{"id":"RHSA-2023:0553","summary":"Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.9 Security update","modified":"2026-04-14T10:01:28Z","published":"2024-09-27T15:16:47Z","upstream":["CVE-2015-9251","CVE-2016-10735","CVE-2017-18214","CVE-2018-14040","CVE-2018-14041","CVE-2018-14042","CVE-2019-11358","CVE-2019-8331","CVE-2020-11022","CVE-2020-11023","CVE-2022-3143","CVE-2022-40149","CVE-2022-40150","CVE-2022-40152","CVE-2022-42003","CVE-2022-42004","CVE-2022-45047","CVE-2022-45693","CVE-2022-46364"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:0553"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1399546"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1553413"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601614"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601616"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1601617"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1668097"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1686454"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1701972"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1828406"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1850004"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2124682"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134291"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135244"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135247"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135770"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135771"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2145194"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2155682"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2155970"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23864"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23865"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23866"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23927"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-24055"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-24081"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-24095"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-24100"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-24127"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-24128"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-24132"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-24147"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-24167"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-24191"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-24195"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-24207"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-24248"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-24426"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-24427"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0553.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2015-9251"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2015-9251"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2015-9251"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-10735"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-10735"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10735"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-18214"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-18214"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18214"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-14040"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-14040"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14040"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-14041"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-14041"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14041"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-14042"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-14042"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14042"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-8331"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-8331"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-8331"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2019-11358"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2019-11358"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11358"},{"type":"ARTICLE","url":"https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/"},{"type":"ARTICLE","url":"https://www.drupal.org/sa-core-2019-006"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-11022"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-11022"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11022"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-gxr4-xjj5-5px2"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-11023"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-11023"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-11023"},{"type":"ARTICLE","url":"https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/"},{"type":"ARTICLE","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-3143"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-3143"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-3143"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-40149"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-40149"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40149"},{"type":"ARTICLE","url":"https://github.com/jettison-json/jettison/releases/tag/jettison-1.5.1"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-40150"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-40150"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40150"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-40152"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-40152"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40152"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-3f7h-mf4q-vrm4"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42003"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42003"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42003"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-42004"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-42004"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42004"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-45047"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-45047"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45047"},{"type":"ARTICLE","url":"https://www.mail-archive.com/dev@mina.apache.org/msg39312.html"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-45693"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-45693"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45693"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-46364"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-46364"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-46364"},{"type":"ARTICLE","url":"https://cxf.apache.org/security-advisories.data/CVE-2022-46364.txt?version=1&modificationDate=1670944472739&api=v2"}],"affected":[{"package":{"name":"eap7-hal-console","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-hal-console"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.3.16-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-wildfly-elytron","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-wildfly-elytron"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.15.16-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-wildfly-elytron-tool","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-wildfly-elytron-tool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.15.16-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jettison","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jettison"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.5.2-1.redhat_00002.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-woodstox-core","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-woodstox-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.4.0-1.redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jackson-databind","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jackson-databind"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.12.7-1.redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-apache-sshd","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-apache-sshd"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.9.2-1.redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-elytron-web","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-elytron-web"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.9.3-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-hibernate-search","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-hibernate-search"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.10.13-3.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-hibernate-search-backend-jgroups","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-hibernate-search-backend-jgroups"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.10.13-3.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-hibernate-search-backend-jms","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-hibernate-search-backend-jms"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.10.13-3.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-hibernate-search-engine","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-hibernate-search-engine"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.10.13-3.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-hibernate-search-orm","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-hibernate-search-orm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.10.13-3.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-hibernate-search-serialization-avro","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-hibernate-search-serialization-avro"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.10.13-3.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-ironjacamar","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-ironjacamar"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.5.10-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-ironjacamar-common-api","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-ironjacamar-common-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.5.10-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-ironjacamar-common-impl","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-ironjacamar-common-impl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.5.10-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-ironjacamar-common-spi","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-ironjacamar-common-spi"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.5.10-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-ironjacamar-core-api","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-ironjacamar-core-api"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.5.10-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-ironjacamar-core-impl","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-ironjacamar-core-impl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.5.10-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-ironjacamar-deployers-common","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-ironjacamar-deployers-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.5.10-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-ironjacamar-jdbc","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-ironjacamar-jdbc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.5.10-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-ironjacamar-validator","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-ironjacamar-validator"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.5.10-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jackson-annotations","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jackson-annotations"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.12.7-1.redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jackson-core","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jackson-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.12.7-1.redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jackson-datatype-jdk8","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jackson-datatype-jdk8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.12.7-1.redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jackson-datatype-jsr310","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jackson-datatype-jsr310"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.12.7-1.redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jackson-jaxrs-base","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jackson-jaxrs-base"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.12.7-1.redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jackson-jaxrs-json-provider","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jackson-jaxrs-json-provider"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.12.7-1.redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jackson-jaxrs-providers","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jackson-jaxrs-providers"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.12.7-1.redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jackson-module-jaxb-annotations","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jackson-module-jaxb-annotations"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.12.7-1.redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jackson-modules-base","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jackson-modules-base"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.12.7-1.redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jackson-modules-java8","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jackson-modules-java8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.12.7-1.redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-javaee-security-soteria","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-javaee-security-soteria"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.1-3.redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-javaee-security-soteria-enterprise","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-javaee-security-soteria-enterprise"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.1-3.redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jboss-ejb-client","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jboss-ejb-client"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.0.49-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jboss-jsf-api_2.3_spec","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jboss-jsf-api_2.3_spec"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.0-6.SP07_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jboss-jsp-api_2.3_spec","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jboss-jsp-api_2.3_spec"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.0-3.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jboss-remoting","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jboss-remoting"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.0.27-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jboss-server-migration","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jboss-server-migration"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.10.0-24.Final_redhat_00023.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jboss-server-migration-cli","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jboss-server-migration-cli"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.10.0-24.Final_redhat_00023.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-jboss-server-migration-core","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jboss-server-migration-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.10.0-24.Final_redhat_00023.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-undertow","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-undertow"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.22-1.SP3_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-undertow-server","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-undertow-server"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.9.3-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-wildfly","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-wildfly"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.4.9-4.GA_redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-wildfly-javadocs","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-wildfly-javadocs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.4.9-4.GA_redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}},{"package":{"name":"eap7-wildfly-modules","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-wildfly-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.4.9-4.GA_redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2023:0553.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}