QID 240996

Date Published: 2022-12-12

QID 240996: Red Hat Update for JBoss Core Services (RHSA-2022:8840)

Red hat jboss core services is a set of supplementary software for Red Hat jboss middleware products.
This software, such as apache http server, is common to multiple jboss middleware products, and is packaged under Red Hat jboss core services to allow for faster distribution of updates, and for a more consistent update experience...Security Fix(es):

    curl: hsts bypass via idn (cve-2022-42916).
    Curl: http proxy double-free (cve-2022-42915).
    Curl: post following put confusion (cve-2022-32221).
    Httpd: mod_proxy: x-forwarded-for dropped by hop-by-hop mechanism (cve-2022-31813).
    Httpd: mod_sed: dos vulnerability (cve-2022-30522).
    Httpd: out-of-bounds read in ap_strcmp_match() (cve-2022-28615).
    Httpd: out-of-bounds read via ap_rwrite() (cve-2022-28614).
    Httpd: mod_proxy_ajp: possible request smuggling (cve-2022-26377).
    Curl: control code in cookie denial of service (cve-2022-35252).
    Jbcs-httpd24-httpd: httpd: mod_isapi: out-of-bounds read (cve-2022-28330).
    Curl: unpreserved file permissions (cve-2022-32207).
    Curl: various flaws (cve-2022-32206 cve-2022-32208).
    Openssl: the c_rehash script allows command injection (cve-2022-2068).
    Openssl: c_rehash script allows command injection (cve-2022-1292).
    Jbcs-httpd24-httpd: httpd: core: possible buffer overflow with very large or unlimited limitxmlrequestbody (cve-2022-22721).
    Jbcs-httpd24-httpd: httpd: mod_sed: read/write beyond bounds (cve-2022-23943).
Affected Products:
    Red Hat jboss core services 1 for rhel 8 x86_64.
    Red hat jboss core services 1 for rhel 7 x86_64.
.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a security breach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Critical - 10 severity.
  • Solution
    Refer to Red Hat security advisory RHSA-2022:8840 for updates and patch information.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    RHSA-2022:8840 Red Hat Enterprise Linux URL Logo access.redhat.com/errata/RHSA-2022:8840