{"id":"RHSA-2024:7441","summary":"Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update","modified":"2026-04-02T10:10:41Z","published":"2024-10-01T11:00:41Z","upstream":["CVE-2024-21634","CVE-2024-7885"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:7441"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/8.0/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2304311"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2305290"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-27711"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-27754"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_7441.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-7885"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-7885"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7885"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-21634"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-21634"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-21634"},{"type":"ARTICLE","url":"https://github.com/amazon-ion/ion-java/security/advisories/GHSA-264p-99wq-f4j6"}],"affected":[{"package":{"name":"eap8-amazon-ion-java","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-amazon-ion-java"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.11.9-2.redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}},{"package":{"name":"eap8-eap-product-conf-parent","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-eap-product-conf-parent"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:800.3.1-2.GA_redhat_00002.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}},{"package":{"name":"eap8-eap-product-conf-wildfly-ee-feature-pack","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-eap-product-conf-wildfly-ee-feature-pack"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:800.3.1-2.GA_redhat_00002.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}},{"package":{"name":"eap8-undertow","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-undertow"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.3.14-2.SP2_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}},{"package":{"name":"eap8-wildfly","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-wildfly"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.3-13.GA_redhat_00007.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}},{"package":{"name":"eap8-wildfly-java-jdk11","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-wildfly-java-jdk11"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.3-13.GA_redhat_00007.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}},{"package":{"name":"eap8-wildfly-java-jdk17","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-wildfly-java-jdk17"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.3-13.GA_redhat_00007.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}},{"package":{"name":"eap8-wildfly-java-jdk21","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-wildfly-java-jdk21"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.3-13.GA_redhat_00007.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}},{"package":{"name":"eap8-wildfly-modules","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-wildfly-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.3-13.GA_redhat_00007.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}},{"package":{"name":"eap8-amazon-ion-java","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-amazon-ion-java"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.11.9-2.redhat_00001.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}},{"package":{"name":"eap8-eap-product-conf-parent","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-eap-product-conf-parent"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:800.3.1-2.GA_redhat_00002.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}},{"package":{"name":"eap8-eap-product-conf-wildfly-ee-feature-pack","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-eap-product-conf-wildfly-ee-feature-pack"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:800.3.1-2.GA_redhat_00002.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}},{"package":{"name":"eap8-undertow","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-undertow"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.3.14-2.SP2_redhat_00001.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}},{"package":{"name":"eap8-wildfly","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-wildfly"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.3-13.GA_redhat_00007.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}},{"package":{"name":"eap8-wildfly-java-jdk11","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-wildfly-java-jdk11"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.3-13.GA_redhat_00007.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}},{"package":{"name":"eap8-wildfly-java-jdk17","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-wildfly-java-jdk17"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.3-13.GA_redhat_00007.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}},{"package":{"name":"eap8-wildfly-java-jdk21","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-wildfly-java-jdk21"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.3-13.GA_redhat_00007.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}},{"package":{"name":"eap8-wildfly-modules","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-wildfly-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.3-13.GA_redhat_00007.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:7441.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}