-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 7.3 security update
Advisory ID:       RHSA-2020:4257-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:4257
Issue date:        2020-10-14
CVE Names:         CVE-2020-25644 
====================================================================
1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 7.3.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Enterprise Application Platform 7.3 is a platform for Java
applications based on the WildFly application runtime.

This asynchronous patch is a security update for Red Hat JBoss Enterprise
Application Platform 7.3.

Security Fix(es):

* wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL
(CVE-2020-25644)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, see the CVE page(s) listed in the
References section.

3. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

The References section of this erratum contains a download link (you must
log in to download the update).

You must restart the JBoss server process for the update to take effect.

4. Bugs fixed (https://bugzilla.redhat.com/):

1885485 - CVE-2020-25644 wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL

5. References:

https://access.redhat.com/security/cve/CVE-2020-25644
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches&product=appplatform&version=7.3
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBX4ccltzjgjWX9erEAQgXRQ/+I5/0rpM64HSQBmhvfQFuptKd+oQrbGGz
pWb9j7pihXJhCfFCZA7bcr/93Fx/LL3u9fDXlIeM5bMHkwk2itUDwMoRiqL6cIpq
ndqCe7RdeBbRwF7uxJQKi8K0AvOEyLkhcYWQa9PNOCUBVIZaC5D1PvCkcA5QspG+
pgYlMWQkFxfyDQXfDfekYumgO+nM9nLuLXS7Qe5P8VIpaL1slQDyVK9hKnt1JLdn
eNqKYLWOsx80fjC15QDmoYQHaEOMlOYqNSr7y7Mc3TWT9qX6aS6hbictPOJs5tMj
exFj4FP1ASksKZHQeJ5prIkOn88U4AmVXYfJAf3ciAnX6DflHiTvAaESJ+7/Pbvi
kpLSZT96eNPe/1jePfC0V0NtQ2yVMa1Y2eDGqnyiRBAjA2RwhxxNyDo9+CvFoEDF
HiiRGZqAtpsMRE+yhtf/Wh7vs+P9PYhH7wG31jRAp6cXJKMgYLegHyZ7TbX+9tDv
1skvIv4GullW3Ovh6rl9sQVsrVpOQMaNR+qIedFTXV0NnAum4YLd5eom0K8+MM9x
8B8KyDt5iaexBWRhWXN78LuFEWuy19kwcb7g43HNAi/Bxh4Ys938VndccbH5XQSy
pCO3S7/dUkliSmoITNe9kw06kWQ0w3Jqb/tTgh9jXRXh4JxjG457bleRLu+MFq+1
Sp1YZnhEGH0=HV2k
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-4257:01 Important: Red Hat JBoss Enterprise Application

An update is now available for Red Hat JBoss Enterprise Application Platform 7.3

Summary

Red Hat JBoss Enterprise Application Platform 7.3 is a platform for Java applications based on the WildFly application runtime.
This asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.3.
Security Fix(es):
* wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL (CVE-2020-25644)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.



Summary


Solution

Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.
The References section of this erratum contains a download link (you must log in to download the update).
You must restart the JBoss server process for the update to take effect.

References

https://access.redhat.com/security/cve/CVE-2020-25644 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches&product=appplatform&version=7.3 https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/ https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/

Package List


Severity
Advisory ID: RHSA-2020:4257-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4257
Issued Date: : 2020-10-14
CVE Names: CVE-2020-25644

Topic

An update is now available for Red Hat JBoss Enterprise ApplicationPlatform 7.3.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

1885485 - CVE-2020-25644 wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL


Related News