access.redhat.com Open in urlscan Pro
2a02:26f0:3500:18::1724:a29e  Public Scan

URL: https://access.redhat.com/errata/RHSA-2024:7441
Submission: On October 09 via api from BE — Scanned from DE

Form analysis 1 forms found in the DOM

Name: topSearchFormGET /search/browse/search/

<form class="ng-pristine ng-valid topSearchForm" id="topSearchForm" name="topSearchForm" action="/search/browse/search/" method="get" enctype="application/x-www-form-urlencoded">
  <cp-search-autocomplete class="push-bottom PFElement" path="/webassets/avalon/j/data.json" num-items="5" placeholder="Enter your search term" pfelement="" type="container"></cp-search-autocomplete>
  <div> Or <a href="/support/cases/#/troubleshoot">troubleshoot an issue</a>. </div>
</form>

Text Content

Note: Our personalized web services require that your browser be enabled for
JavaScript and cookies
Skip to navigation Skip to main content


UTILITIES

 * Subscriptions
 * Downloads
 * Red Hat Console
 * Get Support


 * Subscriptions
 * Downloads
 * Red Hat Console
 * Get Support
 * Products
   
   
   TOP PRODUCTS
   
    * Red Hat Enterprise Linux
    * Red Hat OpenShift
    * Red Hat Ansible Automation Platform
   
   All Products
   
   
   DOWNLOADS AND CONTAINERS
   
    * Downloads
    * Packages
    * Containers
   
   
   TOP RESOURCES
   
    * Documentation
    * Product Life Cycles
    * Product Compliance
    * Errata

 * Knowledge
   
   
   RED HAT KNOWLEDGE CENTER
   
    * Knowledgebase Solutions
    * Knowledgebase Articles
    * Customer Portal Labs
    * Errata
   
   
   TOP PRODUCT DOCS
   
    * Red Hat Enterprise Linux
    * Red Hat OpenShift
    * Red Hat Ansible Automation Platform
   
   All Product Docs
   
   
   TRAINING AND CERTIFICATION
   
    * About
    * Course Index
    * Certification Index
    * Skill Assessment

 * Security
   
   
   RED HAT PRODUCT SECURITY CENTER
   
    * Security Updates
    * Security Advisories
    * Red Hat CVE Database
    * Errata
   
   
   REFERENCES
   
    * Security Bulletins
    * Security Measurement
    * Severity Ratings
    * Security Data
   
   
   TOP RESOURCES
   
    * Security Labs
    * Backporting Policies
    * Security Blog

 * Support
   
   
   RED HAT SUPPORT
   
    * Support Cases
    * Troubleshoot
    * Get Support
    * Contact Red Hat Support
   
   
   RED HAT COMMUNITY SUPPORT
   
    * Customer Portal Community
    * Community Discussions
    * Red Hat Accelerator Program
      
   
   
   TOP RESOURCES
   
    * Product Life Cycles
    * Customer Portal Labs
    * Red Hat JBoss Supported Configurations
    * Red Hat Insights

Or troubleshoot an issue.
English


SELECT YOUR LANGUAGE

 * English
 * Français
 * 한국어
 * 日本語
 * 中文 (中国)

Infrastructure and Management
 * Red Hat Enterprise Linux
 * Red Hat Satellite
 * Red Hat Subscription Management
 * Red Hat Insights
 * Red Hat Ansible Automation Platform

Cloud Computing
 * Red Hat OpenShift
 * Red Hat OpenStack Platform
 * Red Hat OpenShift
 * Red Hat OpenShift AI
 * Red Hat OpenShift Dedicated
 * Red Hat Advanced Cluster Security for Kubernetes
 * Red Hat Advanced Cluster Management for Kubernetes
 * Red Hat Quay
 * Red Hat OpenShift Dev Spaces
 * Red Hat OpenShift Service on AWS

Storage
 * Red Hat Gluster Storage
 * Red Hat Hyperconverged Infrastructure
 * Red Hat Ceph Storage
 * Red Hat OpenShift Data Foundation

