Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/eap7-jackson-modules-java8@2.10.4-2.redhat_00006.1?arch=el7eap
purl pkg:rpm/redhat/eap7-jackson-modules-java8@2.10.4-2.redhat_00006.1?arch=el7eap
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.5
Vulnerabilities affecting this package (14)
Vulnerability Summary Fixed by
VCID-1vrj-chs2-d3ab
Aliases:
CVE-2023-1973
GHSA-97cq-f4jm-mv8h
Undertow Denial of Service vulnerability A flaw was found in Undertow package. Using the FormAuthenticationMechanism, a malicious user could trigger a Denial of Service by sending crafted requests, leading the server to an OutofMemory error, exhausting the server's memory. There are no reported fixed by versions.
VCID-469b-j213-6ufk
Aliases:
CVE-2024-1635
GHSA-w6qf-42m7-vh68
Undertow Uncontrolled Resource Consumption Vulnerability A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available. At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree leaks via that task, which is added to XNIO WorkerThread. So, the workerThread points to the Undertow conduit, which contains the connections and causes the leak. There are no reported fixed by versions.
VCID-5585-a76n-zubf
Aliases:
CVE-2023-5379
Allocation of Resources Without Limits or Throttling A flaw was found in Undertow. When an AJP request is sent that exceeds the max-header-size attribute in ajp-listener, JBoss EAP is marked in an error state by mod_cluster in httpd, causing JBoss EAP to close the TCP connection without returning an AJP response. This happens because mod_proxy_cluster marks the JBoss EAP instance as an error worker when the TCP connection is closed from the backend after sending the AJP request without receiving an AJP response, and stops forwarding. This issue could allow a malicious user could to repeatedly send requests that exceed the max-header-size, causing a Denial of Service (DoS). There are no reported fixed by versions.
VCID-62gn-nwup-8uat
Aliases:
CVE-2022-1259
undertow: potential security issue in flow control over HTTP/2 may lead to DOS(incomplete fix for CVE-2021-3629) There are no reported fixed by versions.
VCID-6ssa-j1q1-c3cs
Aliases:
CVE-2022-3143
GHSA-jmj6-p2j9-68cp
Wildfly-elytron possibly vulnerable to timing attacks via use of unsafe comparator wildfly-elytron: possible timing attacks via use of unsafe comparator. A flaw was found in Wildfly-elytron. Wildfly-elytron uses `java.util.Arrays.equals` in several places, which is unsafe and vulnerable to timing attacks. To compare values securely, use `java.security.MessageDigest.isEqual` instead. This flaw allows an attacker to access secure information or impersonate an authed user. There are no reported fixed by versions.
VCID-7yc7-e35f-8uhj
Aliases:
CVE-2023-3223
GHSA-65h2-wf7m-q2v8
Uncontrolled Resource Consumption A flaw was found in undertow. Servlets annotated with @MultipartConfig may cause an OutOfMemoryError due to large multipart content. This may allow unauthorized users to cause remote Denial of Service (DoS) attack. If the server uses fileSizeThreshold to limit the file size, it's possible to bypass the limit by setting the file name in the request to null. There are no reported fixed by versions.
VCID-8p4t-8f51-h3dc
Aliases:
CVE-2021-37137
GHSA-9vjp-v76f-g363
Uncontrolled Resource Consumption The Snappy frame decoder function does not restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicious input that decompresses to a very big size (via a network stream or a file) or by sending a huge skippable chunk. There are no reported fixed by versions.
VCID-93ut-2de3-ckc5
Aliases:
CVE-2022-1319
undertow: Double AJP response for 400 from EAP 7 results in CPING failures There are no reported fixed by versions.
VCID-9p6a-t8zz-jkfd
Aliases:
CVE-2024-1233
GHSA-v4mm-q8fv-r2w5
WildFly Elytron: SSRF security issue A flaw was found in` JwtValidator.resolvePublicKey` in JBoss EAP, where the validator checks jku and sends a HTTP request. During this process, no whitelisting or other filtering behavior is performed on the destination URL address, which may result in a server-side request forgery (SSRF) vulnerability. There are no reported fixed by versions.
VCID-jz3d-vvfb-jfbw
Aliases:
CVE-2022-4492
GHSA-pfcc-3g6r-8rg8
Undertow client not checking server identity presented by server certificate in https connections The undertow client is not checking the server identity presented by the server certificate in https connections. This should be performed by default in https and in http/2. There are no reported fixed by versions.
