{"id":"RHSA-2022:4918","summary":"Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.5 security update on RHEL 7","modified":"2026-04-16T10:02:37Z","published":"2024-09-29T19:10:02Z","upstream":["CVE-2020-36518","CVE-2021-37136","CVE-2021-37137","CVE-2021-42392","CVE-2021-43797","CVE-2022-0084","CVE-2022-0853","CVE-2022-0866","CVE-2022-1319","CVE-2022-21299","CVE-2022-21363","CVE-2022-23221","CVE-2022-23437","CVE-2022-23913","CVE-2022-24785"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:4918"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2004133"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2004135"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2031958"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2039403"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041472"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2044596"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2047200"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2047343"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2060725"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2060929"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2063601"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2064226"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2064698"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072009"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073890"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23120"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23171"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23194"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23241"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23299"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23300"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23312"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23313"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23336"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23338"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23339"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23351"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23353"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23429"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23432"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23451"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23531"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23532"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_4918.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-36518"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-36518"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36518"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-57j2-w4cx-62h2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-37136"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-37136"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37136"},{"type":"ARTICLE","url":"https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-37137"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-37137"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-37137"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-42392"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-42392"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-42392"},{"type":"ARTICLE","url":"https://github.com/h2database/h2database/security/advisories/GHSA-h376-j262-vhq6"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-43797"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-43797"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-43797"},{"type":"ARTICLE","url":"https://github.com/netty/netty/security/advisories/GHSA-wx5j-54mm-rqqq"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0084"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0084"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0084"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0853"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0853"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0853"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-0866"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-0866"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-0866"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1319"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1319"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1319"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21299"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21299"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21299"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21363"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21363"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21363"},{"type":"ARTICLE","url":"https://www.oracle.com/security-alerts/cpujan2022.html#AppendixMSQL"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-23221"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-23221"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23221"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-45hx-wfhj-473x"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-23437"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-23437"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23437"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-23913"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-23913"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-23913"},{"type":"ARTICLE","url":"https://lists.apache.org/thread/fjynj57rd99s814rdn5hzvmx8lz403q2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24785"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-24785"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24785"},{"type":"ARTICLE","url":"https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4"}],"affected":[{"package":{"name":"eap7-jackson-databind","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-jackson-databind"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.12.6.1-1.redhat_00003.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-all","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-all"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-buffer","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-buffer"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-codec","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-codec"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-codec-dns","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-codec-dns"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-codec-haproxy","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-codec-haproxy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-codec-http","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-codec-http"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-codec-http2","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-codec-http2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-codec-memcache","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-codec-memcache"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-codec-mqtt","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-codec-mqtt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-codec-redis","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-codec-redis"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-codec-smtp","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-codec-smtp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-codec-socks","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-codec-socks"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-codec-stomp","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-codec-stomp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-codec-xml","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-codec-xml"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-common","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-handler","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-handler"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-handler-proxy","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-handler-proxy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-resolver","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-resolver"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-resolver-dns","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-resolver-dns"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-resolver-dns-classes-macos","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-resolver-dns-classes-macos"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-transport","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-transport"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-transport-classes-epoll","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-transport-classes-epoll"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-transport-classes-kqueue","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-transport-classes-kqueue"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-transport-native-unix-common","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-transport-native-unix-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-transport-rxtx","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-transport-rxtx"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-transport-sctp","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-transport-sctp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-netty-transport-udt","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-netty-transport-udt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.72-4.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-h2database","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-h2database"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.4.197-2.redhat_00004.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-jboss-xnio-base","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-jboss-xnio-base"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.8.7-1.SP1_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-wildfly-http-client","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-wildfly-http-client"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.11-1.SP1_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-wildfly-http-client-common","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-wildfly-http-client-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.11-1.SP1_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-wildfly-http-ejb-client","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-wildfly-http-ejb-client"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.11-1.SP1_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-wildfly-http-naming-client","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-wildfly-http-naming-client"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.11-1.SP1_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-wildfly-http-transaction-client","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-wildfly-http-transaction-client"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.11-1.SP1_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-wildfly","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-wildfly"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.4.5-3.GA_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-wildfly-java-jdk11","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-wildfly-java-jdk11"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.4.5-3.GA_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-wildfly-java-jdk8","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-wildfly-java-jdk8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.4.5-3.GA_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-wildfly-javadocs","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-wildfly-javadocs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.4.5-3.GA_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-wildfly-modules","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-wildfly-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.4.5-3.GA_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-undertow","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-undertow"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.17-2.SP4_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-xerces-j2","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-xerces-j2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.12.0-3.SP04_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-activemq-artemis","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-activemq-artemis"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.16.0-9.redhat_00042.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-activemq-artemis-cli","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-activemq-artemis-cli"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.16.0-9.redhat_00042.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-activemq-artemis-commons","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-activemq-artemis-commons"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.16.0-9.redhat_00042.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-activemq-artemis-core-client","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-activemq-artemis-core-client"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.16.0-9.redhat_00042.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-activemq-artemis-dto","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-activemq-artemis-dto"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.16.0-9.redhat_00042.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-activemq-artemis-hornetq-protocol","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-activemq-artemis-hornetq-protocol"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.16.0-9.redhat_00042.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-activemq-artemis-hqclient-protocol","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-activemq-artemis-hqclient-protocol"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.16.0-9.redhat_00042.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-activemq-artemis-jdbc-store","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-activemq-artemis-jdbc-store"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.16.0-9.redhat_00042.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-activemq-artemis-jms-client","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-activemq-artemis-jms-client"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.16.0-9.redhat_00042.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-activemq-artemis-jms-server","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-activemq-artemis-jms-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.16.0-9.redhat_00042.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-activemq-artemis-journal","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-activemq-artemis-journal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.16.0-9.redhat_00042.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-activemq-artemis-ra","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-activemq-artemis-ra"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.16.0-9.redhat_00042.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-activemq-artemis-selector","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-activemq-artemis-selector"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.16.0-9.redhat_00042.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-activemq-artemis-server","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-activemq-artemis-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.16.0-9.redhat_00042.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-activemq-artemis-service-extensions","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-activemq-artemis-service-extensions"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.16.0-9.redhat_00042.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-activemq-artemis-tools","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-activemq-artemis-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.16.0-9.redhat_00042.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}},{"package":{"name":"eap7-hal-console","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el7","purl":"pkg:rpm/redhat/eap7-hal-console"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.3.12-1.Final_redhat_00001.1.el7eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:4918.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}