Runtimes
 * Red Hat Runtimes
 * Red Hat JBoss Enterprise Application Platform
 * Red Hat Data Grid
 * Red Hat JBoss Web Server
 * Red Hat build of Keycloak
 * Red Hat support for Spring Boot
 * Red Hat build of Node.js
 * Red Hat build of Quarkus

Integration and Automation
 * Red Hat Application Foundations
 * Red Hat Fuse
 * Red Hat AMQ
 * Red Hat 3scale API Management

All Products
All Red Hat
Back to menu


QUICK LINKS: REDHAT.COM, CUSTOMER PORTAL, RED HAT'S DEVELOPER SITE, RED HAT'S
PARTNER SITE.

 * You are here
   
   
   
   
   RED HAT
   
   Learn about our open source products, services, and company.

 * You are here
   
   
   
   
   RED HAT CUSTOMER PORTAL
   
   Get product support and knowledge from the open source experts.

 * You are here
   
   
   
   
   RED HAT DEVELOPER
   
   Read developer tutorials and download Red Hat software for cloud application
   development.

 * You are here
   
   
   
   
   RED HAT PARTNER CONNECT
   
   Get training, subscriptions, certifications, and more for partners to build,
   sell, and support customer solutions.


PRODUCTS & TOOLS


 * ANSIBLE.COM
   
   Learn about and try our IT automation product.


 * RED HAT ECOSYSTEM CATALOG
   
   Find hardware, software, and cloud providers―and download container
   images―certified to perform with Red Hat technologies.


TRY, BUY, & SELL


 * RED HAT HYBRID CLOUD CONSOLE
   
   Access technical how-tos, tutorials, and learning paths focused on Red Hat’s
   hybrid cloud managed services.


 * RED HAT STORE
   
   Buy select Red Hat products and services online.


 * RED HAT MARKETPLACE
   
   Try, buy, sell, and manage certified enterprise software for container-based
   environments.


EVENTS


 * RED HAT SUMMIT AND ANSIBLEFEST
   
   Register for and learn about our annual open source IT industry event.



Red Hat Product Errata RHSA-2024:7441 - Security Advisory
Issued: 2024-10-01 Updated: 2024-10-01


RHSA-2024:7441 - SECURITY ADVISORY

 * Overview
 * Updated Packages


SYNOPSIS

Important: Red Hat JBoss Enterprise Application Platform 8.0 security update


TYPE/SEVERITY

Security Advisory: Important


RED HAT INSIGHTS PATCH ANALYSIS

Identify and remediate systems affected by this advisory.

View affected systems


TOPIC

A security update is now available for Red Hat JBoss Enterprise Application
Platform 8.0. Red Hat Product Security has rated this update as having a
security impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.


DESCRIPTION

Red Hat JBoss Enterprise Application Platform 8 is a platform for Java
applications based on the WildFly application runtime.


This asynchronous patch is a security update for Red Hat JBoss Enterprise
Application Platform 8.0.


Security Fix(es):


 * software.amazon.ion/ion-java: ion-java: Ion Java StackOverflow vulnerability
   (CVE-2024-21634)
 * undertow: Improper State Management in Proxy Protocol parsing causes
   information leakage (CVE-2024-7885)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgements, and other related information, refer to the CVE page(s)
listed in the References section.


SOLUTION

Before applying the update, make sure all previously released errata relevant to
your system have been applied. Also, back up your existing installation,
including all applications, configuration files, databases and database
settings. For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258


AFFECTED PRODUCTS

 * JBoss Enterprise Application Platform 8.0 for RHEL 9 x86_64
 * JBoss Enterprise Application Platform 8.0 for RHEL 8 x86_64


FIXES

 * BZ - 2304311 - CVE-2024-21634 ion-java: ion-java: Ion Java StackOverflow
   vulnerability
 * BZ - 2305290 - CVE-2024-7885 undertow: Improper State Management in Proxy
   Protocol parsing causes information leakage
 * JBEAP-27711 - (8.0.z) Upgrade amazon-ion from 1.0.2.redhat-00004 to
   1.11.9.redhat-00001
 * JBEAP-27754 - (8.0.z) Upgrade EAP codebase to 8.0.5.SP1-redhat-SNAPSHOT in
   EAP 8.0 update 3.1


CVES

 * CVE-2024-7885
 * CVE-2024-21634


REFERENCES

 * https://access.redhat.com/security/updates/classification/#important
 * https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/8.0/

Note: More recent versions of these packages may be available. Click a package
name for more details.


