access.redhat.com
Open in
urlscan Pro
2a02:26f0:3500:18::1724:a29e
Public Scan
URL:
https://access.redhat.com/errata/RHSA-2024:7441
Submission: On October 09 via api from BE — Scanned from DE
Submission: On October 09 via api from BE — Scanned from DE
Form analysis
1 forms found in the DOMName: topSearchForm — GET /search/browse/search/
<form class="ng-pristine ng-valid topSearchForm" id="topSearchForm" name="topSearchForm" action="/search/browse/search/" method="get" enctype="application/x-www-form-urlencoded">
<cp-search-autocomplete class="push-bottom PFElement" path="/webassets/avalon/j/data.json" num-items="5" placeholder="Enter your search term" pfelement="" type="container"></cp-search-autocomplete>
<div> Or <a href="/support/cases/#/troubleshoot">troubleshoot an issue</a>. </div>
</form>
Text Content
Note: Our personalized web services require that your browser be enabled for JavaScript and cookies Skip to navigation Skip to main content UTILITIES * Subscriptions * Downloads * Red Hat Console * Get Support * Subscriptions * Downloads * Red Hat Console * Get Support * Products TOP PRODUCTS * Red Hat Enterprise Linux * Red Hat OpenShift * Red Hat Ansible Automation Platform All Products DOWNLOADS AND CONTAINERS * Downloads * Packages * Containers TOP RESOURCES * Documentation * Product Life Cycles * Product Compliance * Errata * Knowledge RED HAT KNOWLEDGE CENTER * Knowledgebase Solutions * Knowledgebase Articles * Customer Portal Labs * Errata TOP PRODUCT DOCS * Red Hat Enterprise Linux * Red Hat OpenShift * Red Hat Ansible Automation Platform All Product Docs TRAINING AND CERTIFICATION * About * Course Index * Certification Index * Skill Assessment * Security RED HAT PRODUCT SECURITY CENTER * Security Updates * Security Advisories * Red Hat CVE Database * Errata REFERENCES * Security Bulletins * Security Measurement * Severity Ratings * Security Data TOP RESOURCES * Security Labs * Backporting Policies * Security Blog * Support RED HAT SUPPORT * Support Cases * Troubleshoot * Get Support * Contact Red Hat Support RED HAT COMMUNITY SUPPORT * Customer Portal Community * Community Discussions * Red Hat Accelerator Program TOP RESOURCES * Product Life Cycles * Customer Portal Labs * Red Hat JBoss Supported Configurations * Red Hat Insights Or troubleshoot an issue. English SELECT YOUR LANGUAGE * English * Français * 한국어 * 日本語 * 中文 (中国) Infrastructure and Management * Red Hat Enterprise Linux * Red Hat Satellite * Red Hat Subscription Management * Red Hat Insights * Red Hat Ansible Automation Platform Cloud Computing * Red Hat OpenShift * Red Hat OpenStack Platform * Red Hat OpenShift * Red Hat OpenShift AI * Red Hat OpenShift Dedicated * Red Hat Advanced Cluster Security for Kubernetes * Red Hat Advanced Cluster Management for Kubernetes * Red Hat Quay * Red Hat OpenShift Dev Spaces * Red Hat OpenShift Service on AWS Storage * Red Hat Gluster Storage * Red Hat Hyperconverged Infrastructure * Red Hat Ceph Storage * Red Hat OpenShift Data Foundation Runtimes * Red Hat Runtimes * Red Hat JBoss Enterprise Application Platform * Red Hat Data Grid * Red Hat JBoss Web Server * Red Hat build of Keycloak * Red Hat support for Spring Boot * Red Hat build of Node.js * Red Hat build of Quarkus Integration and Automation * Red Hat Application Foundations * Red Hat Fuse * Red Hat AMQ * Red Hat 3scale API Management All Products All Red Hat Back to menu QUICK LINKS: REDHAT.COM, CUSTOMER PORTAL, RED HAT'S DEVELOPER SITE, RED HAT'S PARTNER SITE. * You are here RED HAT Learn about our open source products, services, and company. * You are here RED HAT CUSTOMER PORTAL Get product support and knowledge from the open source experts. * You are here