VAR-202110-1706

Vulnerability from variot - Updated: 2026-04-10 22:16

The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack. Netty Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 7.4.5 security update on RHEL 8 Advisory ID: RHSA-2022:4919-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2022:4919 Issue date: 2022-06-06 CVE Names: CVE-2020-36518 CVE-2021-37136 CVE-2021-37137 CVE-2021-42392 CVE-2021-43797 CVE-2022-0084 CVE-2022-0853 CVE-2022-0866 CVE-2022-1319 CVE-2022-21299 CVE-2022-21363 CVE-2022-23221 CVE-2022-23437 CVE-2022-23913 CVE-2022-24785 ==================================================================== 1. Summary:

A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat JBoss EAP 7.4 for RHEL 8 - noarch, x86_64

  1. Description:

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.

This release of Red Hat JBoss Enterprise Application Platform 7.4.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.4 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.

Security Fix(es):

  • h2: Loading of custom classes from remote servers through JNDI (CVE-2022-23221)

  • jackson-databind: denial of service via a large depth of nested objects (CVE-2020-36518)

  • netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data (CVE-2021-37136)

  • netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way (CVE-2021-37137)

  • h2: Remote Code Execution in Console (CVE-2021-42392)

  • netty: control chars in header names may lead to HTTP request smuggling (CVE-2021-43797)

  • xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr (CVE-2022-0084)

  • wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled (CVE-2022-0866)

  • undertow: Double AJP response for 400 from EAP 7 results in CPING failures (CVE-2022-1319)

  • OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) (CVE-2022-21299)

  • mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors (CVE-2022-21363)

  • xerces-j2: infinite loop when handling specially crafted XML document payloads (CVE-2022-23437)

  • artemis-commons: Apache ActiveMQ Artemis DoS (CVE-2022-23913)

  • Moment.js: Path traversal in moment.locale (CVE-2022-24785)

  • jboss-client: memory leakage in remote client transaction (CVE-2022-0853)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

  1. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

2004133 - CVE-2021-37136 netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data 2004135 - CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way 2031958 - CVE-2021-43797 netty: control chars in header names may lead to HTTP request smuggling 2039403 - CVE-2021-42392 h2: Remote Code Execution in Console 2041472 - CVE-2022-21299 OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) 2044596 - CVE-2022-23221 h2: Loading of custom classes from remote servers through JNDI 2047200 - CVE-2022-23437 xerces-j2: infinite loop when handling specially crafted XML document payloads 2047343 - CVE-2022-21363 mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors 2060725 - CVE-2022-0853 jboss-client: memory leakage in remote client transaction 2060929 - CVE-2022-0866 wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled 2063601 - CVE-2022-23913 artemis-commons: Apache ActiveMQ Artemis DoS 2064226 - CVE-2022-0084 xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr 2064698 - CVE-2020-36518 jackson-databind: denial of service via a large depth of nested objects 2072009 - CVE-2022-24785 Moment.js: Path traversal in moment.locale 2073890 - CVE-2022-1319 undertow: Double AJP response for 400 from EAP 7 results in CPING failures

  1. JIRA issues fixed (https://issues.jboss.org/):

JBEAP-23121 - Tracker bug for the EAP 7.4.5 release for RHEL-8 JBEAP-23171 - (7.4.z) Upgrade HAL from 3.3.9.Final-redhat-00001 to 3.3.12.Final-redhat-00001 JBEAP-23194 - Upgrade hibernate-validator from 6.0.22.Final-redhat-00002 to 6.0.23-redhat-00001 JBEAP-23241 - GSS Upgrade jberet from 1.3.9 to 1.3.9.SP1 JBEAP-23299 - (7.4.z) Upgrade Artemis from 2.16.0.redhat-00034 to 2.16.0.redhat-00042 JBEAP-23300 - GSS Upgrade JBoss Remoting from 5.0.23.SP1 to 5.0.24.SP1 JBEAP-23312 - (7.4.z) Upgrade WildFly Core from 15.0.8.Final-redhat-00001 to 15.0.12.Final-redhat-00001 JBEAP-23313 - (7.4.z) Upgrade Elytron from 1.15.11.Final-redhat-00002 to 1.15.12.Final-redhat-00001 JBEAP-23336 - (7.4.z) Upgrade Hibernate ORM from 5.3.25.Final-redhat-00002 to 5.3.26.Final-redhat-00002 JBEAP-23338 - GSS Upgrade Undertow from 2.2.16 to 2.2.17.SP3 JBEAP-23339 - GSS Upgrade wildfly-http-ejb-client from 1.1.10 to 1.1.11.SP1 JBEAP-23351 - (7.4.z) Upgrade org.apache.logging.log4j from 2.17.1.redhat-00001 to 2.17.1.redhat-00002 JBEAP-23353 - (7.4.z) Upgrade wildfly-transaction-client from 1.1.14.Final-redhat-00001 to 1.1.15.Final-redhat-x JBEAP-23429 - PM JDK17 Update Tested Configurations page and make note in Update release notes JBEAP-23432 - GSS Upgrade JSF API from 3.0.0.SP04 to 3.0.0.SP05 JBEAP-23451 - [PST] (7.4.z) Upgrade to FasterXML Jackson to 2.12.6.redhat-00001 and Jackson Databind to 2.12.6.1.redhat-00003 JBEAP-23531 - GSS Upgrade Undertow from 2.2.17.SP3 to 2.2.17.SP4 JBEAP-23532 - (7.4.z) Upgrade WildFly Core from 15.0.12.Final-redhat-00001 to 15.0.13.Final-redhat-00001

  1. Package List:

Red Hat JBoss EAP 7.4 for RHEL 8:

Source: eap7-activemq-artemis-2.16.0-9.redhat_00042.1.el8eap.src.rpm eap7-h2database-1.4.197-2.redhat_00004.1.el8eap.src.rpm eap7-hal-console-3.3.12-1.Final_redhat_00001.1.el8eap.src.rpm eap7-hibernate-5.3.26-1.Final_redhat_00002.2.el8eap.src.rpm eap7-hibernate-validator-6.0.23-1.Final_redhat_00001.1.el8eap.src.rpm eap7-jackson-annotations-2.12.6-1.redhat_00001.1.el8eap.src.rpm eap7-jackson-core-2.12.6-1.redhat_00001.1.el8eap.src.rpm eap7-jackson-databind-2.12.6.1-1.redhat_00003.1.el8eap.src.rpm eap7-jackson-jaxrs-providers-2.12.6-1.redhat_00001.1.el8eap.src.rpm eap7-jackson-modules-base-2.12.6-1.redhat_00001.1.el8eap.src.rpm eap7-jackson-modules-java8-2.12.6-1.redhat_00001.1.el8eap.src.rpm eap7-jberet-1.3.9-1.SP1_redhat_00001.1.el8eap.src.rpm eap7-jboss-jsf-api_2.3_spec-3.0.0-4.SP05_redhat_00002.1.el8eap.src.rpm eap7-jboss-remoting-5.0.24-1.SP1_redhat_00001.1.el8eap.src.rpm eap7-jboss-server-migration-1.10.0-16.Final_redhat_00015.1.el8eap.src.rpm eap7-jboss-xnio-base-3.8.7-1.SP1_redhat_00001.1.el8eap.src.rpm eap7-log4j-2.17.1-2.redhat_00002.1.el8eap.src.rpm eap7-netty-4.1.72-4.Final_redhat_00001.1.el8eap.src.rpm eap7-netty-tcnative-2.0.48-1.Final_redhat_00001.1.el8eap.src.rpm eap7-netty-transport-native-epoll-4.1.72-1.Final_redhat_00001.1.el8eap.src.rpm eap7-snakeyaml-1.29.0-1.redhat_00001.2.el8eap.src.rpm eap7-undertow-2.2.17-2.SP4_redhat_00001.1.el8eap.src.rpm eap7-wildfly-7.4.5-3.GA_redhat_00001.1.el8eap.src.rpm eap7-wildfly-elytron-1.15.12-1.Final_redhat_00001.1.el8eap.src.rpm eap7-wildfly-http-client-1.1.11-1.SP1_redhat_00001.1.el8eap.src.rpm eap7-wildfly-transaction-client-1.1.15-1.Final_redhat_00001.1.el8eap.src.rpm eap7-xerces-j2-2.12.0-3.SP04_redhat_00001.1.el8eap.src.rpm

noarch: eap7-activemq-artemis-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm eap7-activemq-artemis-cli-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm eap7-activemq-artemis-commons-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm eap7-activemq-artemis-core-client-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm eap7-activemq-artemis-dto-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm eap7-activemq-artemis-hornetq-protocol-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm eap7-activemq-artemis-hqclient-protocol-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm eap7-activemq-artemis-jdbc-store-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm eap7-activemq-artemis-jms-client-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm eap7-activemq-artemis-jms-server-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm eap7-activemq-artemis-journal-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm eap7-activemq-artemis-ra-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm eap7-activemq-artemis-selector-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm eap7-activemq-artemis-server-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm eap7-activemq-artemis-service-extensions-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm eap7-activemq-artemis-tools-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm eap7-h2database-1.4.197-2.redhat_00004.1.el8eap.noarch.rpm eap7-hal-console-3.3.12-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-hibernate-5.3.26-1.Final_redhat_00002.2.el8eap.noarch.rpm eap7-hibernate-core-5.3.26-1.Final_redhat_00002.2.el8eap.noarch.rpm eap7-hibernate-entitymanager-5.3.26-1.Final_redhat_00002.2.el8eap.noarch.rpm eap7-hibernate-envers-5.3.26-1.Final_redhat_00002.2.el8eap.noarch.rpm eap7-hibernate-java8-5.3.26-1.Final_redhat_00002.2.el8eap.noarch.rpm eap7-hibernate-validator-6.0.23-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-hibernate-validator-cdi-6.0.23-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-jackson-annotations-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm eap7-jackson-core-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm eap7-jackson-databind-2.12.6.1-1.redhat_00003.1.el8eap.noarch.rpm eap7-jackson-datatype-jdk8-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm eap7-jackson-datatype-jsr310-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm eap7-jackson-jaxrs-base-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm eap7-jackson-jaxrs-json-provider-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm eap7-jackson-module-jaxb-annotations-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm eap7-jackson-modules-base-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm eap7-jackson-modules-java8-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm eap7-jberet-1.3.9-1.SP1_redhat_00001.1.el8eap.noarch.rpm eap7-jberet-core-1.3.9-1.SP1_redhat_00001.1.el8eap.noarch.rpm eap7-jboss-jsf-api_2.3_spec-3.0.0-4.SP05_redhat_00002.1.el8eap.noarch.rpm eap7-jboss-remoting-5.0.24-1.SP1_redhat_00001.1.el8eap.noarch.rpm eap7-jboss-server-migration-1.10.0-16.Final_redhat_00015.1.el8eap.noarch.rpm eap7-jboss-server-migration-cli-1.10.0-16.Final_redhat_00015.1.el8eap.noarch.rpm eap7-jboss-server-migration-core-1.10.0-16.Final_redhat_00015.1.el8eap.noarch.rpm eap7-jboss-xnio-base-3.8.7-1.SP1_redhat_00001.1.el8eap.noarch.rpm eap7-log4j-2.17.1-2.redhat_00002.1.el8eap.noarch.rpm eap7-netty-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-all-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-buffer-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-codec-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-codec-dns-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-codec-haproxy-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-codec-http-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-codec-http2-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-codec-memcache-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-codec-mqtt-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-codec-redis-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-codec-smtp-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-codec-socks-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-codec-stomp-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-codec-xml-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-common-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-handler-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-handler-proxy-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-resolver-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-resolver-dns-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-resolver-dns-classes-macos-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-tcnative-2.0.48-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-transport-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-transport-classes-epoll-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-transport-classes-kqueue-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-transport-native-unix-common-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-transport-rxtx-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-transport-sctp-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-netty-transport-udt-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm eap7-snakeyaml-1.29.0-1.redhat_00001.2.el8eap.noarch.rpm eap7-undertow-2.2.17-2.SP4_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-7.4.5-3.GA_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-elytron-1.15.12-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-elytron-tool-1.15.12-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-http-client-common-1.1.11-1.SP1_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-http-ejb-client-1.1.11-1.SP1_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-http-naming-client-1.1.11-1.SP1_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-http-transaction-client-1.1.11-1.SP1_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-javadocs-7.4.5-3.GA_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-modules-7.4.5-3.GA_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-transaction-client-1.1.15-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-xerces-j2-2.12.0-3.SP04_redhat_00001.1.el8eap.noarch.rpm

x86_64: eap7-netty-transport-native-epoll-4.1.72-1.Final_redhat_00001.1.el8eap.x86_64.rpm eap7-netty-transport-native-epoll-debuginfo-4.1.72-1.Final_redhat_00001.1.el8eap.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2020-36518 https://access.redhat.com/security/cve/CVE-2021-37136 https://access.redhat.com/security/cve/CVE-2021-37137 https://access.redhat.com/security/cve/CVE-2021-42392 https://access.redhat.com/security/cve/CVE-2021-43797 https://access.redhat.com/security/cve/CVE-2022-0084 https://access.redhat.com/security/cve/CVE-2022-0853 https://access.redhat.com/security/cve/CVE-2022-0866 https://access.redhat.com/security/cve/CVE-2022-1319 https://access.redhat.com/security/cve/CVE-2022-21299 https://access.redhat.com/security/cve/CVE-2022-21363 https://access.redhat.com/security/cve/CVE-2022-23221 https://access.redhat.com/security/cve/CVE-2022-23437 https://access.redhat.com/security/cve/CVE-2022-23913 https://access.redhat.com/security/cve/CVE-2022-24785 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/ https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBYp5p/9zjgjWX9erEAQhL+g/+JKQHaiLkO+ltEKRh+4gMrTSp6RHQ7abn 2sNL4RWYPNRMVkzxxssvhNORYq9zEpwygmoNbsWDgPAJfoHR4QJingjL2fTn8Q7+ T3Iw/kw3OH9wAnWhBl1uppLzYbLqppjC6Z3/BdU6uqMjly+wQyoIgEm2eHMgAMnQ SteQlaYDrVuu9+8b57EcKVGVyg6x7W/DDX0hWCxNh7zFx8kX+kOdM4JBARMVTz8c JfXxaNbP5cr2pWxXyCOSPgLku9P7wV5zZ1Mi2bS9m+wWndhlmnGDRE7EBJZltKz4 NudGSOpabgN7g0WMLZLRQg6ioCsaawucV7UZqk6Sxf0ur7WCif8z2Y5NR8gD+usI ed5HVhMjF8Uj1+hzvJttTeoRZ9sVigQ3SeOxnQhK3G+n/d5jk7TCe8EdlW/MHq/G EDud/taB/GO7imnhdHLEyA+P4BVhqpbw47AvyQq0cRgYfDGwK09Z7HkxzWxz7zbk vP1eKJ6Wc8B94WBMIB50eObTVoT98VBzQ5gUTrfcwIjTDCWMqkT6HyOWfQGCPF/j 4TWRrA3/n4ZkVrk/K5N1BLT07XuCV+dF/JfjHzG7piA0fU5gyOyn3GlU3cKHPBT7 1OALl1P0Bs1lFIaVxyxWyU0IcLTD0ndvoed5N+j5wrMgn8QaIpFk9ByfJrw8KIJX TdWh+RTMxwU=Q04c -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Description:

Red Hat Process Automation Manager is an open source business process management suite that combines process management and decision service management and enables business and IT users to create, manage, validate, and deploy process applications and decision services.

It is recommended to halt the server by stopping the JBoss Application Server process before installing this update; after installing the update, restart the server by starting the JBoss Application Server process. The purpose of this text-only errata is to inform you about the security issues fixed. Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512


Debian Security Advisory DSA-5316-1 security@debian.org https://www.debian.org/security/ Markus Koschany January 11, 2023 https://www.debian.org/security/faq


Package : netty CVE ID : CVE-2021-37136 CVE-2021-37137 CVE-2021-43797 CVE-2022-41881 CVE-2022-41915 Debian Bug : 1027180 1014769 1001437

Several out-of-memory, stack overflow or HTTP request smuggling vulnerabilities have been discovered in Netty, a Java NIO client/server socket framework, which may allow attackers to cause a denial of service or bypass restrictions when used as a proxy.

For the stable distribution (bullseye), these problems have been fixed in version 1:4.1.48-4+deb11u1.

We recommend that you upgrade your netty packages.

For the detailed security status of netty please refer to its security tracker page at: https://security-tracker.debian.org/tracker/netty

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmO/OTVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD RjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7 UeREBA//QmQrVlx87/n7z5FISY20tNkSxAI3/Xqx9IB/ldRLUw8xcttHoDV13H4K JFKuEP6bdZzdzxXCcYGqNlXPjMJqbH6KIEmjIbCthsnbQfNzSXm86eqeZWl33kEG QA1buF47PeyRzuW93JmS+XpjjOWaXA4/MmP14wOqHyu/sorRc4aN5R0/ea+cUSW4 a7Zvb/m/gM5dLm1m88do5oBgJsynZM0fCfLi/Lz2vvSKKap/DJaCcK9sjvyzCRlb 8OqtE+B5eejUIGcBF2TD5BZiZLY5ZIqPBEUZO5g+WMnPRWNUaU/lYqKuTPPlU72A ZUeysGlAyhbPueEd5cIXG7jYUt07VRUFixinXHukhErzWtQU28mY7mA50If+wabO 9Pj/6/76St0XFWWxRNPYFCXeM7oSNdvC8DA7oNahpBMDSP/bJSc+sDdwjp41PjKj zKKHraQMtOCDOWmqeWJUfUdqVa2ptSjUZ/oGBsW4CUkesoS03YAAtGasxlpfhR2o 43V0e7/9YmiBI1ZkpqIZ4vU7siqE6NzCMmvdtYaTQD66P0CJ3FCC/OdSdKSRp0HN Z45D6hUUZdJLJrO8gGfLfZo9aABTlOSuRUcdHLBqOVUUjz7wqlQHH2d63ytf9X93 ATsBST3G5fY5ssKcyxHFtDAsqgbokkCLJ0D7TFM4cY+E7ywpq+I= =jx2O -----END PGP SIGNATURE----- . Description:

AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms.

Security Fix(es):

  • netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data (CVE-2021-37136)
  • netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way (CVE-2021-37137)

For more details about the security issues and their impact, the CVSS score, acknowledgements, and other related information, see the CVE pages listed in the References section.

The References section of this erratum contains a download link for the update. You must be logged in to download the update

Show details on source website

{
  "affected_products": {
    "_id": null,
    "data": [
      {
        "_id": null,
        "model": "banking digital experience",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "18.2"
      },
      {
        "_id": null,
        "model": "peoplesoft enterprise peopletools",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "8.48"
      },
      {
        "_id": null,
        "model": "communications brm - elastic charging engine",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "12.0.0.4.6"
      },
      {
        "_id": null,
        "model": "helidon",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "2.4.0"
      },
      {
        "_id": null,
        "model": "coherence",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "14.1.1.0.0"
      },
      {
        "_id": null,
        "model": "communications cloud native core binding support function",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "1.10.0"
      },
      {
        "_id": null,
        "model": "banking digital experience",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "18.3"
      },
      {
        "_id": null,
        "model": "quarkus",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "quarkus",
        "version": "2.2.4"
      },
      {
        "_id": null,
        "model": "communications cloud native core network slice selection function",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "1.8.0"
      },
      {
        "_id": null,
        "model": "communications cloud native core binding support function",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "1.11.0"
      },
      {
        "_id": null,
        "model": "helidon",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "1.4.10"
      },
      {
        "_id": null,
        "model": "oncommand insight",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "netapp",
        "version": null
      },
      {
        "_id": null,
        "model": "communications cloud native core security edge protection proxy",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "1.7.0"
      },
      {
        "_id": null,
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "10.0"
      },
      {
        "_id": null,
        "model": "banking digital experience",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "19.2"
      },
      {
        "_id": null,
        "model": "banking apis",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "19.2"
      },
      {
        "_id": null,
        "model": "banking apis",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "21.1"
      },
      {
        "_id": null,
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "11.0"
      },
      {
        "_id": null,
        "model": "webcenter portal",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "12.2.1.4.0"
      },
      {
        "_id": null,
        "model": "banking digital experience",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "21.1"
      },
      {
        "_id": null,
        "model": "communications instant messaging server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "8.1"
      },
      {
        "_id": null,
        "model": "banking digital experience",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "20.1"
      },
      {
        "_id": null,
        "model": "banking apis",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "20.1"
      },
      {
        "_id": null,
        "model": "communications diameter signaling router",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "8.5.0.2"
      },
      {
        "_id": null,
        "model": "netty",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "netty",
        "version": "4.1.68"
      },
      {
        "_id": null,
        "model": "coherence",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "12.2.1.4.0"
      },
      {
        "_id": null,
        "model": "communications cloud native core unified data repository",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "1.15.0"
      },
      {
        "_id": null,
        "model": "communications diameter signaling router",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "8.0.0.0"
      },
      {
        "_id": null,
        "model": "peoplesoft enterprise peopletools",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "8.57"
      },
      {
        "_id": null,
        "model": "commerce guided search",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "11.3.2"
      },
      {
        "_id": null,
        "model": "banking apis",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "18.3"
      },
      {
        "_id": null,
        "model": "peoplesoft enterprise peopletools",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "8.58"
      },
      {
        "_id": null,
        "model": "peoplesoft enterprise peopletools",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "8.59"
      },
      {
        "_id": null,
        "model": "banking apis",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "19.1"
      },
      {
        "_id": null,
        "model": "communications brm - elastic charging engine",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "12"
      },
      {
        "_id": null,
        "model": "banking apis",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "18.1"
      },
      {
        "_id": null,
        "model": "banking digital experience",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "19.1"
      },
      {
        "_id": null,
        "model": "webcenter portal",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "12.2.1.3.0"
      },
      {
        "_id": null,
        "model": "banking digital experience",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "18.1"
      },
      {
        "_id": null,
        "model": "communications cloud native core policy",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "1.15.0"
      },
      {
        "_id": null,
        "model": "oracle communications cloud native core binding support function",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30aa\u30e9\u30af\u30eb",
        "version": null
      },
      {
        "_id": null,
        "model": "oncommand insight",
        "scope": null,
        "trust": 0.8,
        "vendor": "netapp",
        "version": null
      },
      {
        "_id": null,
        "model": "oracle banking apis",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30aa\u30e9\u30af\u30eb",
        "version": null
      },
      {
        "_id": null,
        "model": "oracle commerce guided search",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30aa\u30e9\u30af\u30eb",
        "version": null
      },
      {
        "_id": null,
        "model": "oracle banking digital experience",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30aa\u30e9\u30af\u30eb",
        "version": null
      },
      {
        "_id": null,
        "model": "netty",
        "scope": null,
        "trust": 0.8,
        "vendor": "the netty",
        "version": null
      },
      {
        "_id": null,
        "model": "peoplesoft enterprise peopletools",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30aa\u30e9\u30af\u30eb",
        "version": null
      },
      {
        "_id": null,
        "model": "oracle communications diameter signaling router",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30aa\u30e9\u30af\u30eb",
        "version": null
      },
      {
        "_id": null,
        "model": "quarkus",
        "scope": null,
        "trust": 0.8,
        "vendor": "quarkus",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-013843"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-37136"
      }
    ]
  },
  "credits": {
    "_id": null,
    "data": "Red Hat",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "167424"
      },
      {
        "db": "PACKETSTORM",
        "id": "167964"
      },
      {
        "db": "PACKETSTORM",
        "id": "166408"
      },
      {
        "db": "PACKETSTORM",
        "id": "167422"
      },
      {
        "db": "PACKETSTORM",
        "id": "165105"
      },
      {
        "db": "PACKETSTORM",
        "id": "164936"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2021-37136",
  "cvss": {
    "_id": null,
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2021-37136",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-398972",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2021-37136",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2021-37136",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-37136",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-37136",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202110-1442",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-398972",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-398972"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202110-1442"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-013843"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-37136"
      }
    ]
  },
  "description": {
    "_id": null,
