Security
Headlines
HeadlinesLatestCVEs

Headline

Red Hat Security Advisory 2022-5892-01

Red Hat Security Advisory 2022-5892-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.6 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.5, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.6 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include a deserialization vulnerability.

Packet Storm
#vulnerability#mac#google#linux#red_hat#apache#redis#js#git#java#jira#ssl

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update
Advisory ID: RHSA-2022:5892-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2022:5892
Issue date: 2022-08-03
CVE Names: CVE-2021-44906 CVE-2022-24823 CVE-2022-25647
====================================================================

  1. Summary:

A security update is now available for Red Hat JBoss Enterprise Application
Platform 7.4 for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat JBoss EAP 7.4 for RHEL 7 Server - noarch, x86_64

  1. Description:

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on the WildFly application runtime. This release of Red
Hat JBoss Enterprise Application Platform 7.4.6 serves as a replacement for
Red Hat JBoss Enterprise Application Platform 7.4.5, and includes bug fixes
and enhancements. See the Red Hat JBoss Enterprise Application Platform
7.4.6 Release Notes for information about the most significant bug fixes
and enhancements included in this release.
Security Fix(es):

  • com.google.code.gson-gson: Deserialization of Untrusted Data in
    com.google.code.gson-gson (CVE-2022-25647)

  • org.jboss.hal-hal-parent: minimist: prototype pollution (CVE-2021-44906)

  • netty: world readable temporary file containing sensitive data
    (CVE-2022-24823)

  1. Solution:

Before applying this update, ensure all previously released errata relevant
to your system have been applied. For details about how to apply this
update, see: https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

2066009 - CVE-2021-44906 minimist: prototype pollution
2080850 - CVE-2022-25647 com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson
2087186 - CVE-2022-24823 netty: world readable temporary file containing sensitive data

  1. JIRA issues fixed (https://issues.jboss.org/):

JBEAP-17119 - Update quick start references to “Red Hat Developer Studio” to new name “Red Hat CodeReady Studio”
JBEAP-23344 - GSS Upgrade Ironjacamar from 1.5.3.Final-redhat-00001 to 1.5.3.SP1
JBEAP-23360 - Tracker bug for the EAP 7.4.6 release for RHEL-7
JBEAP-23444 - (7.4.z) WFLY-16231 - Github clone URLs need to be updated for jboss-eap7 repository since Github dropped git:// protocol
JBEAP-23492 - (7.4.z) Upgrade HAL from 3.3.12.Final-redhat-00001 to 3.3.13.Final-redhat-00001
JBEAP-23526 - GSS Upgrade JBoss Remoting from 5.0.24.SP1-redhat-00001 to 5.0.25.SP1
JBEAP-23528 - (7.4.z) Upgrade Jandex from 2.2.3.Final-redhat-00001 to 2.4.2.Final-redhat-00001
JBEAP-23546 - GSS Upgrade Apache CXF from 3.3.12 to 3.3.13+
JBEAP-23550 - QA Upgrade jberet from 1.3.9.SP1 to 1.3.9.SP2
JBEAP-23551 - (7.4.z) Upgrade PicketLink from 2.5.5.SP12-redhat-00009 to 2.5.5.SP12-redhat-00011
JBEAP-23554 - (7.4.z) Upgrade Mojarra from 2.3.14.SP04-redhat-00001 to 2.3.14.SP05
JBEAP-23556 - GSS Upgrade JSF API from 3.0.0.SP05-redhat-00002 to 3.0.0.SP06
JBEAP-23557 - (7.4.z) Upgrade WildFly Core from 15.0.13.Final-redhat-00001 to 15.0.14.Final
JBEAP-23559 - GSS Upgrade Undertow from 2.2.17.SP4-redhat-00001 to 2.2.18.SP1
JBEAP-23561 - SET Upgrade PicketLink bindings from 2.5.5.SP12-redhat-00013 to 2.5.5.SP12-redhat-00014
JBEAP-23566 - GSS Upgrade Hibernate ORM from 5.3.26.Final-redhat-00002 to 5.3.27.Final
JBEAP-23571 - GSS Upgrade Elytron from 1.15.12.Final-redhat-00001 to 1.15.13.Final-redhat-00001
JBEAP-23626 - (7.4.z) Upgrade PicketBox from 5.0.3.Final-redhat-00008 to 5.0.3.Final-redhat-00009
JBEAP-23659 - GSS Upgrade wildfly-http-ejb-client from 1.1.11.SP1 to 1.1.12.SP1
JBEAP-23671 - (7.4.z) Upgrade Netty from 4.1.72.Final-redhat-00001 to 4.1.77.Final-redhat-00001 and netty-tcnative from 2.0.48.Final-redhat-00001 to 2.0.52.Final-redhat-00001
JBEAP-23686 - (7.4.z) Upgrade Jackson Databind from 2.12.6.1.redhat-00003 to 2.12.6.1.redhat-00004
JBEAP-23726 - (7.4.z) Upgrade OpenSSL Natives from 2.2.0.Final-redhat-00002 to 2.2.2.Final
JBEAP-23728 - (7.4.z) Upgrade OpenSSL from 2.2.0.Final-redhat-00002 to 2.2.3.Final
JBEAP-23806 - QA Upgrade Undertow from 2.2.18.SP1-redhat-00001 to 2.2.18.SP2
JBEAP-23807 - (7.4.z) Upgrade WildFly Core from 15.0.14.Final-redhat-00001 to 15.0.15.Final-redhat-00001