RED HAT DEVELOPER Read developer tutorials and download Red Hat software for cloud application development. * You are here RED HAT PARTNER CONNECT Get training, subscriptions, certifications, and more for partners to build, sell, and support customer solutions. PRODUCTS & TOOLS * ANSIBLE.COM Learn about and try our IT automation product. * RED HAT ECOSYSTEM CATALOG Find hardware, software, and cloud providers―and download container images―certified to perform with Red Hat technologies. TRY, BUY, & SELL * RED HAT HYBRID CLOUD CONSOLE Access technical how-tos, tutorials, and learning paths focused on Red Hat’s hybrid cloud managed services. * RED HAT STORE Buy select Red Hat products and services online. * RED HAT MARKETPLACE Try, buy, sell, and manage certified enterprise software for container-based environments. EVENTS * RED HAT SUMMIT AND ANSIBLEFEST Register for and learn about our annual open source IT industry event. Red Hat Product Errata RHSA-2024:7441 - Security Advisory Issued: 2024-10-01 Updated: 2024-10-01 RHSA-2024:7441 - SECURITY ADVISORY * Overview * Updated Packages SYNOPSIS Important: Red Hat JBoss Enterprise Application Platform 8.0 security update TYPE/SEVERITY Security Advisory: Important RED HAT INSIGHTS PATCH ANALYSIS Identify and remediate systems affected by this advisory. View affected systems TOPIC A security update is now available for Red Hat JBoss Enterprise Application Platform 8.0. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. DESCRIPTION Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly application runtime. This asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 8.0. Security Fix(es): * software.amazon.ion/ion-java: ion-java: Ion Java StackOverflow vulnerability (CVE-2024-21634) * undertow: Improper State Management in Proxy Protocol parsing causes information leakage (CVE-2024-7885) For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section. SOLUTION Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 AFFECTED PRODUCTS * JBoss Enterprise Application Platform 8.0 for RHEL 9 x86_64 * JBoss Enterprise Application Platform 8.0 for RHEL 8 x86_64 FIXES * BZ - 2304311 - CVE-2024-21634 ion-java: ion-java: Ion Java StackOverflow vulnerability * BZ - 2305290 - CVE-2024-7885 undertow: Improper State Management in Proxy Protocol parsing causes information leakage * JBEAP-27711 - (8.0.z) Upgrade amazon-ion from 1.0.2.redhat-00004 to 1.11.9.redhat-00001 * JBEAP-27754 - (8.0.z) Upgrade EAP codebase to 8.0.5.SP1-redhat-SNAPSHOT in EAP 8.0 update 3.1 CVES * CVE-2024-7885 * CVE-2024-21634 REFERENCES * https://access.redhat.com/security/updates/classification/#important * https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/8.0/ Note: More recent versions of these packages may be available. Click a package name for more details. JBOSS ENTERPRISE APPLICATION PLATFORM 8.0 FOR RHEL 9 SRPM eap8-amazon-ion-java-1.11.9-2.redhat_00001.1.el9eap.src.rpm SHA-256: f450431d0d32dcdefcad682597ee33a329a02e888cb30a4b4d712c01bf95878a eap8-eap-product-conf-parent-800.3.1-2.GA_redhat_00002.1.el9eap.src.rpm SHA-256: bebbe60e11f34b2222e693667e03650a682d13c2c195accb3636071a1cffe1ac eap8-undertow-2.3.14-2.SP2_redhat_00001.1.el9eap.src.rpm SHA-256: 87d9ffbccef1901f7dab55b1dcd2a8c8bbb4575c2fd9f67d9fd2f8350063eadb eap8-wildfly-8.0.3-13.GA_redhat_00007.1.el9eap.src.rpm SHA-256: 32c08c54c5d84b1028a479ebc827ec238c11fc43fc2febcd45358c29de085188 x86_64 eap8-amazon-ion-java-1.11.9-2.redhat_00001.1.el9eap.noarch.rpm SHA-256: c580719a7c5ee13bc3f9e51c3e4528eebe30c3a750a0547ae81f112870243967 eap8-eap-product-conf-parent-800.3.1-2.GA_redhat_00002.1.el9eap.noarch.rpm SHA-256: 36b81afb47d0e754f6b5edba260aecc2ca04872c24487abcd1d0f3891f676efd