    "data": "The Bzip2 decompression decoder function doesn\u0027t allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack. Netty Exists in a resource exhaustion vulnerability.Service operation interruption (DoS) It may be in a state. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Moderate: Red Hat JBoss Enterprise Application Platform 7.4.5 security update on RHEL 8\nAdvisory ID:       RHSA-2022:4919-01\nProduct:           Red Hat JBoss Enterprise Application Platform\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2022:4919\nIssue date:        2022-06-06\nCVE Names:         CVE-2020-36518 CVE-2021-37136 CVE-2021-37137\n                   CVE-2021-42392 CVE-2021-43797 CVE-2022-0084\n                   CVE-2022-0853 CVE-2022-0866 CVE-2022-1319\n                   CVE-2022-21299 CVE-2022-21363 CVE-2022-23221\n                   CVE-2022-23437 CVE-2022-23913 CVE-2022-24785\n====================================================================\n1. Summary:\n\nA security update is now available for Red Hat JBoss Enterprise Application\nPlatform 7.4 for Red Hat Enterprise Linux 8. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat JBoss EAP 7.4 for RHEL 8 - noarch, x86_64\n\n3. Description:\n\nRed Hat JBoss Enterprise Application Platform 7 is a platform for Java\napplications based on the WildFly application runtime. \n\nThis release of Red Hat JBoss Enterprise Application Platform 7.4.5 serves\nas a replacement for Red Hat JBoss Enterprise Application Platform 7.4.4\nand includes bug fixes and enhancements. See the Red Hat JBoss Enterprise\nApplication Platform 7.4.5 Release Notes for information about the most\nsignificant bug fixes and enhancements included in this release. \n\nSecurity Fix(es):\n\n* h2: Loading of custom classes from remote servers through JNDI\n(CVE-2022-23221)\n\n* jackson-databind: denial of service via a large depth of nested objects\n(CVE-2020-36518)\n\n* netty-codec: Bzip2Decoder doesn\u0027t allow setting size restrictions for\ndecompressed data (CVE-2021-37136)\n\n* netty-codec: SnappyFrameDecoder doesn\u0027t restrict chunk length and may\nbuffer skippable chunks in an unnecessary way (CVE-2021-37137)\n\n* h2: Remote Code Execution in Console (CVE-2021-42392)\n\n* netty: control chars in header names may lead to HTTP request smuggling\n(CVE-2021-43797)\n\n* xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of\nstderr (CVE-2022-0084)\n\n* wildfly: Wildfly management of EJB Session context returns wrong caller\nprincipal with Elytron Security enabled (CVE-2022-0866)\n\n* undertow: Double AJP response for 400 from EAP 7 results in CPING\nfailures (CVE-2022-1319)\n\n* OpenJDK: Infinite loop related to incorrect handling of newlines in\nXMLEntityScanner (JAXP, 8270646) (CVE-2022-21299)\n\n* mysql-connector-java: Difficult to exploit vulnerability allows high\nprivileged attacker with network access via multiple protocols to\ncompromise MySQL Connectors (CVE-2022-21363)\n\n* xerces-j2: infinite loop when handling specially crafted XML document\npayloads (CVE-2022-23437)\n\n* artemis-commons: Apache ActiveMQ Artemis DoS (CVE-2022-23913)\n\n* Moment.js: Path traversal in moment.locale (CVE-2022-24785)\n\n* jboss-client: memory leakage in remote client transaction (CVE-2022-0853)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n4. Solution:\n\nBefore applying this update, back up your existing Red Hat JBoss Enterprise\nApplication Platform installation and deployed applications. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n2004133 - CVE-2021-37136 netty-codec: Bzip2Decoder doesn\u0027t allow setting size restrictions for decompressed data\n2004135 - CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn\u0027t restrict chunk length and may buffer skippable chunks in an unnecessary way\n2031958 - CVE-2021-43797 netty: control chars in header names may lead to HTTP request smuggling\n2039403 - CVE-2021-42392 h2: Remote Code Execution in Console\n2041472 - CVE-2022-21299 OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646)\n2044596 - CVE-2022-23221 h2: Loading of custom classes from remote servers through JNDI\n2047200 - CVE-2022-23437 xerces-j2: infinite loop when handling specially crafted XML document payloads\n2047343 - CVE-2022-21363 mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors\n2060725 - CVE-2022-0853 jboss-client: memory leakage in remote client transaction\n2060929 - CVE-2022-0866 wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled\n2063601 - CVE-2022-23913 artemis-commons: Apache ActiveMQ Artemis DoS\n2064226 - CVE-2022-0084 xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr\n2064698 - CVE-2020-36518 jackson-databind: denial of service via a large depth of nested objects\n2072009 - CVE-2022-24785 Moment.js: Path traversal  in moment.locale\n2073890 - CVE-2022-1319 undertow: Double AJP response for 400 from EAP 7 results in CPING failures\n\n6. JIRA issues fixed (https://issues.jboss.org/):\n\nJBEAP-23121 - Tracker bug for the EAP 7.4.5 release for RHEL-8\nJBEAP-23171 - (7.4.z) Upgrade HAL from 3.3.9.Final-redhat-00001 to 3.3.12.Final-redhat-00001\nJBEAP-23194 - Upgrade hibernate-validator from 6.0.22.Final-redhat-00002 to 6.0.23-redhat-00001\nJBEAP-23241 - [GSS](7.4.z) Upgrade jberet from 1.3.9 to 1.3.9.SP1\nJBEAP-23299 - (7.4.z) Upgrade Artemis from 2.16.0.redhat-00034 to 2.16.0.redhat-00042\nJBEAP-23300 - [GSS](7.4.z) Upgrade JBoss Remoting from 5.0.23.SP1 to 5.0.24.SP1\nJBEAP-23312 - (7.4.z) Upgrade WildFly Core from 15.0.8.Final-redhat-00001 to 15.0.12.Final-redhat-00001\nJBEAP-23313 - (7.4.z) Upgrade Elytron from 1.15.11.Final-redhat-00002 to 1.15.12.Final-redhat-00001\nJBEAP-23336 - (7.4.z) Upgrade Hibernate ORM from 5.3.25.Final-redhat-00002 to 5.3.26.Final-redhat-00002\nJBEAP-23338 - [GSS](7.4.z) Upgrade Undertow from 2.2.16 to 2.2.17.SP3\nJBEAP-23339 - [GSS](7.4.z) Upgrade wildfly-http-ejb-client from 1.1.10 to 1.1.11.SP1\nJBEAP-23351 - (7.4.z) Upgrade org.apache.logging.log4j from 2.17.1.redhat-00001 to 2.17.1.redhat-00002\nJBEAP-23353 - (7.4.z) Upgrade wildfly-transaction-client from 1.1.14.Final-redhat-00001 to 1.1.15.Final-redhat-x\nJBEAP-23429 - [PM](7.4.z) JDK17 Update Tested Configurations page and make note in Update release notes\nJBEAP-23432 - [GSS](7.4.z) Upgrade JSF API from 3.0.0.SP04 to 3.0.0.SP05\nJBEAP-23451 - [PST] (7.4.z) Upgrade to FasterXML Jackson to  2.12.6.redhat-00001 and Jackson Databind to 2.12.6.1.redhat-00003\nJBEAP-23531 - [GSS](7.4.z) Upgrade Undertow from 2.2.17.SP3 to 2.2.17.SP4\nJBEAP-23532 - (7.4.z) Upgrade WildFly Core from 15.0.12.Final-redhat-00001 to 15.0.13.Final-redhat-00001\n\n7. Package List:\n\nRed Hat JBoss EAP 7.4 for RHEL 8:\n\nSource:\neap7-activemq-artemis-2.16.0-9.redhat_00042.1.el8eap.src.rpm\neap7-h2database-1.4.197-2.redhat_00004.1.el8eap.src.rpm\neap7-hal-console-3.3.12-1.Final_redhat_00001.1.el8eap.src.rpm\neap7-hibernate-5.3.26-1.Final_redhat_00002.2.el8eap.src.rpm\neap7-hibernate-validator-6.0.23-1.Final_redhat_00001.1.el8eap.src.rpm\neap7-jackson-annotations-2.12.6-1.redhat_00001.1.el8eap.src.rpm\neap7-jackson-core-2.12.6-1.redhat_00001.1.el8eap.src.rpm\neap7-jackson-databind-2.12.6.1-1.redhat_00003.1.el8eap.src.rpm\neap7-jackson-jaxrs-providers-2.12.6-1.redhat_00001.1.el8eap.src.rpm\neap7-jackson-modules-base-2.12.6-1.redhat_00001.1.el8eap.src.rpm\neap7-jackson-modules-java8-2.12.6-1.redhat_00001.1.el8eap.src.rpm\neap7-jberet-1.3.9-1.SP1_redhat_00001.1.el8eap.src.rpm\neap7-jboss-jsf-api_2.3_spec-3.0.0-4.SP05_redhat_00002.1.el8eap.src.rpm\neap7-jboss-remoting-5.0.24-1.SP1_redhat_00001.1.el8eap.src.rpm\neap7-jboss-server-migration-1.10.0-16.Final_redhat_00015.1.el8eap.src.rpm\neap7-jboss-xnio-base-3.8.7-1.SP1_redhat_00001.1.el8eap.src.rpm\neap7-log4j-2.17.1-2.redhat_00002.1.el8eap.src.rpm\neap7-netty-4.1.72-4.Final_redhat_00001.1.el8eap.src.rpm\neap7-netty-tcnative-2.0.48-1.Final_redhat_00001.1.el8eap.src.rpm\neap7-netty-transport-native-epoll-4.1.72-1.Final_redhat_00001.1.el8eap.src.rpm\neap7-snakeyaml-1.29.0-1.redhat_00001.2.el8eap.src.rpm\neap7-undertow-2.2.17-2.SP4_redhat_00001.1.el8eap.src.rpm\neap7-wildfly-7.4.5-3.GA_redhat_00001.1.el8eap.src.rpm\neap7-wildfly-elytron-1.15.12-1.Final_redhat_00001.1.el8eap.src.rpm\neap7-wildfly-http-client-1.1.11-1.SP1_redhat_00001.1.el8eap.src.rpm\neap7-wildfly-transaction-client-1.1.15-1.Final_redhat_00001.1.el8eap.src.rpm\neap7-xerces-j2-2.12.0-3.SP04_redhat_00001.1.el8eap.src.rpm\n\nnoarch:\neap7-activemq-artemis-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm\neap7-activemq-artemis-cli-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm\neap7-activemq-artemis-commons-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm\neap7-activemq-artemis-core-client-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm\neap7-activemq-artemis-dto-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm\neap7-activemq-artemis-hornetq-protocol-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm\neap7-activemq-artemis-hqclient-protocol-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm\neap7-activemq-artemis-jdbc-store-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm\neap7-activemq-artemis-jms-client-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm\neap7-activemq-artemis-jms-server-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm\neap7-activemq-artemis-journal-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm\neap7-activemq-artemis-ra-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm\neap7-activemq-artemis-selector-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm\neap7-activemq-artemis-server-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm\neap7-activemq-artemis-service-extensions-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm\neap7-activemq-artemis-tools-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm\neap7-h2database-1.4.197-2.redhat_00004.1.el8eap.noarch.rpm\neap7-hal-console-3.3.12-1.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-hibernate-5.3.26-1.Final_redhat_00002.2.el8eap.noarch.rpm\neap7-hibernate-core-5.3.26-1.Final_redhat_00002.2.el8eap.noarch.rpm\neap7-hibernate-entitymanager-5.3.26-1.Final_redhat_00002.2.el8eap.noarch.rpm\neap7-hibernate-envers-5.3.26-1.Final_redhat_00002.2.el8eap.noarch.rpm\neap7-hibernate-java8-5.3.26-1.Final_redhat_00002.2.el8eap.noarch.rpm\neap7-hibernate-validator-6.0.23-1.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-hibernate-validator-cdi-6.0.23-1.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-jackson-annotations-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm\neap7-jackson-core-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm\neap7-jackson-databind-2.12.6.1-1.redhat_00003.1.el8eap.noarch.rpm\neap7-jackson-datatype-jdk8-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm\neap7-jackson-datatype-jsr310-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm\neap7-jackson-jaxrs-base-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm\neap7-jackson-jaxrs-json-provider-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm\neap7-jackson-module-jaxb-annotations-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm\neap7-jackson-modules-base-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm\neap7-jackson-modules-java8-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm\neap7-jberet-1.3.9-1.SP1_redhat_00001.1.el8eap.noarch.rpm\neap7-jberet-core-1.3.9-1.SP1_redhat_00001.1.el8eap.noarch.rpm\neap7-jboss-jsf-api_2.3_spec-3.0.0-4.SP05_redhat_00002.1.el8eap.noarch.rpm\neap7-jboss-remoting-5.0.24-1.SP1_redhat_00001.1.el8eap.noarch.rpm\neap7-jboss-server-migration-1.10.0-16.Final_redhat_00015.1.el8eap.noarch.rpm\neap7-jboss-server-migration-cli-1.10.0-16.Final_redhat_00015.1.el8eap.noarch.rpm\neap7-jboss-server-migration-core-1.10.0-16.Final_redhat_00015.1.el8eap.noarch.rpm\neap7-jboss-xnio-base-3.8.7-1.SP1_redhat_00001.1.el8eap.noarch.rpm\neap7-log4j-2.17.1-2.redhat_00002.1.el8eap.noarch.rpm\neap7-netty-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-all-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-buffer-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-codec-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-codec-dns-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-codec-haproxy-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-codec-http-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-codec-http2-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-codec-memcache-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-codec-mqtt-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-codec-redis-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-codec-smtp-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-codec-socks-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-codec-stomp-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-codec-xml-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-common-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-handler-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-handler-proxy-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-resolver-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-resolver-dns-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-resolver-dns-classes-macos-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-tcnative-2.0.48-1.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-transport-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-transport-classes-epoll-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-transport-classes-kqueue-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-transport-native-unix-common-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-transport-rxtx-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-transport-sctp-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-netty-transport-udt-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-snakeyaml-1.29.0-1.redhat_00001.2.el8eap.noarch.rpm\neap7-undertow-2.2.17-2.SP4_redhat_00001.1.el8eap.noarch.rpm\neap7-wildfly-7.4.5-3.GA_redhat_00001.1.el8eap.noarch.rpm\neap7-wildfly-elytron-1.15.12-1.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-wildfly-elytron-tool-1.15.12-1.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-wildfly-http-client-common-1.1.11-1.SP1_redhat_00001.1.el8eap.noarch.rpm\neap7-wildfly-http-ejb-client-1.1.11-1.SP1_redhat_00001.1.el8eap.noarch.rpm\neap7-wildfly-http-naming-client-1.1.11-1.SP1_redhat_00001.1.el8eap.noarch.rpm\neap7-wildfly-http-transaction-client-1.1.11-1.SP1_redhat_00001.1.el8eap.noarch.rpm\neap7-wildfly-javadocs-7.4.5-3.GA_redhat_00001.1.el8eap.noarch.rpm\neap7-wildfly-modules-7.4.5-3.GA_redhat_00001.1.el8eap.noarch.rpm\neap7-wildfly-transaction-client-1.1.15-1.Final_redhat_00001.1.el8eap.noarch.rpm\neap7-xerces-j2-2.12.0-3.SP04_redhat_00001.1.el8eap.noarch.rpm\n\nx86_64:\neap7-netty-transport-native-epoll-4.1.72-1.Final_redhat_00001.1.el8eap.x86_64.rpm\neap7-netty-transport-native-epoll-debuginfo-4.1.72-1.Final_redhat_00001.1.el8eap.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n8. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-36518\nhttps://access.redhat.com/security/cve/CVE-2021-37136\nhttps://access.redhat.com/security/cve/CVE-2021-37137\nhttps://access.redhat.com/security/cve/CVE-2021-42392\nhttps://access.redhat.com/security/cve/CVE-2021-43797\nhttps://access.redhat.com/security/cve/CVE-2022-0084\nhttps://access.redhat.com/security/cve/CVE-2022-0853\nhttps://access.redhat.com/security/cve/CVE-2022-0866\nhttps://access.redhat.com/security/cve/CVE-2022-1319\nhttps://access.redhat.com/security/cve/CVE-2022-21299\nhttps://access.redhat.com/security/cve/CVE-2022-21363\nhttps://access.redhat.com/security/cve/CVE-2022-23221\nhttps://access.redhat.com/security/cve/CVE-2022-23437\nhttps://access.redhat.com/security/cve/CVE-2022-23913\nhttps://access.redhat.com/security/cve/CVE-2022-24785\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/\nhttps://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/\n\n9. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2022 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nTdWh+RTMxwU=Q04c\n-----END PGP SIGNATURE-----\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. Description:\n\nRed Hat Process Automation Manager is an open source business process\nmanagement suite that combines process management and decision service\nmanagement and enables business and IT users to create, manage, validate,\nand deploy process applications and decision services. \n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update; after installing the update,\nrestart the server by starting the JBoss Application Server process. The purpose of this text-only errata is to inform you\nabout the security issues fixed. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-5316-1                   security@debian.org\nhttps://www.debian.org/security/                          Markus Koschany\nJanuary 11, 2023                      https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage        : netty\nCVE ID         : CVE-2021-37136 CVE-2021-37137 CVE-2021-43797 CVE-2022-41881\n                 CVE-2022-41915\nDebian Bug     : 1027180 1014769 1001437\n\nSeveral out-of-memory, stack overflow or HTTP request smuggling vulnerabilities\nhave been discovered in Netty, a Java NIO client/server socket framework, which\nmay allow attackers to cause a denial of service or bypass restrictions when\nused as a proxy. \n\nFor the stable distribution (bullseye), these problems have been fixed in\nversion 1:4.1.48-4+deb11u1. \n\nWe recommend that you upgrade your netty packages. \n\nFor the detailed security status of netty please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/netty\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n\niQKTBAEBCgB9FiEErPPQiO8y7e9qGoNf2a0UuVE7UeQFAmO/OTVfFIAAAAAALgAo\naXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEFD\nRjNEMDg4RUYzMkVERUY2QTFBODM1RkQ5QUQxNEI5NTEzQjUxRTQACgkQ2a0UuVE7\nUeREBA//QmQrVlx87/n7z5FISY20tNkSxAI3/Xqx9IB/ldRLUw8xcttHoDV13H4K\nJFKuEP6bdZzdzxXCcYGqNlXPjMJqbH6KIEmjIbCthsnbQfNzSXm86eqeZWl33kEG\nQA1buF47PeyRzuW93JmS+XpjjOWaXA4/MmP14wOqHyu/sorRc4aN5R0/ea+cUSW4\na7Zvb/m/gM5dLm1m88do5oBgJsynZM0fCfLi/Lz2vvSKKap/DJaCcK9sjvyzCRlb\n8OqtE+B5eejUIGcBF2TD5BZiZLY5ZIqPBEUZO5g+WMnPRWNUaU/lYqKuTPPlU72A\nZUeysGlAyhbPueEd5cIXG7jYUt07VRUFixinXHukhErzWtQU28mY7mA50If+wabO\n9Pj/6/76St0XFWWxRNPYFCXeM7oSNdvC8DA7oNahpBMDSP/bJSc+sDdwjp41PjKj\nzKKHraQMtOCDOWmqeWJUfUdqVa2ptSjUZ/oGBsW4CUkesoS03YAAtGasxlpfhR2o\n43V0e7/9YmiBI1ZkpqIZ4vU7siqE6NzCMmvdtYaTQD66P0CJ3FCC/OdSdKSRp0HN\nZ45D6hUUZdJLJrO8gGfLfZo9aABTlOSuRUcdHLBqOVUUjz7wqlQHH2d63ytf9X93\nATsBST3G5fY5ssKcyxHFtDAsqgbokkCLJ0D7TFM4cY+E7ywpq+I=\n=jx2O\n-----END PGP SIGNATURE-----\n. Description:\n\nAMQ Broker is a high-performance messaging implementation based on ActiveMQ\nArtemis. It uses an asynchronous journal for fast message persistence, and\nsupports multiple languages, protocols, and platforms. \n\nSecurity Fix(es):\n\n* netty-codec: Bzip2Decoder doesn\u0027t allow setting size restrictions for\ndecompressed data (CVE-2021-37136)\n* netty-codec: SnappyFrameDecoder doesn\u0027t restrict chunk length and may\nbuffer skippable chunks in an unnecessary way (CVE-2021-37137)\n\nFor more details about the security issues and their impact, the CVSS\nscore, acknowledgements, and other related information, see the CVE pages\nlisted in the References section. \n\nThe References section of this erratum contains a download link for the\nupdate. You must be logged in to download the update",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-37136"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-013843"
      },
      {
        "db": "VULHUB",
        "id": "VHN-398972"
      },
      {
        "db": "PACKETSTORM",
        "id": "167424"
      },
      {
        "db": "PACKETSTORM",
        "id": "167964"
      },
      {
        "db": "PACKETSTORM",
        "id": "166408"
      },
      {
        "db": "PACKETSTORM",
        "id": "170498"
      },
      {
        "db": "PACKETSTORM",
        "id": "167422"
      },
      {
        "db": "PACKETSTORM",
        "id": "165105"
      },
      {
        "db": "PACKETSTORM",
        "id": "164936"
      }
    ],
    "trust": 2.34
  },
  "exploit_availability": {
    "_id": null,
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-398972",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-398972"
      }
    ]
  },
  "external_ids": {
    "_id": null,
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-37136",
        "trust": 4.0
      },
      {
        "db": "PACKETSTORM",
        "id": "166408",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "170498",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "164936",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "165105",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "167964",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-013843",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "169918",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "167142",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "168657",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "165564",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "165980",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "167423",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.5013",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.5422",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.4029",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0747",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.5991",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.2799",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0195",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.4253",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.0644",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.3847",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2021.4229",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.3870",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2023.0168",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "166093",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022060838",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022051235",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202110-1442",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "167424",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "167422",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "167122",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "167140",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-398972",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-398972"
      },
      {
        "db": "PACKETSTORM",
        "id": "167424"
      },
      {
        "db": "PACKETSTORM",
        "id": "167964"
      },
      {
        "db": "PACKETSTORM",
        "id": "166408"
      },
      {
        "db": "PACKETSTORM",
        "id": "170498"
      },
      {
        "db": "PACKETSTORM",
        "id": "167422"
      },
      {
        "db": "PACKETSTORM",
        "id": "165105"
      },
      {
        "db": "PACKETSTORM",
        "id": "164936"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202110-1442"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-013843"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-37136"
      }
    ]
  },
  "id": "VAR-202110-1706",
  "iot": {
    "_id": null,
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-398972"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2026-04-10T22:16:41.258000Z",
  "patch": {
    "_id": null,
    "data": [
      {
        "title": "Oracle\u00a0Critical\u00a0Patch\u00a0Update\u00a0Advisory\u00a0-\u00a0April\u00a02022 Oracle\u00a0Critical\u00a0Patch\u00a0Update",
        "trust": 0.8,
        "url": "https://security.netapp.com/advisory/ntap-20220210-0012/"
      },
      {
        "title": "Netty Remediation of resource management error vulnerabilities",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=167344"
      }
    ],
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202110-1442"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-013843"
      }
    ]
  },
  "problemtype_data": {
    "_id": null,
    "data": [
      {
        "problemtype": "CWE-400",
        "trust": 1.1
      },
      {
        "problemtype": "Resource exhaustion (CWE-400) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-398972"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-013843"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-37136"
      }
    ]
  },
  "references": {
    "_id": null,
    "data": [
      {
        "trust": 2.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37136"
      },
      {
        "trust": 1.7,
        "url": "https://security.netapp.com/advisory/ntap-20220210-0012/"
      },
      {
        "trust": 1.7,
        "url": "https://www.debian.org/security/2023/dsa-5316"
      },
      {
        "trust": 1.7,
        "url": "https://github.com/netty/netty/security/advisories/ghsa-grg4-wf29-r9vv"
      },
      {
        "trust": 1.7,
        "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
      },
      {
        "trust": 1.7,
        "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
      },
      {
        "trust": 1.7,
        "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
      },
      {
        "trust": 1.7,
        "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00008.html"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d%40%3ccommits.druid.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb%40%3ccommits.druid.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04%40%3ccommits.druid.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0%40%3ccommits.druid.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16%40%3ccommits.druid.apache.org%3e"
      },
      {
        "trust": 1.0,
        "url": "https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e%40%3cdev.tinkerpop.apache.org%3e"
      },
      {
        "trust": 0.7,
        "url": "https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3ccommits.druid.apache.org%3e"
      },
      {
        "trust": 0.7,
        "url": "https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3ccommits.druid.apache.org%3e"
      },
      {
        "trust": 0.7,
        "url": "https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3ccommits.druid.apache.org%3e"
      },
      {
        "trust": 0.7,
        "url": "https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3ccommits.druid.apache.org%3e"
      },
      {
        "trust": 0.7,
        "url": "https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3ccommits.druid.apache.org%3e"
      },
      {
        "trust": 0.7,
        "url": "https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3cdev.tinkerpop.apache.org%3e"
      },
      {
        "trust": 0.7,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37137"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/team/contact/"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2021-37137"
      },
      {
        "trust": 0.6,
        "url": "https://access.redhat.com/security/cve/cve-2021-37136"
      },
      {
        "trust": 0.6,
        "url": "https://bugzilla.redhat.com/):"
      },
      {
        "trust": 0.6,
        "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/6522822"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/oracle-communications-vulnerabilities-of-january-2022-37289"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.3847"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.4029"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/170498/debian-security-advisory-5316-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/168657/red-hat-security-advisory-2022-6835-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/165980/red-hat-security-advisory-2022-0520-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/netty-codec-overload-via-bzip2decoder-38514"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.5422"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.2799"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/165564/red-hat-security-advisory-2022-0138-06.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/167423/red-hat-security-advisory-2022-4918-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/6523820"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/167142/red-hat-security-advisory-2022-2216-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/165105/red-hat-security-advisory-2021-4851-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0195"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/167964/red-hat-security-advisory-2022-5903-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022060838"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2023.0168"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.4229"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/166408/red-hat-security-advisory-2022-1013-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/166093/red-hat-security-advisory-2022-0589-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/164936/red-hat-security-advisory-2021-3959-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2021.4253"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.5991"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.3870"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.5013"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0747"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/169918/red-hat-security-advisory-2022-8506-01.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022051235"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.0644"
      },
      {
        "trust": 0.5,
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "trust": 0.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-43797"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2021-42392"
      },
      {
        "trust": 0.3,
        "url": "https://access.redhat.com/security/cve/cve-2021-43797"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-42392"
      },
      {
        "trust": 0.2,
        "url": "https://issues.jboss.org/):"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0084"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23437"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/articles/11258"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-0866"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-24785"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-0084"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-21299"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21299"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23913"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36518"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23221"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24785"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-1319"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2020-36518"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-21363"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-1319"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0866"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0853"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-23437"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-23221"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-0853"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-23913"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2022-21363"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-2471"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-2471"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22569"
      },
      {
        "trust": 0.2,
        "url": "https://access.redhat.com/security/cve/cve-2021-22569"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/team/key/"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:4919"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3642"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:5903"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-37714"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-22950"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37714"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2022-25647"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-25647"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-36373"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36373"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3717"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3717"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22950"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3642"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-3644"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3644"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-28170"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-28168"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-4178"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40690"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-28170"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30129"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-15522"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:1013"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2020-8908"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-26291"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-26291"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-4178"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-41269"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-15522"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8908"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-41269"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_integration/2022.q2"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-28168"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-30129"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions\u0026product=red.hat.integration\u0026version=2022-q2"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/cve/cve-2021-40690"
      },
      {
        "trust": 0.1,
        "url": "https://security-tracker.debian.org/tracker/netty"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41881"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-41915"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/faq"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=securitypatches\u0026product=appplatform\u0026version=7.4"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2022:4922"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/security/updates/classification/#low"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:4851"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions\u0026product=jboss.amq.broker\u0026version=7.9.1"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_amq/2021.q4"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions\u0026product=catrhoar.eclipse.vertx\u0026version=4.1.5"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/documentation/en-us/red_hat_build_of_eclipse_vert.x/4.1/html/release_notes_for_eclipse_vert.x_4.1/index"
      },
      {
        "trust": 0.1,
        "url": "https://access.redhat.com/errata/rhsa-2021:3959"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-398972"
      },
      {
        "db": "PACKETSTORM",
        "id": "167424"
      },
      {
        "db": "PACKETSTORM",
        "id": "167964"
      },
      {
        "db": "PACKETSTORM",
        "id": "166408"
      },
      {
        "db": "PACKETSTORM",
        "id": "170498"
      },
      {
        "db": "PACKETSTORM",
        "id": "167422"
      },
      {
        "db": "PACKETSTORM",
        "id": "165105"
      },
      {
        "db": "PACKETSTORM",
        "id": "164936"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202110-1442"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-013843"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-37136"
      }
    ]
  },
  "sources": {
    "_id": null,
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-398972",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "167424",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "167964",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "166408",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "170498",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "167422",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "165105",
        "ident": null
      },
      {
        "db": "PACKETSTORM",
        "id": "164936",
        "ident": null
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202110-1442",
        "ident": null
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-013843",
        "ident": null
      },
      {
        "db": "NVD",
        "id": "CVE-2021-37136",
        "ident": null
      }
    ]
  },
  "sources_release_date": {
    "_id": null,
    "data": [
      {
        "date": "2021-10-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-398972",
        "ident": null
      },
      {
        "date": "2022-06-07T15:15:05",
        "db": "PACKETSTORM",
        "id": "167424",
        "ident": null
      },
      {
        "date": "2022-08-04T14:50:56",
        "db": "PACKETSTORM",
        "id": "167964",
        "ident": null
      },
      {
        "date": "2022-03-23T15:52:53",
        "db": "PACKETSTORM",
        "id": "166408",
        "ident": null
      },
      {
        "date": "2023-01-12T15:16:09",
        "db": "PACKETSTORM",
        "id": "170498",
        "ident": null
      },
      {
        "date": "2022-06-07T15:14:37",
        "db": "PACKETSTORM",
        "id": "167422",
        "ident": null
      },
      {
        "date": "2021-12-01T16:25:45",
        "db": "PACKETSTORM",
        "id": "165105",
        "ident": null
      },
      {
        "date": "2021-11-11T14:58:33",
        "db": "PACKETSTORM",
        "id": "164936",
        "ident": null
      },
      {
        "date": "2021-10-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202110-1442",
        "ident": null
      },
      {
        "date": "2022-09-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-013843",
        "ident": null
      },
      {
        "date": "2021-10-19T15:15:07.697000",
        "db": "NVD",
        "id": "CVE-2021-37136",
        "ident": null
      }
    ]
  },
  "sources_update_date": {
    "_id": null,
    "data": [
      {
        "date": "2023-02-24T00:00:00",
        "db": "VULHUB",
        "id": "VHN-398972",
        "ident": null
      },
      {
        "date": "2023-01-16T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202110-1442",
        "ident": null
      },
      {
        "date": "2022-09-28T08:45:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-013843",
        "ident": null
      },
      {
        "date": "2023-11-07T03:36:54.390000",
        "db": "NVD",
        "id": "CVE-2021-37136",
        "ident": null
      }
    ]
  },
  "threat_type": {
    "_id": null,
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202110-1442"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "_id": null,
    "data": "Netty\u00a0 Resource exhaustion vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-013843"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "_id": null,
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202110-1442"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…