-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat JBoss Enterprise Application Platform 7.4 security update Advisory ID: RHSA-2023:1185-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2023:1185 Issue date: 2023-03-09 CVE Names: CVE-2023-1108 ==================================================================== 1. Summary: A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss EAP 7.4 for RHEL 7 Server - noarch Red Hat JBoss EAP 7.4 for RHEL 8 - noarch Red Hat JBoss EAP 7.4 for RHEL 9 - noarch 3. Description: Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.4. Security Fix(es): * undertow: Infinite loop in SslConduit during close (CVE-2023-1108) For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 2174246 - CVE-2023-1108 Undertow: Infinite loop in SslConduit during close 6. Package List: Red Hat JBoss EAP 7.4 for RHEL 7 Server: Source: eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el7eap.src.rpm eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el7eap.src.rpm noarch: eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el7eap.noarch.rpm eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el7eap.noarch.rpm eap7-wildfly-java-jdk11-7.4.9-6.GA_redhat_00004.1.el7eap.noarch.rpm eap7-wildfly-java-jdk8-7.4.9-6.GA_redhat_00004.1.el7eap.noarch.rpm eap7-wildfly-javadocs-7.4.9-6.GA_redhat_00004.1.el7eap.noarch.rpm eap7-wildfly-modules-7.4.9-6.GA_redhat_00004.1.el7eap.noarch.rpm Red Hat JBoss EAP 7.4 for RHEL 8: Source: eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el8eap.src.rpm eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el8eap.src.rpm noarch: eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el8eap.noarch.rpm eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el8eap.noarch.rpm eap7-wildfly-javadocs-7.4.9-6.GA_redhat_00004.1.el8eap.noarch.rpm eap7-wildfly-modules-7.4.9-6.GA_redhat_00004.1.el8eap.noarch.rpm Red Hat JBoss EAP 7.4 for RHEL 9: Source: eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el9eap.src.rpm eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el9eap.src.rpm noarch: eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el9eap.noarch.rpm eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el9eap.noarch.rpm eap7-wildfly-javadocs-7.4.9-6.GA_redhat_00004.1.el9eap.noarch.rpm eap7-wildfly-modules-7.4.9-6.GA_redhat_00004.1.el9eap.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2023-1108 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/ https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBZApNXtzjgjWX9erEAQglug//bHLbuq0YicJor7WmFSWrPeZw2Ec7teRr 8BfgrLnd91klImfyVAOxPRox5d3LfFraB120pVUDgkTe9OoWqwcNRpjCVwUFYpwf DRyiR0OR45bhEYqBC3TpZhsxYeNBNU2cbS5C3oO1cleydv9jtOPK9dZtAVXVZ1By wMv26yXlA62xfnweDtadprfcKBhkCwQJGKmqnZNL09cpoihLSs+4DB9WuiK+aK+D rmNlxtSFjIpvpiaaku8Px8VgNsSVN33A9KxGtD+YpBz59XVnvRa6C1fjIltf583U pSRn4jHWR6M8Z2E8jAxU7HQMqgDJ4ywAiLQMBjcxe9ryFad0E4SrZFzuVHJUFhD8 0Fyzx3x5S0LwAMK+KxKrcQrw7rJ1PyLAnQHDHAMt3z3EkpYBhgTwQs/GV9FK4eKn XnZM9LrW0fQPIwbnz5NXtDbC4SLZiNfvt5mb/1Ubsp6rS8yyz9xXGWsrV8w4x4Sr NDuyTiOLsPqlsfzOQn/Mxl1abpTP+HOm+XnmWSCaveA5xvZDFvuMeJ2VWE0vwfj7 alms9t5MFcG2Ogbu4a/Vq+jRy6JH3in17SI9V5aGlb+N2WlreVrpGC2RwOnWMP6w ym3ti55YYpKa44rQ4AiYTavB32zrFiwzpyNdkQT0jFgYRUjI/ftwpYIJiw28+DkO Y4OMbcHnS9w=I/dI -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce