Linux Security
    Linux Security
    Linux Security

    RedHat: RHSA-2020-4257:01 Important: Red Hat JBoss Enterprise Application

    Date
    37
    Posted By
    An update is now available for Red Hat JBoss Enterprise Application Platform 7.3. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 7.3 security update
    Advisory ID:       RHSA-2020:4257-01
    Product:           Red Hat JBoss Enterprise Application Platform
    Advisory URL:      https://access.redhat.com/errata/RHSA-2020:4257
    Issue date:        2020-10-14
    CVE Names:         CVE-2020-25644 
    =====================================================================
    
    1. Summary:
    
    An update is now available for Red Hat JBoss Enterprise Application
    Platform 7.3.
    
    Red Hat Product Security has rated this update as having a security impact
    of Important. A Common Vulnerability Scoring System (CVSS) base score,
    which gives a detailed severity rating, is available for each vulnerability
    from the CVE link(s) in the References section.
    
    2. Description:
    
    Red Hat JBoss Enterprise Application Platform 7.3 is a platform for Java
    applications based on the WildFly application runtime.
    
    This asynchronous patch is a security update for Red Hat JBoss Enterprise
    Application Platform 7.3.
    
    Security Fix(es):
    
    * wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL
    (CVE-2020-25644)
    
    For more details about the security issue(s), including the impact, a CVSS
    score, and other related information, see the CVE page(s) listed in the
    References section.
    
    3. Solution:
    
    Before applying this update, back up your existing Red Hat JBoss Enterprise
    Application Platform installation and deployed applications.
    
    The References section of this erratum contains a download link (you must
    log in to download the update).
    
    You must restart the JBoss server process for the update to take effect.
    
    4. Bugs fixed (https://bugzilla.redhat.com/):
    
    1885485 - CVE-2020-25644 wildfly-openssl: memory leak per HTTP session creation in WildFly OpenSSL
    
    5. References:
    
    https://access.redhat.com/security/cve/CVE-2020-25644
    https://access.redhat.com/security/updates/classification/#important
    https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches&product=appplatform&version=7.3
    https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/
    https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/
    
    6. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2020 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBX4ccltzjgjWX9erEAQgXRQ/+I5/0rpM64HSQBmhvfQFuptKd+oQrbGGz
    pWb9j7pihXJhCfFCZA7bcr/93Fx/LL3u9fDXlIeM5bMHkwk2itUDwMoRiqL6cIpq
    ndqCe7RdeBbRwF7uxJQKi8K0AvOEyLkhcYWQa9PNOCUBVIZaC5D1PvCkcA5QspG+
    pgYlMWQkFxfyDQXfDfekYumgO+nM9nLuLXS7Qe5P8VIpaL1slQDyVK9hKnt1JLdn
    eNqKYLWOsx80fjC15QDmoYQHaEOMlOYqNSr7y7Mc3TWT9qX6aS6hbictPOJs5tMj
    exFj4FP1ASksKZHQeJ5prIkOn88U4AmVXYfJAf3ciAnX6DflHiTvAaESJ+7/Pbvi
    kpLSZT96eNPe/1jePfC0V0NtQ2yVMa1Y2eDGqnyiRBAjA2RwhxxNyDo9+CvFoEDF
    HiiRGZqAtpsMRE+yhtf/Wh7vs+P9PYhH7wG31jRAp6cXJKMgYLegHyZ7TbX+9tDv
    1skvIv4GullW3Ovh6rl9sQVsrVpOQMaNR+qIedFTXV0NnAum4YLd5eom0K8+MM9x
    8B8KyDt5iaexBWRhWXN78LuFEWuy19kwcb7g43HNAi/Bxh4Ys938VndccbH5XQSy
    pCO3S7/dUkliSmoITNe9kw06kWQ0w3Jqb/tTgh9jXRXh4JxjG457bleRLu+MFq+1
    Sp1YZnhEGH0=
    =HV2k
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    

    Advisories

    LinuxSecurity Poll

    Which statement best describes how you feel about the recent Linux 5.9 release?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/40-what-change-are-you-most-excited-about-in-linux-5-9?task=poll.vote&format=json
    40
    radio
    [{"id":"140","title":"Not a game-changer for me.","votes":"1","type":"x","order":"1","pct":16.67,"resources":[]},{"id":"141","title":"I'm happy with the performance improvements it offers.","votes":"5","type":"x","order":"2","pct":83.33,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.