eap8-eap-product-conf-wildfly-ee-feature-pack-800.3.1-2.GA_redhat_00002.1.el9eap.noarch.rpm SHA-256: 56b500b8a66c411fdacf2ba05de3bc52c156e56cc434d6db75eab088f40af1af eap8-undertow-2.3.14-2.SP2_redhat_00001.1.el9eap.noarch.rpm SHA-256: 47633e0f33b26738507a03359d5ec147f8f455d5dd3d5370bb7c076ad10e1f4e eap8-wildfly-8.0.3-13.GA_redhat_00007.1.el9eap.noarch.rpm SHA-256: 79b81eee1c2cea59dcf334f3c11788627b99cc2e70b92ce11613526db0a16fb3 eap8-wildfly-java-jdk11-8.0.3-13.GA_redhat_00007.1.el9eap.noarch.rpm SHA-256: 8d9abe78ec434a6b0356508827235ea13d6d55e739832dc5a7e64568973fc080 eap8-wildfly-java-jdk17-8.0.3-13.GA_redhat_00007.1.el9eap.noarch.rpm SHA-256: 8dc6e50a8f9c8bc5e47ac5276fa485c5c71bd648ac10ab91d39bf384eec5c513 eap8-wildfly-java-jdk21-8.0.3-13.GA_redhat_00007.1.el9eap.noarch.rpm SHA-256: 4698d20a56fe7830130a3c15a41395071c48ed80ec4eeece1c9d3734ca8a86a5 eap8-wildfly-modules-8.0.3-13.GA_redhat_00007.1.el9eap.noarch.rpm SHA-256: d1e7c4cfda8ef0f39f7a54eaae0f45a62ece640a4dc0cee587d568f7f31c3bfb JBOSS ENTERPRISE APPLICATION PLATFORM 8.0 FOR RHEL 8 SRPM eap8-amazon-ion-java-1.11.9-2.redhat_00001.1.el8eap.src.rpm SHA-256: 528fba6eb0fc8e0c2c139c4a69a6176dd367820d626f8c10ae882940691b46fc eap8-eap-product-conf-parent-800.3.1-2.GA_redhat_00002.1.el8eap.src.rpm SHA-256: d87cb3e7839ed596edcdb8e070c24b539eb6f16030e26fe5c5ea65da61ac7880 eap8-undertow-2.3.14-2.SP2_redhat_00001.1.el8eap.src.rpm SHA-256: 551b51b7d7fb58e2cdcac4f9a26ed8f47d299448ecf7ee0c85ea9647692512a3 eap8-wildfly-8.0.3-13.GA_redhat_00007.1.el8eap.src.rpm SHA-256: 9c7bc6f1d91ddf49e6da6e8fc9eaf1308417fce3f4ae49edf29735c12a7320c9 x86_64 eap8-amazon-ion-java-1.11.9-2.redhat_00001.1.el8eap.noarch.rpm SHA-256: c5d05251578a9f44f90e880a2ba9573ec58229d88563d9db12bb5ee2a5bec769 eap8-eap-product-conf-parent-800.3.1-2.GA_redhat_00002.1.el8eap.noarch.rpm SHA-256: 3a161bd130a20b8bc7ea5210bd72df1482ef2473f357a4fc9a4d3d1dbd1736a3 eap8-eap-product-conf-wildfly-ee-feature-pack-800.3.1-2.GA_redhat_00002.1.el8eap.noarch.rpm SHA-256: 2063cc38cdf3bd117fa5ba2b062eaa6380dc5c81ce372581dc8ccd7c6456eab7 eap8-undertow-2.3.14-2.SP2_redhat_00001.1.el8eap.noarch.rpm SHA-256: c75c5848b536e7c1311aca538d9b13713186df56bda3d248f759ef56ea1cf6ad eap8-wildfly-8.0.3-13.GA_redhat_00007.1.el8eap.noarch.rpm SHA-256: 3817b9248e374caa7043b2e76c89f88bd784ab61b47339b00ed362165d338f78 eap8-wildfly-java-jdk11-8.0.3-13.GA_redhat_00007.1.el8eap.noarch.rpm SHA-256: 7a60fe864792973d68ea05c4ed817554d0cd584da07ea0e14aa09dc11e4715b4 eap8-wildfly-java-jdk17-8.0.3-13.GA_redhat_00007.1.el8eap.noarch.rpm SHA-256: 9795d6d54ed596a829b067f5c7d4e8d7d8b9b4b9254d1c28e8db13c64c23444a eap8-wildfly-java-jdk21-8.0.3-13.GA_redhat_00007.1.el8eap.noarch.rpm SHA-256: 0bfa4150d20bbe7ce18afc0a33b2f015889e37c49af3aefe423fac5565e60f64 eap8-wildfly-modules-8.0.3-13.GA_redhat_00007.1.el8eap.noarch.rpm SHA-256: a02be4cd49dacf38e048c89c120682e8ddb1c2667bbbf7373f22752695b734dd The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/. X (formerly Twitter) QUICK LINKS * Downloads * Subscriptions * Support Cases * Customer Service * Product Documentation HELP * Contact Us * Customer Portal FAQ * Log-in Assistance SITE INFO * Trust Red Hat * Browser Support Policy * Accessibility * Awards and Recognition * Colophon RELATED SITES * redhat.com * developers.redhat.com * connect.redhat.com * cloud.redhat.com SYSTEMS STATUS RED HAT LEGAL AND PRIVACY LINKS * About Red Hat * Jobs * Events * Locations * Contact Red Hat * Red Hat Blog * Diversity, equity, and inclusion * Cool Stuff Store * Red Hat Summit © 2024 Red Hat, Inc. RED HAT LEGAL AND PRIVACY LINKS * Privacy statement * Terms of use * All policies and guidelines * Digital accessibility * Cookie-präferenzen