JBOSS ENTERPRISE APPLICATION PLATFORM 8.0 FOR RHEL 9

SRPM eap8-amazon-ion-java-1.11.9-2.redhat_00001.1.el9eap.src.rpm SHA-256:
f450431d0d32dcdefcad682597ee33a329a02e888cb30a4b4d712c01bf95878a
eap8-eap-product-conf-parent-800.3.1-2.GA_redhat_00002.1.el9eap.src.rpm SHA-256:
bebbe60e11f34b2222e693667e03650a682d13c2c195accb3636071a1cffe1ac
eap8-undertow-2.3.14-2.SP2_redhat_00001.1.el9eap.src.rpm SHA-256:
87d9ffbccef1901f7dab55b1dcd2a8c8bbb4575c2fd9f67d9fd2f8350063eadb
eap8-wildfly-8.0.3-13.GA_redhat_00007.1.el9eap.src.rpm SHA-256:
32c08c54c5d84b1028a479ebc827ec238c11fc43fc2febcd45358c29de085188 x86_64
eap8-amazon-ion-java-1.11.9-2.redhat_00001.1.el9eap.noarch.rpm SHA-256:
c580719a7c5ee13bc3f9e51c3e4528eebe30c3a750a0547ae81f112870243967
eap8-eap-product-conf-parent-800.3.1-2.GA_redhat_00002.1.el9eap.noarch.rpm
SHA-256: 36b81afb47d0e754f6b5edba260aecc2ca04872c24487abcd1d0f3891f676efd
eap8-eap-product-conf-wildfly-ee-feature-pack-800.3.1-2.GA_redhat_00002.1.el9eap.noarch.rpm
SHA-256: 56b500b8a66c411fdacf2ba05de3bc52c156e56cc434d6db75eab088f40af1af
eap8-undertow-2.3.14-2.SP2_redhat_00001.1.el9eap.noarch.rpm SHA-256:
47633e0f33b26738507a03359d5ec147f8f455d5dd3d5370bb7c076ad10e1f4e
eap8-wildfly-8.0.3-13.GA_redhat_00007.1.el9eap.noarch.rpm SHA-256:
79b81eee1c2cea59dcf334f3c11788627b99cc2e70b92ce11613526db0a16fb3
eap8-wildfly-java-jdk11-8.0.3-13.GA_redhat_00007.1.el9eap.noarch.rpm SHA-256:
8d9abe78ec434a6b0356508827235ea13d6d55e739832dc5a7e64568973fc080
eap8-wildfly-java-jdk17-8.0.3-13.GA_redhat_00007.1.el9eap.noarch.rpm SHA-256:
8dc6e50a8f9c8bc5e47ac5276fa485c5c71bd648ac10ab91d39bf384eec5c513
eap8-wildfly-java-jdk21-8.0.3-13.GA_redhat_00007.1.el9eap.noarch.rpm SHA-256:
4698d20a56fe7830130a3c15a41395071c48ed80ec4eeece1c9d3734ca8a86a5
eap8-wildfly-modules-8.0.3-13.GA_redhat_00007.1.el9eap.noarch.rpm SHA-256:
d1e7c4cfda8ef0f39f7a54eaae0f45a62ece640a4dc0cee587d568f7f31c3bfb


JBOSS ENTERPRISE APPLICATION PLATFORM 8.0 FOR RHEL 8

SRPM eap8-amazon-ion-java-1.11.9-2.redhat_00001.1.el8eap.src.rpm SHA-256:
528fba6eb0fc8e0c2c139c4a69a6176dd367820d626f8c10ae882940691b46fc
eap8-eap-product-conf-parent-800.3.1-2.GA_redhat_00002.1.el8eap.src.rpm SHA-256:
d87cb3e7839ed596edcdb8e070c24b539eb6f16030e26fe5c5ea65da61ac7880
eap8-undertow-2.3.14-2.SP2_redhat_00001.1.el8eap.src.rpm SHA-256:
551b51b7d7fb58e2cdcac4f9a26ed8f47d299448ecf7ee0c85ea9647692512a3
eap8-wildfly-8.0.3-13.GA_redhat_00007.1.el8eap.src.rpm SHA-256:
9c7bc6f1d91ddf49e6da6e8fc9eaf1308417fce3f4ae49edf29735c12a7320c9 x86_64
eap8-amazon-ion-java-1.11.9-2.redhat_00001.1.el8eap.noarch.rpm SHA-256:
c5d05251578a9f44f90e880a2ba9573ec58229d88563d9db12bb5ee2a5bec769
eap8-eap-product-conf-parent-800.3.1-2.GA_redhat_00002.1.el8eap.noarch.rpm
SHA-256: 3a161bd130a20b8bc7ea5210bd72df1482ef2473f357a4fc9a4d3d1dbd1736a3
eap8-eap-product-conf-wildfly-ee-feature-pack-800.3.1-2.GA_redhat_00002.1.el8eap.noarch.rpm
SHA-256: 2063cc38cdf3bd117fa5ba2b062eaa6380dc5c81ce372581dc8ccd7c6456eab7
eap8-undertow-2.3.14-2.SP2_redhat_00001.1.el8eap.noarch.rpm SHA-256:
c75c5848b536e7c1311aca538d9b13713186df56bda3d248f759ef56ea1cf6ad
eap8-wildfly-8.0.3-13.GA_redhat_00007.1.el8eap.noarch.rpm SHA-256:
3817b9248e374caa7043b2e76c89f88bd784ab61b47339b00ed362165d338f78
eap8-wildfly-java-jdk11-8.0.3-13.GA_redhat_00007.1.el8eap.noarch.rpm SHA-256:
7a60fe864792973d68ea05c4ed817554d0cd584da07ea0e14aa09dc11e4715b4
eap8-wildfly-java-jdk17-8.0.3-13.GA_redhat_00007.1.el8eap.noarch.rpm SHA-256:
9795d6d54ed596a829b067f5c7d4e8d7d8b9b4b9254d1c28e8db13c64c23444a
eap8-wildfly-java-jdk21-8.0.3-13.GA_redhat_00007.1.el8eap.noarch.rpm SHA-256:
0bfa4150d20bbe7ce18afc0a33b2f015889e37c49af3aefe423fac5565e60f64
eap8-wildfly-modules-8.0.3-13.GA_redhat_00007.1.el8eap.noarch.rpm SHA-256:
a02be4cd49dacf38e048c89c120682e8ddb1c2667bbbf7373f22752695b734dd

The Red Hat security contact is secalert@redhat.com. More contact details at
https://access.redhat.com/security/team/contact/.


X (formerly Twitter)


QUICK LINKS

 * Downloads
 * Subscriptions
 * Support Cases
 * Customer Service
 * Product Documentation


HELP

 * Contact Us
 * Customer Portal FAQ
 * Log-in Assistance


SITE INFO

 * Trust Red Hat
 * Browser Support Policy
 * Accessibility
 * Awards and Recognition
 * Colophon


RELATED SITES

 * redhat.com
 * developers.redhat.com
 * connect.redhat.com
 * cloud.redhat.com


SYSTEMS STATUS




RED HAT LEGAL AND PRIVACY LINKS

 * About Red Hat
 * Jobs
 * Events
 * Locations
 * Contact Red Hat
 * Red Hat Blog
 * Diversity, equity, and inclusion
 * Cool Stuff Store
 * Red Hat Summit

© 2024 Red Hat, Inc.


RED HAT LEGAL AND PRIVACY LINKS

 * Privacy statement
 * Terms of use
 * All policies and guidelines
 * Digital accessibility
   
   
 * Cookie-präferenzen