{"id":"RHSA-2022:6823","summary":"Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.7 Security update","modified":"2026-04-24T10:02:15Z","published":"2024-09-30T07:06:11Z","upstream":["CVE-2022-1259","CVE-2022-2053","CVE-2022-25857"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:6823"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072339"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2095862"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2126789"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23620"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23687"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23738"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23741"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23753"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23772"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23794"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23802"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23803"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23805"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23816"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23818"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23869"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23881"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-23912"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6823.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-1259"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-1259"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1259"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-2053"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-2053"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-2053"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-25857"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-25857"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-25857"},{"type":"ARTICLE","url":"https://bitbucket.org/snakeyaml/snakeyaml/issues/525"}],"affected":[{"package":{"name":"eap7-undertow","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el9","purl":"pkg:rpm/redhat/eap7-undertow"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.19-1.SP2_redhat_00001.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6823.json"}},{"package":{"name":"eap7-snakeyaml","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el9","purl":"pkg:rpm/redhat/eap7-snakeyaml"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.31.0-1.redhat_00001.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:6823.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}