  1. Package List:

Red Hat JBoss EAP 7.4 for RHEL 7 Server:

Source:
eap7-apache-cxf-3.3.13-1.redhat_00001.1.el7eap.src.rpm
eap7-glassfish-jsf-2.3.14-4.SP05_redhat_00001.1.el7eap.src.rpm
eap7-gson-2.8.9-1.redhat_00001.1.el7eap.src.rpm
eap7-hal-console-3.3.13-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-hibernate-5.3.27-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-ironjacamar-1.5.3-2.SP1_redhat_00001.1.el7eap.src.rpm
eap7-jackson-databind-2.12.6.1-2.redhat_00004.1.el7eap.src.rpm
eap7-jandex-2.4.2-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-jberet-1.3.9-2.SP2_redhat_00001.1.el7eap.src.rpm
eap7-jboss-jsf-api_2.3_spec-3.0.0-5.SP06_redhat_00001.1.el7eap.src.rpm
eap7-jboss-remoting-5.0.25-1.SP1_redhat_00001.1.el7eap.src.rpm
eap7-jboss-server-migration-1.10.0-18.Final_redhat_00017.1.el7eap.src.rpm
eap7-netty-4.1.77-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-netty-tcnative-2.0.52-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-netty-transport-native-epoll-4.1.77-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-picketbox-5.0.3-10.Final_redhat_00009.1.el7eap.src.rpm
eap7-picketlink-bindings-2.5.5-26.SP12_redhat_00014.1.el7eap.src.rpm
eap7-picketlink-federation-2.5.5-21.SP12_redhat_00011.1.el7eap.src.rpm
eap7-undertow-2.2.18-2.SP2_redhat_00001.1.el7eap.src.rpm
eap7-wildfly-7.4.6-5.GA_redhat_00002.1.el7eap.src.rpm
eap7-wildfly-elytron-1.15.13-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-wildfly-http-client-1.1.12-1.SP1_redhat_00001.1.el7eap.src.rpm
eap7-wildfly-openssl-2.2.3-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-wildfly-openssl-el7-x86_64-2.2.2-1.Final_redhat_00002.1.el7eap.src.rpm