VCID-usz2-tufg-k7gz
Aliases:
CVE-2023-1108
GHSA-m4mm-pg93-fv78
Undertow denial of service vulnerability A flaw was found in undertow. This issue makes achieving a denial of service possible due to an unexpected handshake status updated in SslConduit, where the loop never terminates. There are no reported fixed by versions.
VCID-v6ek-y7cn-kycd
Aliases:
CVE-2020-36518
GHSA-57j2-w4cx-62h2
Uncontrolled Resource Consumption jackson-databind before 2.13.0 allows a Java StackOverflow exception and denial of service via a large depth of nested objects. There are no reported fixed by versions.
VCID-xftw-raz7-b7e1
Aliases:
CVE-2022-2053
GHSA-95rf-557x-44g5
Undertow vulnerable to Dos via Large AJP request When a POST request comes through AJP and the request exceeds the max-post-size limit (maxEntitySize), Undertow's AjpServerRequestConduit implementation closes a connection without sending any response to the client/proxy. This behavior results in that a front-end proxy marking the backend worker (application server) as an error state and not forward requests to the worker for a while. In mod_cluster, this continues until the next STATUS request (10 seconds intervals) from the application server updates the server state. So, in the worst case, it can result in "All workers are in error state" and mod_cluster responds "503 Service Unavailable" for a while (up to 10 seconds). In mod_proxy_balancer, it does not forward requests to the worker until the "retry" timeout passes. However, luckily, mod_proxy_balancer has "forcerecovery" setting (On by default; this parameter can force the immediate recovery of all workers without considering the retry parameter of the workers if all workers of a balancer are in error state.). So, unlike mod_cluster, mod_proxy_balancer does not result in responding "503 Service Unavailable". An attacker could use this behavior to send a malicious request and trigger server errors, resulting in DoS (denial of service). This flaw was fixed in Undertow 2.2.19.Final, Undertow 2.3.0.Alpha2. There are no reported fixed by versions.
VCID-xyc4-63ra-mfh2
Aliases:
CVE-2021-37136
GHSA-grg4-wf29-r9vv
Uncontrolled Resource Consumption The Bzip2 decompression decoder function does not allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T14:05:01.243788+00:00 RedHat Importer Affected by VCID-v6ek-y7cn-kycd https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-36518.json 38.0.0
2026-04-01T14:01:27.070319+00:00 RedHat Importer Affected by VCID-8p4t-8f51-h3dc https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37137.json 38.0.0
2026-04-01T14:01:25.920739+00:00 RedHat Importer Affected by VCID-xyc4-63ra-mfh2 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37136.json 38.0.0
2026-04-01T13:59:02.343999+00:00 RedHat Importer Affected by VCID-62gn-nwup-8uat https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1259.json 38.0.0
2026-04-01T13:59:00.058201+00:00 RedHat Importer Affected by VCID-93ut-2de3-ckc5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1319.json 38.0.0
2026-04-01T13:58:11.302826+00:00 RedHat Importer Affected by VCID-xftw-raz7-b7e1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2053.json 38.0.0
2026-04-01T13:57:14.837130+00:00 RedHat Importer Affected by VCID-6ssa-j1q1-c3cs https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3143.json 38.0.0
2026-04-01T13:56:00.603681+00:00 RedHat Importer Affected by VCID-jz3d-vvfb-jfbw https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4492.json 38.0.0
2026-04-01T13:55:09.474775+00:00 RedHat Importer Affected by VCID-usz2-tufg-k7gz https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1108.json 38.0.0
2026-04-01T13:53:06.840777+00:00 RedHat Importer Affected by VCID-7yc7-e35f-8uhj https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3223.json 38.0.0
2026-04-01T13:51:17.926499+00:00 RedHat Importer Affected by VCID-469b-j213-6ufk https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1635.json 38.0.0
2026-04-01T13:50:51.907041+00:00 RedHat Importer Affected by VCID-5585-a76n-zubf https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5379.json 38.0.0
2026-04-01T13:48:44.099868+00:00 RedHat Importer Affected by VCID-9p6a-t8zz-jkfd https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-1233.json 38.0.0
2026-04-01T13:48:27.034440+00:00 RedHat Importer Affected by VCID-1vrj-chs2-d3ab https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-1973.json 38.0.0