-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 7.4 security update
Advisory ID:       RHSA-2023:1185-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:1185
Issue date:        2023-03-09
CVE Names:         CVE-2023-1108 
====================================================================
1. Summary:

A security update is now available for Red Hat JBoss Enterprise Application
Platform 7.4.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss EAP 7.4 for RHEL 7 Server - noarch
Red Hat JBoss EAP 7.4 for RHEL 8 - noarch
Red Hat JBoss EAP 7.4 for RHEL 9 - noarch

3. Description:

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on the WildFly application runtime.

This asynchronous patch is a security update for Red Hat JBoss Enterprise
Application Platform 7.4.

Security Fix(es):

* undertow: Infinite loop in SslConduit during close (CVE-2023-1108)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgements, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2174246 - CVE-2023-1108 Undertow: Infinite loop in SslConduit during close

6. Package List:

Red Hat JBoss EAP 7.4 for RHEL 7 Server:

Source:
eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el7eap.src.rpm
eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el7eap.src.rpm

noarch:
eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el7eap.noarch.rpm
eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el7eap.noarch.rpm
eap7-wildfly-java-jdk11-7.4.9-6.GA_redhat_00004.1.el7eap.noarch.rpm
eap7-wildfly-java-jdk8-7.4.9-6.GA_redhat_00004.1.el7eap.noarch.rpm
eap7-wildfly-javadocs-7.4.9-6.GA_redhat_00004.1.el7eap.noarch.rpm
eap7-wildfly-modules-7.4.9-6.GA_redhat_00004.1.el7eap.noarch.rpm

Red Hat JBoss EAP 7.4 for RHEL 8:

Source:
eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el8eap.src.rpm
eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el8eap.src.rpm

noarch:
eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el8eap.noarch.rpm
eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el8eap.noarch.rpm
eap7-wildfly-javadocs-7.4.9-6.GA_redhat_00004.1.el8eap.noarch.rpm
eap7-wildfly-modules-7.4.9-6.GA_redhat_00004.1.el8eap.noarch.rpm

Red Hat JBoss EAP 7.4 for RHEL 9:

Source:
eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el9eap.src.rpm
eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el9eap.src.rpm

noarch:
eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el9eap.noarch.rpm
eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el9eap.noarch.rpm
eap7-wildfly-javadocs-7.4.9-6.GA_redhat_00004.1.el9eap.noarch.rpm
eap7-wildfly-modules-7.4.9-6.GA_redhat_00004.1.el9eap.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2023-1108
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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I/dI
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-1185:01 Important: Red Hat JBoss Enterprise Application

A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4

Summary

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.
This asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.4.
Security Fix(es):
* undertow: Infinite loop in SslConduit during close (CVE-2023-1108)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2023-1108 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/ https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/

Package List

Red Hat JBoss EAP 7.4 for RHEL 7 Server:
Source: eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el7eap.src.rpm eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el7eap.src.rpm
noarch: eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el7eap.noarch.rpm eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el7eap.noarch.rpm eap7-wildfly-java-jdk11-7.4.9-6.GA_redhat_00004.1.el7eap.noarch.rpm eap7-wildfly-java-jdk8-7.4.9-6.GA_redhat_00004.1.el7eap.noarch.rpm eap7-wildfly-javadocs-7.4.9-6.GA_redhat_00004.1.el7eap.noarch.rpm eap7-wildfly-modules-7.4.9-6.GA_redhat_00004.1.el7eap.noarch.rpm
Red Hat JBoss EAP 7.4 for RHEL 8:
Source: eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el8eap.src.rpm eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el8eap.src.rpm
noarch: eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el8eap.noarch.rpm eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el8eap.noarch.rpm eap7-wildfly-javadocs-7.4.9-6.GA_redhat_00004.1.el8eap.noarch.rpm eap7-wildfly-modules-7.4.9-6.GA_redhat_00004.1.el8eap.noarch.rpm
Red Hat JBoss EAP 7.4 for RHEL 9:
Source: eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el9eap.src.rpm eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el9eap.src.rpm
noarch: eap7-undertow-2.2.22-1.SP3_redhat_00002.1.el9eap.noarch.rpm eap7-wildfly-7.4.9-6.GA_redhat_00004.1.el9eap.noarch.rpm eap7-wildfly-javadocs-7.4.9-6.GA_redhat_00004.1.el9eap.noarch.rpm eap7-wildfly-modules-7.4.9-6.GA_redhat_00004.1.el9eap.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2023:1185-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2023:1185
Issued Date: : 2023-03-09
CVE Names: CVE-2023-1108

Topic

A security update is now available for Red Hat JBoss Enterprise ApplicationPlatform 7.4.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat JBoss EAP 7.4 for RHEL 7 Server - noarch

Red Hat JBoss EAP 7.4 for RHEL 8 - noarch

Red Hat JBoss EAP 7.4 for RHEL 9 - noarch


Bugs Fixed

2174246 - CVE-2023-1108 Undertow: Infinite loop in SslConduit during close


Related News