Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2023-5485-01

Red Hat Security Advisory 2023-5485-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.12 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.13 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include denial of service and deserialization vulnerabilities.

Packet Storm
#vulnerability#mac#linux#red_hat#dos#redis#nodejs#js#java#ldap#log4j#auth#jira#sap#ssl

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat JBoss Enterprise Application Platform 7.4.13 security update on RHEL 8
Advisory ID: RHSA-2023:5485-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2023:5485
Issue date: 2023-10-05
CVE Names: CVE-2022-25883 CVE-2023-3171 CVE-2023-4061
CVE-2023-26136 CVE-2023-26464 CVE-2023-33201
CVE-2023-34462
====================================================================

  1. Summary:

A security update is now available for Red Hat JBoss Enterprise Application
Platform 7.4 for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat JBoss EAP 7.4 for RHEL 8 - noarch, x86_64

  1. Description:

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on the WildFly application runtime.

This release of Red Hat JBoss Enterprise Application Platform 7.4.13 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.12
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise
Application Platform 7.4.13 Release Notes for information about the most
significant bug fixes and enhancements included in this release.

Security Fix(es):

  • server: eap-7: heap exhaustion via deserialization (CVE-2023-3171)

  • log4j: log4j1-chainsaw, log4j1-socketappender: DoS via hashmap logging
    (CVE-2023-26464)

  • nodejs-semver: Regular expression denial of service (CVE-2022-25883)

  • wildfly-core: Management User RBAC permission allows unexpected reading
    of system-properties to an Unauthorized actor (CVE-2023-4061)

  • tough-cookie: prototype pollution in cookie memstore (CVE-2023-26136)

  • bouncycastle: potential blind LDAP injection attack using a self-signed
    certificate (CVE-2023-33201)

  • netty: netty-handler: SniHandler 16MB allocation (CVE-2023-34462)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

  1. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

2182864 - CVE-2023-26464 log4j1-chainsaw, log4j1-socketappender: DoS via hashmap logging
2213639 - CVE-2023-3171 eap-7: heap exhaustion via deserialization
2215465 - CVE-2023-33201 bouncycastle: potential blind LDAP injection attack using a self-signed certificate
2216475 - CVE-2022-25883 nodejs-semver: Regular expression denial of service
2216888 - CVE-2023-34462 netty: SniHandler 16MB allocation leads to OOM
2219310 - CVE-2023-26136 tough-cookie: prototype pollution in cookie memstore
2228608 - CVE-2023-4061 wildfly-core: Management User RBAC permission allows unexpected reading of system-properties to an Unauthorized actor

  1. JIRA issues fixed (https://issues.redhat.com/):

JBEAP-24667 - (7.4.z) Upgrade Ironjacamar from 1.5.11.Final-redhat-00001 to 1.5.15.Final-redhat-00001
JBEAP-24798 - Tracker bug for the EAP 7.4.13 release for RHEL-8
JBEAP-24966 - GSS Upgrade RESTEasy from 3.15.7.Final-redhat-00001 to 3.15.8.Final-redhat-00001
JBEAP-24985 - (7.4.z) Upgrade Artemis from 2.16.0.redhat-00048 to 2.16.0.redhat-00049
JBEAP-25032 - (7.4.z) Upgrade Undertow from 2.2.25.SP3-redhat-00001 to 2.2.26.SP1-redhat-00001
JBEAP-25033 - (7.4.z) Upgrade WildFly Core from 15.0.29.Final-redhat-00001 to 15.0.30.Final-redhat-00001
JBEAP-25078 - (7.4.z) Upgrade netty from 4.1.86.Final-redhat-00001 to 4.1.94.Final-redhat-00001 (resolves CVE-2023-34462)
JBEAP-25122 - (7.4.z) Upgrade jboss-marshalling from 2.0.13.Final-redhat-00001 to 2.0.13.SP1-redhat-00001
JBEAP-25135 - (7.4.z) Upgrade Elytron from 1.15.17.Final-redhat-00001 to 1.15.20.Final-redhat-00001
JBEAP-25186 - (7.4.z) Upgrade hal console from 3.3.18.Final-redhat-00001 to 3.3.19.Final-redhat-00001
JBEAP-25200 - (7.4.z) Upgrade Hibernate ORM from 5.3.30.Final-redhat-00001 to 5.3.31.Final-redhat-00001
JBEAP-25225 - (7.4.z) Upgrade mod_cluster from 1.4.4.Final-redhat-00001 to 1.4.5.Final-redhat-00001
JBEAP-25261 - (7.4.z) NettyConnection.batchBufferSize() is broken after upgrading netty to 4.1.94.Final
JBEAP-25285 - GSS Upgrade JBoss Modules from 1.12.0.Final-redhat-00001 to 1.12.2.Final-redhat-00001
JBEAP-25312 - GSS Upgrade xnio from 3.8.9.Final-redhat-00001 to 3.8.10.Final-redhat-00001

  1. Package List:

Red Hat JBoss EAP 7.4 for RHEL 8:

Source:
eap7-activemq-artemis-2.16.0-15.redhat_00049.1.el8eap.src.rpm
eap7-bouncycastle-1.76.0-4.redhat_00001.1.el8eap.src.rpm
eap7-hal-console-3.3.19-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-hibernate-5.3.31-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-ironjacamar-1.5.15-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jboss-marshalling-2.0.13-2.SP1_redhat_00001.1.el8eap.src.rpm
eap7-jboss-modules-1.12.2-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jboss-server-migration-1.10.0-31.Final_redhat_00030.1.el8eap.src.rpm
eap7-jboss-xnio-base-3.8.10-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-mod_cluster-1.4.5-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-netty-4.1.94-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-netty-transport-native-epoll-4.1.94-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-resteasy-3.15.8-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-undertow-2.2.26-1.SP1_redhat_00001.1.el8eap.src.rpm
eap7-wildfly-7.4.13-8.GA_redhat_00001.1.el8eap.src.rpm
eap7-wildfly-elytron-1.15.20-1.Final_redhat_00001.1.el8eap.src.rpm

noarch:
eap7-activemq-artemis-2.16.0-15.redhat_00049.1.el8eap.noarch.rpm
eap7-activemq-artemis-cli-2.16.0-15.redhat_00049.1.el8eap.noarch.rpm
eap7-activemq-artemis-commons-2.16.0-15.redhat_00049.1.el8eap.noarch.rpm
eap7-activemq-artemis-core-client-2.16.0-15.redhat_00049.1.el8eap.noarch.rpm
eap7-activemq-artemis-dto-2.16.0-15.redhat_00049.1.el8eap.noarch.rpm
eap7-activemq-artemis-hornetq-protocol-2.16.0-15.redhat_00049.1.el8eap.noarch.rpm
eap7-activemq-artemis-hqclient-protocol-2.16.0-15.redhat_00049.1.el8eap.noarch.rpm
eap7-activemq-artemis-jdbc-store-2.16.0-15.redhat_00049.1.el8eap.noarch.rpm
eap7-activemq-artemis-jms-client-2.16.0-15.redhat_00049.1.el8eap.noarch.rpm
eap7-activemq-artemis-jms-server-2.16.0-15.redhat_00049.1.el8eap.noarch.rpm
eap7-activemq-artemis-journal-2.16.0-15.redhat_00049.1.el8eap.noarch.rpm
eap7-activemq-artemis-ra-2.16.0-15.redhat_00049.1.el8eap.noarch.rpm
eap7-activemq-artemis-selector-2.16.0-15.redhat_00049.1.el8eap.noarch.rpm
eap7-activemq-artemis-server-2.16.0-15.redhat_00049.1.el8eap.noarch.rpm
eap7-activemq-artemis-service-extensions-2.16.0-15.redhat_00049.1.el8eap.noarch.rpm
eap7-activemq-artemis-tools-2.16.0-15.redhat_00049.1.el8eap.noarch.rpm
eap7-bouncycastle-1.76.0-4.redhat_00001.1.el8eap.noarch.rpm
eap7-bouncycastle-mail-1.76.0-4.redhat_00001.1.el8eap.noarch.rpm
eap7-bouncycastle-pg-1.76.0-4.redhat_00001.1.el8eap.noarch.rpm
eap7-bouncycastle-pkix-1.76.0-4.redhat_00001.1.el8eap.noarch.rpm
eap7-bouncycastle-prov-1.76.0-4.redhat_00001.1.el8eap.noarch.rpm
eap7-bouncycastle-util-1.76.0-4.redhat_00001.1.el8eap.noarch.rpm
eap7-hal-console-3.3.19-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-5.3.31-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-core-5.3.31-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-entitymanager-5.3.31-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-envers-5.3.31-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-java8-5.3.31-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-1.5.15-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-common-api-1.5.15-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-common-impl-1.5.15-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-common-spi-1.5.15-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-core-api-1.5.15-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-core-impl-1.5.15-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-deployers-common-1.5.15-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-jdbc-1.5.15-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-validator-1.5.15-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-marshalling-2.0.13-2.SP1_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-marshalling-river-2.0.13-2.SP1_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-modules-1.12.2-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-server-migration-1.10.0-31.Final_redhat_00030.1.el8eap.noarch.rpm
eap7-jboss-server-migration-cli-1.10.0-31.Final_redhat_00030.1.el8eap.noarch.rpm
eap7-jboss-server-migration-core-1.10.0-31.Final_redhat_00030.1.el8eap.noarch.rpm
eap7-jboss-xnio-base-3.8.10-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-mod_cluster-1.4.5-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-all-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-buffer-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-codec-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-codec-dns-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-codec-haproxy-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-codec-http-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-codec-http2-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-codec-memcache-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-codec-mqtt-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-codec-redis-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-codec-smtp-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-codec-socks-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-codec-stomp-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-codec-xml-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-common-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-handler-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-handler-proxy-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-resolver-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-resolver-dns-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-resolver-dns-classes-macos-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-transport-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-transport-classes-epoll-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-transport-classes-kqueue-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-transport-native-unix-common-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-transport-rxtx-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-transport-sctp-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-transport-udt-4.1.94-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-atom-provider-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-cdi-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-client-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-crypto-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-jackson-provider-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-jackson2-provider-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-jaxb-provider-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-jaxrs-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-jettison-provider-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-jose-jwt-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-jsapi-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-json-binding-provider-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-json-p-provider-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-multipart-provider-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-rxjava2-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-spring-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-validator-provider-11-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-yaml-provider-3.15.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-undertow-2.2.26-1.SP1_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-7.4.13-8.GA_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-elytron-1.15.20-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-elytron-tool-1.15.20-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-java-jdk11-7.4.13-8.GA_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-java-jdk17-7.4.13-8.GA_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-java-jdk8-7.4.13-8.GA_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-javadocs-7.4.13-8.GA_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-modules-7.4.13-8.GA_redhat_00001.1.el8eap.noarch.rpm

x86_64:
eap7-netty-transport-native-epoll-4.1.94-1.Final_redhat_00001.1.el8eap.x86_64.rpm
eap7-netty-transport-native-epoll-debuginfo-4.1.94-1.Final_redhat_00001.1.el8eap.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2022-25883
https://access.redhat.com/security/cve/CVE-2023-3171
https://access.redhat.com/security/cve/CVE-2023-4061
https://access.redhat.com/security/cve/CVE-2023-26136
https://access.redhat.com/security/cve/CVE-2023-26464
https://access.redhat.com/security/cve/CVE-2023-33201
https://access.redhat.com/security/cve/CVE-2023-34462
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/

  1. Contact:

The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=jUhz
-----END PGP SIGNATURE-----

RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Related news

Red Hat Security Advisory 2024-8676-03

Red Hat Security Advisory 2024-8676-03 - Updated images that include numerous enhancements, security, and bug fixes are now available for Red Hat OpenShift Data Foundation 4.17.0 on Red Hat Enterprise Linux 9.

Red Hat Security Advisory 2024-1353-03

Red Hat Security Advisory 2024-1353-03 - An update is now available for Red Hat Process Automation Manager. Issues addressed include code execution, denial of service, and deserialization vulnerabilities.

Red Hat Security Advisory 2024-0278-03

Red Hat Security Advisory 2024-0278-03 - Red Hat AMQ Broker 7.11.5 is now available from the Red Hat Customer Portal.

Red Hat Security Advisory 2023-7697-03

Red Hat Security Advisory 2023-7697-03 - An update is now available for Red Hat AMQ Clients. Issues addressed include code execution, denial of service, deserialization, and resource exhaustion vulnerabilities.

Red Hat Security Advisory 2023-7669-03

Red Hat Security Advisory 2023-7669-03 - New Red Hat build of Cryostat 2.4.0 on RHEL 8 container images are now available.

Red Hat Security Advisory 2023-7653-03

Red Hat Security Advisory 2023-7653-03 - An update to the images for Red Hat Integration - Service Registry is now available from the Red Hat Container Catalog. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Issues addressed include bypass and denial of service vulnerabilities.

GHSA-26qx-4m49-6cfr: wildfly-core Exposure of Sensitive Information to an Unauthorized Actor vulnerability

A flaw was found in wildfly-core. A management user could use the resolve-expression in the HAL Interface to read possible sensitive information from the Wildfly system. This issue could allow a malicious user to access the system and obtain possible sensitive information from the system.

CVE-2023-4061

A flaw was found in wildfly-core. A management user could use the resolve-expression in the HAL Interface to read possible sensitive information from the Wildfly system. This issue could allow a malicious user to access the system and obtain possible sensitive information from the system.

Red Hat Security Advisory 2023-5946-01

Red Hat Security Advisory 2023-5946-01 - Red Hat AMQ Broker 7.11.3 is now available from the Red Hat Customer Portal. Issues addressed include denial of service and open redirection vulnerabilities.

CVE-2023-22130: Oracle Critical Patch Update Advisory - October 2023

Vulnerability in the Sun ZFS Storage Appliance product of Oracle Systems (component: Core). The supported version that is affected is 8.8.60. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Sun ZFS Storage Appliance. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Sun ZFS Storage Appliance. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).

CVE-2022-22377: Security Bulletin: IBM Security Verify Privilege On-Premise is affected by multiple security vulnerabilities

IBM Security Verify Privilege On-Premises 11.5 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 221827.

CVE-2023-30994: Security Bulletin: IBM QRadar SIEM includes components with known vulnerabilities

IBM QRadar SIEM 7.5.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 254138

Red Hat Security Advisory 2023-5488-01

Red Hat Security Advisory 2023-5488-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.12 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.13 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include denial of service and deserialization vulnerabilities.

Red Hat Security Advisory 2023-5484-01

Red Hat Security Advisory 2023-5484-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.13 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.12 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.13 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include denial of service and deserialization vulnerabilities.

RHSA-2023:5488: Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.13 security update

A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25883: A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of servi...

RHSA-2023:5488: Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.13 security update

A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25883: A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of servi...

RHSA-2023:5488: Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.13 security update

A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25883: A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of servi...

RHSA-2023:5488: Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.13 security update

A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25883: A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of servi...

RHSA-2023:5488: Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.13 security update

A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25883: A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of servi...

RHSA-2023:5488: Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.13 security update

A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25883: A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of servi...

Red Hat Security Advisory 2023-5442-01

Red Hat Security Advisory 2023-5442-01 - Red Hat Advanced Cluster Management for Kubernetes 2.8.2 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs.

Red Hat Security Advisory 2023-5421-01

Red Hat Security Advisory 2023-5421-01 - Multicluster Engine for Kubernetes 2.3.2 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy.

RHSA-2023:5442: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.8.2 security and bug fix updates

Red Hat Advanced Cluster Management for Kubernetes 2.8.2 General Availability release images, which provide security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41721: A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead read the body of the HTTP request, which could be att...

RHSA-2023:5441: Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 4.0.0 release and security update

Red Hat Integration Camel for Spring Boot 4.0.0 release and security update is now available. Red Hat Product Security has rated this update as having an impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-44729: A flaw was found in Apache Batik 1.0 - 1.16. This issue occurs due to a malicious SVG triggering external resources loading by default, causing resource consumption or in some cases information disclosure. * CVE-2022-44730: A flaw was found in Apache Batik, where a malicious SVG can probe user profile data and send it directly as ...

RHSA-2023:5421: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.3.2 security updates and bug fixes

Multicluster Engine for Kubernetes 2.3.2 General Availability release images, which contain security updates and fix bugs. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41721: A request smuggling attack is possible when using MaxBytesHandler. When using MaxBytesHandler, the body of an HTTP request is not fully consumed. When the server attempts to read HTTP2 frames from the connection, it will instead read the body of the HTTP request, which could be attacker-manipulate...

Red Hat Security Advisory 2023-5396-01

Red Hat Security Advisory 2023-5396-01 - Red Hat Data Grid is an in-memory, distributed, NoSQL datastore solution. It increases application response times and allows for dramatically improving performance while providing availability, reliability, and elastic scale. Data Grid 8.4.4 replaces Data Grid 8.4.3 and includes bug fixes and enhancements. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2023-5379-01

Red Hat Security Advisory 2023-5379-01 - Network Observability 1.4.0. Issues addressed include a denial of service vulnerability.

RHSA-2023:5396: Red Hat Security Advisory: Red Hat Data Grid 8.4.4 security update

An update for Red Hat Data Grid 8 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-45047: A flaw was found in Apache MINA SSHD, when using Java deserialization to load a serialized java.security.PrivateKey. An attacker could benefit from unsafe deserialization by inserting unsecured data that may affect the application or server. * CVE-2023-3628: A flaw was found in Infinispan's REST. Bulk read endpoints do not properly evaluate user permissions for the...

RHSA-2023:5379: Red Hat Security Advisory: Network Observability 1.4.0 for OpenShift

Network Observability is an OpenShift operator that deploys a monitoring pipeline to collect and enrich network flows that are produced by the Network Observability eBPF agent. The operator provides dashboards, metrics, and keeps flows accessible in a queryable log store, Grafana Loki. When a FlowCollector is deployed, new dashboards are available in the Console. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25883: A Regular Expression Denial of Service (ReDoS) vulne...

Red Hat Security Advisory 2023-5361-01

Red Hat Security Advisory 2023-5361-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include HTTP request smuggling, bypass, and denial of service vulnerabilities.

Red Hat Security Advisory 2023-5363-01

Red Hat Security Advisory 2023-5363-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include bypass and denial of service vulnerabilities.

RHSA-2023:5362: Red Hat Security Advisory: nodejs:18 security, bug fix, and enhancement update

An update for the nodejs:18 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25883: A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service. * ...

RHSA-2023:5361: Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update

An update for the nodejs:16 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25883: A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting ...

CVE-2023-39252: DSA-2023-321: Security Update for Dell Secure Connect Gateway Security Policy Manager Vulnerabilities

Dell SCG Policy Manager 5.16.00.14 contains a broken cryptographic algorithm vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by performing MitM attacks and let attackers obtain sensitive information.

Red Hat Security Advisory 2023-5165-01

Red Hat Security Advisory 2023-5165-01 - Red Hat AMQ Streams, based on the Apache Kafka project, offers a distributed backbone that allows microservices and other applications to share data with extremely high throughput and extremely low latency. Issues addressed include code execution, denial of service, deserialization, and integer overflow vulnerabilities.

Red Hat Security Advisory 2023-5165-01

Red Hat Security Advisory 2023-5165-01 - Red Hat AMQ Streams, based on the Apache Kafka project, offers a distributed backbone that allows microservices and other applications to share data with extremely high throughput and extremely low latency. Issues addressed include code execution, denial of service, deserialization, and integer overflow vulnerabilities.

Red Hat Security Advisory 2023-5147-01

Red Hat Security Advisory 2023-5147-01 - A security update for Camel for Spring Boot 3.18.3.2 is now available. Issues addressed include bypass and denial of service vulnerabilities.

RHSA-2023:5165: Red Hat Security Advisory: Red Hat AMQ Streams 2.5.0 release and security update

Red Hat AMQ Streams 2.5.0 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: A flaw was found in Netty's netty-codec due to size restrictions for decompressed data in the Bzip2Decoder. By sending a specially-crafted input, a remote attacker could cause a denial of service. * CVE-2021-37137: A flaw was found in the Netty's netty-codec due to unrestricted chunk lengths in the SnappyFrameDecoder. By sending a speciall...

RHSA-2023:5165: Red Hat Security Advisory: Red Hat AMQ Streams 2.5.0 release and security update

Red Hat AMQ Streams 2.5.0 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: A flaw was found in Netty's netty-codec due to size restrictions for decompressed data in the Bzip2Decoder. By sending a specially-crafted input, a remote attacker could cause a denial of service. * CVE-2021-37137: A flaw was found in the Netty's netty-codec due to unrestricted chunk lengths in the SnappyFrameDecoder. By sending a speciall...

RHSA-2023:5147: Red Hat Security Advisory: Red Hat Integration Camel for Spring Boot 3.18.3.2 release and security update

Red Hat Integration Camel for Spring Boot 3.18.3.2 release and security update is now available. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Red Hat Product Security has rated this update as having an impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-46877: A flaw was found in Jackson Databind. This issue may allow a malicious user to cause a denial of service (2 GB transient heap usage per read) in uncommon situations involving JsonNode JDK serialization. * CVE-2023-20873: A fla...

Red Hat Security Advisory 2023-4341-01

Red Hat Security Advisory 2023-4341-01 - Red Hat OpenShift bug fix and security update. Red Hat Product Security has rated this update as having a security impact of Low. Issues addressed include a denial of service vulnerability.

RHSA-2023:4341: Red Hat Security Advisory: Logging Subsystem 5.7.4 - Red Hat OpenShift bug fix and security update

Logging Subsystem 5.7.4 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25883: A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the 'new Range' function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service. * CVE-2023-22796: A flaw was found in rubygem-ac...

RHSA-2023:3998: Red Hat Security Advisory: Logging Subsystem 5.7.3 - Red Hat OpenShift security update

An update is now available for Red Hat OpenShift Logging Subsystem 5.7.3 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-26115: A flaw was found in the Node.js word-wrap module, where it is vulnerable to a denial of service caused by a Regular expression denial of service (ReDoS) issue in the result variable. By sending a specially crafted regex input, a remote attacker can cause a denial of service. * CVE-2023-26136: A flaw was found in the tough-cookie package. Affec...

GHSA-hr8g-6v94-x4m9: Bouncy Castle For Java LDAP injection vulnerability

Bouncy Castle provides the X509LDAPCertStoreSpi.java class which can be used in conjunction with the CertPath API for validating certificate paths. Pre-1.73 the implementation did not check the X.500 name of any certificate, subject, or issuer being passed in for LDAP wild cards, meaning the presence of a wild car may lead to Information Disclosure. A potential attack would be to generate a self-signed certificate with a subject name that contains special characters, e.g: CN=Subject*)(objectclass=. This will be included into the filter and provides the attacker ability to specify additional attributes in the search query. This can be exploited as a blind LDAP injection: an attacker can enumerate valid attribute values using the boolean blind injection technique. The exploitation depends on the structure of the target LDAP directory, as well as what kind of errors are exposed to the user. Changes to the X509LDAPCertStoreSpi.java class add the additional checking of any X.500 name used...

CVE-2023-33201: added filter encode to search · bcgit/bc-java@e8c409a

Bouncy Castle For Java before 1.74 is affected by an LDAP injection vulnerability. The vulnerability only affects applications that use an LDAP CertStore from Bouncy Castle to validate X.509 certificates. During the certificate validation process, Bouncy Castle inserts the certificate's Subject Name into an LDAP search filter without any escaping, which leads to an LDAP injection vulnerability.

CVE-2023-26136: Snyk Vulnerability Database | Snyk

Versions of the package tough-cookie before 4.1.3 are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.

Red Hat Security Advisory 2023-3954-01

Red Hat Security Advisory 2023-3954-01 - This release of Red Hat Fuse 7.12 serves as a replacement for Red Hat Fuse 7.11 and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References. Issues addressed include bypass, code execution, denial of service, information leakage, resource exhaustion, server-side request forgery, and traversal vulnerabilities.

RHSA-2023:3954: Red Hat Security Advisory: Red Hat Fuse 7.12 release and security update

A minor version update (from 7.11 to 7.12) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2012-5783: It was found that Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or su...

CVE-2023-34462: SniHandler 16MB allocation

Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. The `SniHandler` can allocate up to 16MB of heap for each channel during the TLS handshake. When the handler or the channel does not have an idle timeout, it can be used to make a TCP server using the `SniHandler` to allocate 16MB of heap. The `SniHandler` class is a handler that waits for the TLS handshake to configure a `SslHandler` according to the indicated server name by the `ClientHello` record. For this matter it allocates a `ByteBuf` using the value defined in the `ClientHello` record. Normally the value of the packet should be smaller than the handshake packet but there are not checks done here and the way the code is written, it is possible to craft a packet that makes the `SslClientHelloHandler`. This vulnerability has been fixed in version 4.1.94.Final.

GHSA-c2qf-rxjj-qqgw: semver vulnerable to Regular Expression Denial of Service

Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.

CVE-2022-25883: fix: better handling of whitespace (#564) · npm/node-semver@717534e

Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.

GHSA-6mjq-h674-j845: netty-handler SniHandler 16MB allocation

### Summary The `SniHandler` can allocate up to 16MB of heap for each channel during the TLS handshake. When the handler or the channel does not have an idle timeout, it can be used to make a TCP server using the `SniHandler` to allocate 16MB of heap. ### Details The `SniHandler` class is a handler that waits for the TLS handshake to configure a `SslHandler` according to the indicated server name by the `ClientHello` record. For this matter it allocates a `ByteBuf` using the value defined in the `ClientHello` record. Normally the value of the packet should be smaller than the handshake packet but there are not checks done here and the way the code is written, it is possible to craft a packet that makes the `SslClientHelloHandler` 1/ allocate a 16MB `ByteBuf` 2/ not fail `decode` method `in` buffer 3/ get out of the loop without an exception The combination of this without the use of a timeout makes easy to connect to a TCP server and allocate 16MB of heap memory per connection. ...

RHSA-2023:3663: Red Hat Security Advisory: jenkins and jenkins-2-plugins security update

An update for jenkins and jenkins-2-plugins is now available for OpenShift Developer Tools and Services for OCP 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2048: A flaw was found in the Eclipse Jetty http2-server package. This flaw allows an attacker to cause a denial of service in the server via HTTP/2 requests. * CVE-2022-22976: A flaw was found in Spring Framework. The encoder does not perform any salt rounds when using the BCrypt class with the maximum wo...

GHSA-vp98-w2p3-mv35: Apache Log4j 1.x (EOL) allows Denial of Service (DoS)

** UNSUPPORTED WHEN ASSIGNED ** When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (ie, deeply nested) hashmap or hashtable (depending on which logging component is in use) to be processed could exhaust the available memory in the virtual machine and achieve Denial of Service when the object is deserialized. This issue affects Apache Log4j before 2. Affected users are recommended to update to Log4j 2.x. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

CVE-2023-26464

** UNSUPPORTED WHEN ASSIGNED ** When using the Chainsaw or SocketAppender components with Log4j 1.x on JRE less than 1.7, an attacker that manages to cause a logging entry involving a specially-crafted (ie, deeply nested) hashmap or hashtable (depending on which logging component is in use) to be processed could exhaust the available memory in the virtual machine and achieve Denial of Service when the object is deserialized. This issue affects Apache Log4j before 2. Affected users are recommended to update to Log4j 2.x. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Packet Storm: Latest News

Zeek 6.0.9