noarch:
eap7-apache-cxf-3.3.13-1.redhat_00001.1.el7eap.noarch.rpm
eap7-apache-cxf-rt-3.3.13-1.redhat_00001.1.el7eap.noarch.rpm
eap7-apache-cxf-services-3.3.13-1.redhat_00001.1.el7eap.noarch.rpm
eap7-apache-cxf-tools-3.3.13-1.redhat_00001.1.el7eap.noarch.rpm
eap7-glassfish-jsf-2.3.14-4.SP05_redhat_00001.1.el7eap.noarch.rpm
eap7-gson-2.8.9-1.redhat_00001.1.el7eap.noarch.rpm
eap7-hal-console-3.3.13-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-5.3.27-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-core-5.3.27-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-entitymanager-5.3.27-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-envers-5.3.27-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-java8-5.3.27-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-1.5.3-2.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-common-api-1.5.3-2.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-common-impl-1.5.3-2.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-common-spi-1.5.3-2.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-core-api-1.5.3-2.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-core-impl-1.5.3-2.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-deployers-common-1.5.3-2.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-jdbc-1.5.3-2.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-validator-1.5.3-2.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-jackson-databind-2.12.6.1-2.redhat_00004.1.el7eap.noarch.rpm
eap7-jandex-2.4.2-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jberet-1.3.9-2.SP2_redhat_00001.1.el7eap.noarch.rpm
eap7-jberet-core-1.3.9-2.SP2_redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-jsf-api_2.3_spec-3.0.0-5.SP06_redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-remoting-5.0.25-1.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-server-migration-1.10.0-18.Final_redhat_00017.1.el7eap.noarch.rpm
eap7-jboss-server-migration-cli-1.10.0-18.Final_redhat_00017.1.el7eap.noarch.rpm
eap7-jboss-server-migration-core-1.10.0-18.Final_redhat_00017.1.el7eap.noarch.rpm
eap7-netty-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-all-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-buffer-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-codec-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-codec-dns-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-codec-haproxy-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-codec-http-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-codec-http2-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-codec-memcache-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-codec-mqtt-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-codec-redis-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-codec-smtp-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-codec-socks-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-codec-stomp-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-codec-xml-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-common-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-handler-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-handler-proxy-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-resolver-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-resolver-dns-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-resolver-dns-classes-macos-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-tcnative-2.0.52-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-transport-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-transport-classes-epoll-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-transport-classes-kqueue-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-transport-native-unix-common-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-transport-rxtx-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-transport-sctp-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-transport-udt-4.1.77-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-picketbox-5.0.3-10.Final_redhat_00009.1.el7eap.noarch.rpm
eap7-picketbox-infinispan-5.0.3-10.Final_redhat_00009.1.el7eap.noarch.rpm
eap7-picketlink-api-2.5.5-21.SP12_redhat_00011.1.el7eap.noarch.rpm
eap7-picketlink-bindings-2.5.5-26.SP12_redhat_00014.1.el7eap.noarch.rpm
eap7-picketlink-common-2.5.5-21.SP12_redhat_00011.1.el7eap.noarch.rpm
eap7-picketlink-config-2.5.5-21.SP12_redhat_00011.1.el7eap.noarch.rpm
eap7-picketlink-federation-2.5.5-21.SP12_redhat_00011.1.el7eap.noarch.rpm
eap7-picketlink-idm-api-2.5.5-21.SP12_redhat_00011.1.el7eap.noarch.rpm
eap7-picketlink-idm-impl-2.5.5-21.SP12_redhat_00011.1.el7eap.noarch.rpm
eap7-picketlink-idm-simple-schema-2.5.5-21.SP12_redhat_00011.1.el7eap.noarch.rpm
eap7-picketlink-impl-2.5.5-21.SP12_redhat_00011.1.el7eap.noarch.rpm
eap7-picketlink-wildfly8-2.5.5-26.SP12_redhat_00014.1.el7eap.noarch.rpm
eap7-undertow-2.2.18-2.SP2_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-7.4.6-5.GA_redhat_00002.1.el7eap.noarch.rpm
eap7-wildfly-elytron-1.15.13-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-elytron-tool-1.15.13-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-http-client-common-1.1.12-1.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-http-ejb-client-1.1.12-1.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-http-naming-client-1.1.12-1.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-http-transaction-client-1.1.12-1.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-java-jdk11-7.4.6-5.GA_redhat_00002.1.el7eap.noarch.rpm
eap7-wildfly-java-jdk8-7.4.6-5.GA_redhat_00002.1.el7eap.noarch.rpm
eap7-wildfly-javadocs-7.4.6-5.GA_redhat_00002.1.el7eap.noarch.rpm
eap7-wildfly-modules-7.4.6-5.GA_redhat_00002.1.el7eap.noarch.rpm
eap7-wildfly-openssl-2.2.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-openssl-java-2.2.3-1.Final_redhat_00001.1.el7eap.noarch.rpm

x86_64:
eap7-netty-transport-native-epoll-4.1.77-1.Final_redhat_00001.1.el7eap.x86_64.rpm
eap7-netty-transport-native-epoll-debuginfo-4.1.77-1.Final_redhat_00001.1.el7eap.x86_64.rpm
eap7-wildfly-openssl-el7-x86_64-2.2.2-1.Final_redhat_00002.1.el7eap.x86_64.rpm
eap7-wildfly-openssl-el7-x86_64-debuginfo-2.2.2-1.Final_redhat_00002.1.el7eap.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2021-44906
https://access.redhat.com/security/cve/CVE-2022-24823
https://access.redhat.com/security/cve/CVE-2022-25647
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/

  1. Contact:

The Red Hat security contact is [email protected]. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYusNSdzjgjWX9erEAQjsww//cEtraBK4kuY3svhzqnACfLV1hYGVvc4A
CFLLUItpTO8EvUoPxNlaseZ+XErrdlkFPaWce1DOg7i8+2XARJAhnRttbQI1OJgT
5ZbKtQNM0akNxKDYgm5Psed2WRWbat4w+1rmizuSzftJLOWybRIu/tAYLB1a1JMt
oHv2a3nRJmW42e3ENHW2VkBocMvvcFZ/qIyE6laPMrLs9vZMNoZPXG0JcXEonPR5
WMsqJcXq8onDP+pWKTbYNyKsrKq08xPRAdspxOooMbL8EwdggO/nTefciX4DgCj/
aXtAiIY87RJnEEWd8d9wedzGzoLOr8Sh645wWr8Zof2drNRL/CBao59d1knWRT5z
VDuAuJ7cTYqgAu897wocGtoRD+uDULMatHfzO4eCaHhpOvYnG4y+SiDn0LGrhbB+
ioW3PPMl8nVTb9Jw9v1DsqtnD9Fdhg7DH/8C+G46pRl+r+mdq4D3+JqHQry7+SRq
JDmGNFAbuM4cuIthDBAFn/258J9GQKHyepl1DqzMfZUIKU9eFaiGbBy8inoB5BrI
bRaa7E4znjS4owLlzkhHI9wb+Dw/YLeeIte3zviFtTpXCV+TJz1eOHaQ/wXajkjI
UjohSgGyr7PSCNxo6l6deHzlEiAiVAudGjY01WkgFC0wXMehRHON+Gn4qK34IFtB
o7M7q8hM39k=s4aJ
-----END PGP SIGNATURE-----

RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

Related news

High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server

Atlassian and the Internet Systems Consortium (ISC) have disclosed several security flaws impacting their products that could be exploited to achieve denial-of-service (DoS) and remote code execution. The Australian software services provider said that the four high-severity flaws were fixed in new versions shipped last month. This includes - CVE-2022-25647 (CVSS score: 7.5) - A deserialization

RHSA-2023:5165: Red Hat Security Advisory: Red Hat AMQ Streams 2.5.0 release and security update

Red Hat AMQ Streams 2.5.0 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: A flaw was found in Netty's netty-codec due to size restrictions for decompressed data in the Bzip2Decoder. By sending a specially-crafted input, a remote attacker could cause a denial of service. * CVE-2021-37137: A flaw was found in the Netty's netty-codec due to unrestricted chunk lengths in the SnappyFrameDecoder. By sending a speciall...

CVE-2023-22062: Oracle Critical Patch Update Advisory - July 2023

Vulnerability in the Oracle Hyperion Financial Reporting product of Oracle Hyperion (component: Repository). The supported version that is affected is 11.2.13.0.000. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hyperion Financial Reporting. While the vulnerability is in Oracle Hyperion Financial Reporting, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hyperion Financial Reporting accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hyperion Financial Reporting. CVSS 3.1 Base Score 8.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L).

Red Hat Security Advisory 2023-3223-01

Red Hat Security Advisory 2023-3223-01 - Red Hat AMQ Streams, based on the Apache Kafka project, offers a distributed backbone that allows microservices and other applications to share data with extremely high throughput and extremely low latency. This release of Red Hat AMQ Streams 2.4.0 serves as a replacement for Red Hat AMQ Streams 2.3.0, and includes security and bug fixes, and enhancements. Issues addressed include denial of service, deserialization, information leakage, memory exhaustion, and resource exhaustion vulnerabilities.

CVE-2022-22313: Security Bulletin: IBM QRadar Data Synchronization App for IBM QRadar SIEM is vulnerable to using components with known vulnerabilities

IBM QRadar Data Synchronization App 1.0 through 3.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 217370.

RHSA-2023:1742: Red Hat Security Advisory: nodejs:14 security, bug fix, and enhancement update

An update for the nodejs:14 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-35065: A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability. * CVE-2021-44531: A flaw was found in node.js where it accepted a certificate's Subject Alternative Names (SAN) entry...

Red Hat Security Advisory 2023-1533-01

Red Hat Security Advisory 2023-1533-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include HTTP request smuggling, buffer overflow, bypass, and denial of service vulnerabilities.

Red Hat Security Advisory 2023-1047-01

Red Hat Security Advisory 2023-1047-01 - A new image is available for Red Hat Single Sign-On 7.6.2, running on Red Hat OpenShift Container Platform from the release of 3.11 up to the release of 4.12.0. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.

Red Hat Security Advisory 2023-1045-01

Red Hat Security Advisory 2023-1045-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.2 on RHEL 9 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.

Red Hat Security Advisory 2023-1044-01

Red Hat Security Advisory 2023-1044-01 - Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.2 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.6.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.

RHSA-2023:1043: Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update on RHEL 7

New Red Hat Single Sign-On 7.6.2 packages are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-14040: In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute. * CVE-2018-14042: In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. * CVE-2019-11358: A Prototype Pollution vulnerability was found in jquery. Untrusted JSON passed to the `extend` function could lead to modi...

RHSA-2023:1049: Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update

A security update is now available for Red Hat Single Sign-On 7.6 from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2018-14040: In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute. * CVE-2018-14042: In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. * CVE-2019-11358: A Prototype Pollution vulnerability was found in jquery. Untrusted JSON passed to the `extend` function could lead to modi...

RHSA-2023:0612: Red Hat Security Advisory: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update

An update for rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-35065: A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks, affecting system availability. * CVE-2021-44906: An Uncontrolled Resource Consumption flaw was found in minimist. This flaw allows an attacker t...

RHSA-2023:0321: Red Hat Security Advisory: nodejs and nodejs-nodemon security, bug fix, and enhancement update

An update for nodejs and nodejs-nodemon is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-44906: minimist: prototype pollution * CVE-2022-3517: nodejs-minimatch: ReDoS via the braceExpand function * CVE-2022-35256: nodejs: HTTP Request Smuggling due to incorrect parsing of header fields * CVE-2022-43548: nodejs: DNS rebinding in inspect via invalid octal IP address

Red Hat Security Advisory 2023-0050-01

Red Hat Security Advisory 2023-0050-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include a denial of service vulnerability.

CVE-2022-4641: [SECURITY] Fix Temporary File Information Disclosure Vulnerability by JLLeitschuh · Pull Request #2 · tdunning/pig-vector

A vulnerability was found in pig-vector and classified as problematic. Affected by this issue is the function LogisticRegression of the file src/main/java/org/apache/mahout/pig/LogisticRegression.java. The manipulation leads to insecure temporary file. The attack needs to be approached locally. The name of the patch is 1e7bd9fab5401a2df18d2eabd802adcf0dcf1f15. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216500.

RHSA-2022:9073: Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update

An update for the nodejs:16 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-44531: nodejs: Improper handling of URI Subject Alternative Names * CVE-2021-44532: nodejs: Certificate Verification Bypass via String Injection * CVE-2021-44533: nodejs: Incorrect handling of certificate subject and issuer fields * CVE-2021-44906: minimist: prototype pollution * CVE-2022-3517: nodejs-minimatch: ReDoS via the braceExpand fu...

CVE-2022-21126: [SECURITY] Fix Temporary Directory Hijacking or Information Disclosure Vulnerability by JLLeitschuh · Pull Request #1617 · samtools/htsjdk

The package com.github.samtools:htsjdk before 3.0.1 are vulnerable to Creation of Temporary File in Directory with Insecure Permissions due to the createTempDir() function in util/IOUtil.java not checking for the existence of the temporary directory before attempting to create it.

Red Hat Security Advisory 2022-8652-01

Red Hat Security Advisory 2022-8652-01 - This release of Red Hat Fuse 7.11.1 serves as a replacement for Red Hat Fuse 7.11 and includes bug fixes and enhancements, which are documented in the Release Notes document linked in the References. Issues addressed include bypass, cross site scripting, denial of service, remote SQL injection, and traversal vulnerabilities.

RHSA-2022:8652: Red Hat Security Advisory: Red Hat Fuse 7.11.1 release and security update

A minor version update (from 7.11 to 7.11.1) is now available for Red Hat Fuse. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2019-8331: bootstrap: XSS in the tooltip or popover data-template attribute * CVE-2021-3717: wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users * CVE-2021-31684: json-smart: Denial of Service in...

Red Hat Security Advisory 2022-8524-01

Red Hat Security Advisory 2022-8524-01 - Red Hat Data Grid is an in-memory, distributed, NoSQL datastore solution. It increases application response times and allows for dramatically improving performance while providing availability, reliability, and elastic scale. Data Grid 8.4.0 replaces Data Grid 8.3.1 and includes bug fixes and enhancements. Find out more about Data Grid 8.4.0 in the Release Notes[3]. Issues addressed include cross site scripting and denial of service vulnerabilities.

RHSA-2022:8524: Red Hat Security Advisory: Red Hat Data Grid 8.4.0 security update

An update for Red Hat Data Grid 8 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-2022-23647: prismjs: improperly escaped output allows a XSS * CVE-2022-24823: netty: world readable temporary file containing sensitive data * CVE-2022-25857: snakeyaml: Denial of Service due to missing nested depth limitation for collections * CVE-2022-38749: snakeyaml: Uncaught exception...

CVE-2022-3952: [SECURITY] Fix Temporary Directory Hijacking or Information Disclosure Vulnerability by JLLeitschuh · Pull Request #580 · ManyDesigns/Portofino

A vulnerability has been found in ManyDesigns Portofino 5.3.2 and classified as problematic. Affected by this vulnerability is the function createTempDir of the file WarFileLauncher.java. The manipulation leads to creation of temporary file in directory with insecure permissions. Upgrading to version 5.3.3 is able to address this issue. The name of the patch is 94653cb357806c9cf24d8d294e6afea33f8f0775. It is recommended to upgrade the affected component. The identifier VDB-213457 was assigned to this vulnerability.

Red Hat Security Advisory 2022-7044-01

Red Hat Security Advisory 2022-7044-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include HTTP request smuggling and bypass vulnerabilities.

RHSA-2022:7044: Red Hat Security Advisory: rh-nodejs14-nodejs security update

An update for rh-nodejs14-nodejs is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-44531: nodejs: Improper handling of URI Subject Alternative Names * CVE-2021-44532: nodejs: Certificate Verification Bypass via String Injection * CVE-2021-44533: nodejs: Incorrect handling of certificate subject and issuer fields * CVE-2021-44906: minimist: prototype pollution * CVE-2022-21824: nodejs: Prototype pollution via console.table...

CVE-2022-21587: Oracle Critical Patch Update Advisory - October 2022

Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Red Hat Security Advisory 2022-6916-01

Red Hat Security Advisory 2022-6916-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.10.1 includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include a html injection vulnerability.

RHSA-2022:6916: Red Hat Security Advisory: Red Hat AMQ Broker 7.10.1 release and security update

Red Hat AMQ Broker 7.10.1 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3121: gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation * CVE-2022-24823: netty: world readable temporary file containing sensitive data * CVE-2022-33980: apache-commons-configuration: Apache Commons Configuration insecure interpolation defaults * CVE-2022-35278: activemq-artemis: AMQ Broker web console HTML Injection

Red Hat Security Advisory 2022-6835-01

Red Hat Security Advisory 2022-6835-01 - This release of Red Hat Integration - Service registry 2.3.0.GA serves as a replacement for 2.0.3.GA, and includes the below security fixes. Issues addressed include code execution, cross site scripting, denial of service, deserialization, and privilege escalation vulnerabilities.

Red Hat Security Advisory 2022-6819-01

Red Hat Security Advisory 2022-6819-01 - Red Hat AMQ Streams, based on the Apache Kafka project, offers a distributed backbone that allows microservices and other applications to share data with extremely high throughput and extremely low latency. This release of Red Hat AMQ Streams 2.2.0 serves as a replacement for Red Hat AMQ Streams 2.1.0, and includes security and bug fixes, and enhancements. Issues addressed include denial of service and deserialization vulnerabilities.

Red Hat Security Advisory 2022-6813-01

Red Hat Security Advisory 2022-6813-01 - Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services. This asynchronous security patch is an update to Red Hat Process Automation Manager 7. Issues addressed include XML injection, bypass, denial of service, and traversal vulnerabilities.

RHSA-2022:6819: Red Hat Security Advisory: Red Hat AMQ Streams 2.2.0 release and security update

Red Hat AMQ Streams 2.2.0 is now available from the Red Hat Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-24823: netty: world readable temporary file containing sensitive data * CVE-2022-25647: com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson * CVE-2022-34917: Kafka: Unauthenticated clients may cause OutOfMemoryError on b...

RHSA-2022:6813: Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.1 security update

An update is now available for Red Hat Process Automation Manager. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-7746: chart.js: prototype pollution * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2021-23436: immer: type confusion vulnerability can lead to a bypass of CVE-2020-28477 * CVE-2021-44906: minimist: prototype pollution * CVE-2022-0235: node-fetch: exposure of sensitive information to an unauthorized actor * CVE-202...

CVE-2022-29090: DSA-2022-134: Dell Wyse Management Suite Security Update for Multiple Vulnerabilities.

Dell Wyse Management Suite 3.6.1 and below contains a Sensitive Data Exposure vulnerability. A low privileged malicious user could potentially exploit this vulnerability in order to obtain credentials. The attacker may be able to use the exposed credentials to access the target device and perform unauthorized actions.

Red Hat Security Advisory 2022-5069-01

Red Hat Security Advisory 2022-5069-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.0. Issues addressed include code execution, cross site scripting, denial of service, information leakage, and traversal vulnerabilities.

RHSA-2022:5069: Red Hat Security Advisory: OpenShift Container Platform 4.11.0 bug fix and security update

Red Hat OpenShift Container Platform release 4.11.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-23566: nanoid: Information disclosure via valueOf() function * CVE-2021-23648: sanitize-url: XSS * CVE-2021-41190: opencontainers: OCI manifest and index parsing confusion * CVE-2021-44906:...

Red Hat Security Advisory 2022-5928-01

Red Hat Security Advisory 2022-5928-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.6 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.5, and includes bug fixes and enhancements. Issues addressed include a deserialization vulnerability.

RHSA-2022:5928: Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.6 Security update

A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-44906: minimist: prototype pollution * CVE-2022-24823: netty: world readable temporary file containing sensitive data * CVE-2022-25647: com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson

Red Hat Security Advisory 2022-5903-01

Red Hat Security Advisory 2022-5903-01 - Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services. This asynchronous security patch is an update to Red Hat Process Automation Manager 7. Issues addressed include HTTP request smuggling, denial of service, and deserialization vulnerabilities.

Red Hat Security Advisory 2022-5893-01

Red Hat Security Advisory 2022-5893-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.6 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.5, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.6 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include a deserialization vulnerability.

Red Hat Security Advisory 2022-5894-01

Red Hat Security Advisory 2022-5894-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.6 is a first release for Red Hat JBoss Enterprise Application Platform 7.4 on Red Hat Enterprise Linux 9, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.6 Release Notes for information about the most significant bug fixes and enhancements included in this release. Issues addressed include a deserialization vulnerability.

RHSA-2022:5903: Red Hat Security Advisory: Red Hat Process Automation Manager 7.13.0 security update

An update is now available for Red Hat Process Automation Manager. Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-2471: mysql-connector-java: unauthorized access to critical * CVE-2021-3642: wildfly-elytron: possible timing attack in ScramServer * CVE-2021-3644: wildfly-core: Invalid Sensitivity Classification of Vault Expression * CVE-2021-3717: wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users * CVE-2021-22569: protobu...

CVE-2022-21586: Oracle Critical Patch Update Advisory - July 2022

Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).

CVE-2022-21586: Oracle Critical Patch Update Advisory - July 2022

Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).

Solving the indirect vulnerability enigma - fixing indirect vulnerabilities without breaking your dependency tree

Fixing indirect vulnerabilities is one of those complex, tedious and, quite frankly, boring tasks that no one really wants to touch. No one except for Debricked, it seems. Sure, there are lots of ways to do it manually, but can it be done automatically with minimal risk of breaking changes? The Debricked team decided to find out.  A forest full of fragile trees So, where do you even start?

Red Hat Security Advisory 2022-5029-01

Red Hat Security Advisory 2022-5029-01 - This release of Red Hat build of Eclipse Vert.x 4.2.7 GA includes security updates. Issues addressed include denial of service and deserialization vulnerabilities.

RHSA-2022:5029: Red Hat Security Advisory: Red Hat build of Eclipse Vert.x 4.2.7 security update

An update is now available for Red Hat build of Eclipse Vert.x. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability. For more information, see the CVE pages listed in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36518: jackson-databind: denial of service via a large depth of nested objects * CVE-2022-25647: com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson

Red Hat Security Advisory 2022-4985-01

Red Hat Security Advisory 2022-4985-01 - New Cryostat 2.1.1 on RHEL 8 container images have been released, containing bug fixes and addressing security vulnerabilities. Issues addressed include a deserialization vulnerability.

RHSA-2022:4985: Red Hat Security Advisory: Cryostat 2.1.1: new Cryostat on RHEL 8 container images

New Cryostat 2.1.1 on RHEL 8 container images are now availableThis content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25647: com.google.code.gson-gson: Deserialization of Untrusted Data in com.google.code.gson-gson * CVE-2022-28948: golang-gopkg-yaml: crash when attempting to deserialize invalid input

Red Hat Security Advisory 2022-4914-01

Red Hat Security Advisory 2022-4914-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include HTTP request smuggling and bypass vulnerabilities.

RHSA-2022:4914: Red Hat Security Advisory: rh-nodejs12-nodejs security, bug fix, and enhancement update

An update for rh-nodejs12-nodejs is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3918: nodejs-json-schema: Prototype pollution vulnerability * CVE-2021-22959: llhttp: HTTP Request Smuggling due to spaces in headers * CVE-2021-22960: llhttp: HTTP Request Smuggling when parsing the body of chunked requests * CVE-2021-37701: nodejs-tar: Insufficient symlink protection due to directory cache poisoning using symbolic links a...

GHSA-269q-hmxg-m83q: Local Information Disclosure Vulnerability in io.netty:netty-codec-http

### Description ### [GHSA-5mcr-gq6c-3hq2](https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2) (CVE-2021-21290) contains an insufficient fix for the vulnerability identified. ### Impact ### When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. ### Vulnerability Details ### To fix the vulnerability the code was changed to the following: ```java @SuppressJava6Requirement(reason = "Guarded by version check") public static File createTempFile(String prefix, String suffix, File directory) throws IOException { if (javaVersion() >= 7) { if (directory == null) { ...

CVE-2022-24823: Merge pull request from GHSA-269q-hmxg-m83q · netty/netty@185f8b2

Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's own `java.io.tmpdir` when starting the JVM or use DefaultHttpDataFactory.setBaseDir(...) to set the directory to something that is only readable by the current user.

GHSA-4jrv-ppp4-jm57: Deserialization of Untrusted Data in Gson

The package `com.google.code.gson:gson` before 2.8.9 is vulnerable to Deserialization of Untrusted Data via the `writeReplace()` method in internal classes, which may lead to denial of service attacks.

CVE-2022-25647: Prevent Java deserialization of internal classes by Marcono1234 · Pull Request #1991 · google/gson

The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution