Lucene search

K
redhatRedHatRHSA-2021:3466
HistorySep 08, 2021 - 11:38 a.m.

(RHSA-2021:3466) Important: Red Hat JBoss Enterprise Application Platform 7.3.9 security update on RHEL 6

2021-09-0811:38:57
access.redhat.com
26
red hat jboss
enterprise application platform
security update
rhel 6
cve-2021-3690
cve-2021-3597
cve-2021-28170
cve-2021-29425
cve-2021-3644
dos

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

57.2%

This release of Red Hat JBoss Enterprise Application Platform 7.3.9 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.8, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.9 Release Notes for information about the most significant bug fixes and enhancements included in this release.

Security Fix(es):

  • undertow: buffer leak on incoming websocket PONG message may lead to DoS (CVE-2021-3690)

  • undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS (CVE-2021-3597)

  • jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate (CVE-2021-28170)

  • apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 (CVE-2021-29425)

  • wildfly-core: Invalid Sensitivity Classification of Vault Expression (CVE-2021-3644)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

OSVersionArchitecturePackageVersionFilename
RedHat6noarcheap7-jboss-server-migration-eap7.2-to-eap7.3< 1.7.2-9.Final_redhat_00010.1.el6eapeap7-jboss-server-migration-eap7.2-to-eap7.3-1.7.2-9.Final_redhat_00010.1.el6eap.noarch.rpm
RedHat6noarcheap7-narayana-restat-bridge< 5.9.12-1.Final_redhat_00001.1.el6eapeap7-narayana-restat-bridge-5.9.12-1.Final_redhat_00001.1.el6eap.noarch.rpm
RedHat6noarcheap7-ironjacamar-jdbc< 1.4.35-1.Final_redhat_00001.1.el6eapeap7-ironjacamar-jdbc-1.4.35-1.Final_redhat_00001.1.el6eap.noarch.rpm
RedHat6noarcheap7-jboss-remoting< 5.0.23-2.SP1_redhat_00001.1.el6eapeap7-jboss-remoting-5.0.23-2.SP1_redhat_00001.1.el6eap.noarch.rpm
RedHat6noarcheap7-narayana-restat-integration< 5.9.12-1.Final_redhat_00001.1.el6eapeap7-narayana-restat-integration-5.9.12-1.Final_redhat_00001.1.el6eap.noarch.rpm
RedHat6noarcheap7-ironjacamar-common-impl< 1.4.35-1.Final_redhat_00001.1.el6eapeap7-ironjacamar-common-impl-1.4.35-1.Final_redhat_00001.1.el6eap.noarch.rpm
RedHat6noarcheap7-narayana-restat-api< 5.9.12-1.Final_redhat_00001.1.el6eapeap7-narayana-restat-api-5.9.12-1.Final_redhat_00001.1.el6eap.noarch.rpm
RedHat6noarcheap7-jboss-server-migration< 1.7.2-9.Final_redhat_00010.1.el6eapeap7-jboss-server-migration-1.7.2-9.Final_redhat_00010.1.el6eap.noarch.rpm
RedHat6noarcheap7-hal-console< 3.2.16-1.Final_redhat_00001.1.el6eapeap7-hal-console-3.2.16-1.Final_redhat_00001.1.el6eap.noarch.rpm
RedHat6noarcheap7-jboss-server-migration-wildfly17.0-server< 1.7.2-9.Final_redhat_00010.1.el6eapeap7-jboss-server-migration-wildfly17.0-server-1.7.2-9.Final_redhat_00010.1.el6eap.noarch.rpm
Rows per page:
1-10 of 641

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.002

Percentile

57.2%