redhat_00048.1.el7eap.noarch.rpm eap7-activemq-artemis-selector-2.16.0-12.redhat_00048.1.el7eap.noarch.rpm eap7-activemq-artemis-server-2.16.0-12.redhat_00048.1.el7eap.noarch.rpm eap7-activemq-artemis-service-extensions-2.16.0-12.redhat_00048.1.el7eap.noarch.rpm eap7-activemq-artemis-tools-2.16.0-12.redhat_00048.1.el7eap.noarch.rpm eap7-glassfish-jaf-1.2.2-2.redhat_00002.1.el7eap.noarch.rpm eap7-glassfish-javamail-1.6.7-2.redhat_00003.1.el7eap.noarch.rpm eap7-hal-console-3.3.18-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-hibernate-5.3.30-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-hibernate-core-5.3.30-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-hibernate-entitymanager-5.3.30-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-hibernate-envers-5.3.30-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-hibernate-java8-5.3.30-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-insights-java-client-1.0.9-1.redhat_00001.1.el7eap.noarch.rpm eap7-jboss-ejb-client-4.0.53-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-jboss-server-migration-1.10.0-30.Final_redhat_00029.1.el7eap.noarch.rpm eap7-jboss-server-migration-cli-1.10.0-30.Final_redhat_00029.1.el7eap.noarch.rpm eap7-jboss-server-migration-core-1.10.0-30.Final_redhat_00029.1.el7eap.noarch.rpm eap7-jettison-1.5.4-1.redhat_00002.1.el7eap.noarch.rpm eap7-picketlink-api-2.5.5-23.SP12_redhat_00013.1.el7eap.noarch.rpm eap7-picketlink-bindings-2.5.5-27.SP12_redhat_00016.1.el7eap.noarch.rpm eap7-picketlink-common-2.5.5-23.SP12_redhat_00013.1.el7eap.noarch.rpm eap7-picketlink-config-2.5.5-23.SP12_redhat_00013.1.el7eap.noarch.rpm eap7-picketlink-federation-2.5.5-23.SP12_redhat_00013.1.el7eap.noarch.rpm eap7-picketlink-idm-api-2.5.5-23.SP12_redhat_00013.1.el7eap.noarch.rpm eap7-picketlink-idm-impl-2.5.5-23.SP12_redhat_00013.1.el7eap.noarch.rpm eap7-picketlink-idm-simple-schema-2.5.5-23.SP12_redhat_00013.1.el7eap.noarch.rpm eap7-picketlink-impl-2.5.5-23.SP12_redhat_00013.1.el7eap.noarch.rpm eap7-picketlink-wildfly8-2.5.5-27.SP12_redhat_00016.1.el7eap.noarch.rpm eap7-protostream-4.3.5-2.Final_redhat_00003.1.el7eap.noarch.rpm eap7-undertow-2.2.25-3.SP3_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-7.4.12-3.GA_redhat_00003.1.el7eap.noarch.rpm eap7-wildfly-elytron-1.15.17-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-elytron-tool-1.15.17-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-java-jdk11-7.4.12-3.GA_redhat_00003.1.el7eap.noarch.rpm eap7-wildfly-java-jdk8-7.4.12-3.GA_redhat_00003.1.el7eap.noarch.rpm eap7-wildfly-javadocs-7.4.12-3.GA_redhat_00003.1.el7eap.noarch.rpm eap7-wildfly-modules-7.4.12-3.GA_redhat_00003.1.el7eap.noarch.rpm eap7-xalan-j2-2.7.1-36.redhat_00014.1.el7eap.noarch.rpm x86_64: eap7-jboss-cert-helper-1.0.9-1.redhat_00001.1.el7eap.x86_64.rpm eap7-jboss-cert-helper-debuginfo-1.0.9-1.redhat_00001.1.el7eap.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 8. References: https://access.redhat.com/security/cve/CVE-2021-46877 https://access.redhat.com/security/cve/CVE-2023-1436 https://access.redhat.com/security/cve/CVE-2023-3223 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/ https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/ 9. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJk0VH2AAoJENzjgjWX9erEz+IP/3FWJ67gEnENE7bZmGYj16Eb UpuTR5QGtndSuQpwyGeGcf1MkSAuDCnzz3A5PZqvN1+370xrg2vHqT7xdoVH0wtM Cc8S+CjlWbvIQQa8UKZc7/Z/2j5eOv43Llw03vToN9rCFIYTahn0A1SaDkP+Nt9g Jbo0MPIjkNhVeoRwOOxQ5hgDjyx4G1BoHguRoFcTfd8fpLnF8PlpsmDzBEZvYO4d fQnXGJSTZxTlhPD6TP8B5VAKJxpGI2o0tl8MqWzP4F1P5Z3mjNjf7p955Zbtqk9C 4v9mBWyWRJGn/CHI2NXgPmjdmfWrQLHxmxxzhQceH8nacuU61Ft22bZzD65OPogd h+llWeK8/70vYlPrWoAzcmv05zs4BoRFjSTaLgBnRNTxkwmAgU/6qHCuxQ4cdE17 0qVMzXLRt5N0RYFm7koc+g4RCSAZzE/KpVjqvO2NJ3B0PrPFs/5IedugvuoIMCdd NutFGlcsi4JpFS1m2U9HgeNPyW/TjHazD7OIrnbdrcVNdLKUJRbDmnq3USVhynqB qtFEDVmeABV1r1ea4/9fEUUI9NSnBWfqAs+352vmxtAN9eNq8GKLPQx54al6jjXN CWa5msbSykcz9sxfpdCGfSWGOGrrObm8gEiMSs+yUi0ciDcT8eMovF761cAg9RB9 J8P1Oh2StF1cJhvxW2Wy =Ucq7 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce