An EAP XP 2 security update to CVE fixes in the EAP 7.3.x base has been released.
RHSA-2021:3516-01: Important: EAP XP 2 security update to CVE fixes in the EAP 7.3.x base
=====================================================================
Red Hat Security Advisory
Synopsis: Important: EAP XP 2 security update to CVE fixes in the EAP 7.3.x base
Advisory ID: RHSA-2021:3516-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2021:3516
Issue date: 2021-09-13
CVE Names: CVE-2021-3597 CVE-2021-3644 CVE-2021-3690
CVE-2021-28170 CVE-2021-29425
=====================================================================
1. Summary:
This advisory resolves CVE issues filed against XP2 releases that have been
fixed in the underlying EAP 7.3.x base. There are no changes to the EAP XP2
code base.
NOTE: This advisory is informational only. There are no code changes
associated with it. No action is required.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Description:
These are CVE issues filed against XP2 releases that have been fixed in the
underlying EAP 7.3.x base, so no changes to the EAP XP2 code base.
Security Fix(es):
* undertow: buffer leak on incoming websocket PONG message may lead to DoS
(CVE-2021-3690)
* undertow: HTTP2SourceChannel fails to write final frame under some
circumstances may lead to DoS (CVE-2021-3597)
* jakarta-el: ELParserTokenManager enables invalid EL expressions to be
evaluate (CVE-2021-28170)
* apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
(CVE-2021-29425)
* wildfly-core: Invalid Sensitivity Classification of Vault Expression
(CVE-2021-3644)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
3. Solution:
This advisory is informational only. There are no code changes associated
with it. No action is required.
4. Bugs fixed ( https://bugzilla.redhat.com/):
1948752 - CVE-2021-29425 apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
1965497 - CVE-2021-28170 jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate
1970930 - CVE-2021-3597 undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS
1976052 - CVE-2021-3644 wildfly-core: Invalid Sensitivity Classification of Vault Expression
1991299 - CVE-2021-3690 undertow: buffer leak on incoming websocket PONG message may lead to DoS
5. JIRA issues fixed ( https://issues.jboss.org/):
JBEAP-22409 - XP 2.0.0 respin (2.0.0-7.3.9.GA)
6. References:
https://access.redhat.com/security/cve/CVE-2021-3597
https://access.redhat.com/security/cve/CVE-2021-3644
https://access.redhat.com/security/cve/CVE-2021-3690
https://access.redhat.com/security/cve/CVE-2021-28170
https://access.redhat.com/security/cve/CVE-2021-29425
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/
https://access.redhat.com/articles/6179301
7. Contact:
The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc.