Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2018:2276 - Security Advisory
Issued:
2018-07-26
Updated:
2018-07-26

RHSA-2018:2276 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: Red Hat JBoss Enterprise Application Platform 7.1 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

A security update is now available for Red Hat JBoss Enterprise Application Platform from the Customer Portal.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on Wildfly.

This asynchronous patch is a security update for wildfly-core and apache-cxf packages in Red Hat JBoss Enterprise Application Platform 7.1

Security Fix(es):

  • apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.* (CVE-2018-8039)
  • wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files. (CVE-2018-10862)

Solution

Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.

The JBoss server process must be restarted for the update to take effect.

For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

Affected Products

  • JBoss Enterprise Application Platform 7.1 for RHEL 7 x86_64
  • JBoss Enterprise Application Platform 7.1 for RHEL 6 x86_64
  • JBoss Enterprise Application Platform 7.1 for RHEL 6 i386

Fixes

  • BZ - 1593527 - CVE-2018-10862 wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip)
  • BZ - 1595332 - CVE-2018-8039 apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.*

CVEs

  • CVE-2018-8039
  • CVE-2018-10862

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

JBoss Enterprise Application Platform 7.1 for RHEL 7

SRPM
eap7-apache-cxf-3.1.16-1.redhat_1.1.ep7.el7.src.rpm SHA-256: 18d84740d9950399d1553e096dd376d30fc3711edbe57adcab8ae3dacecaf00b
eap7-wildfly-7.1.3-4.GA_redhat_3.1.ep7.el7.src.rpm SHA-256: 9ef460c5242fc2a433ee5b8db2aaae529428ed3f6cdee225c79cefe3c2052285
eap7-wss4j-2.1.12-1.redhat_1.1.ep7.el7.src.rpm SHA-256: 30426fd26d88c637b52cd8750030b1f7a71517a6abe902b70f549798ae019b37
eap7-xml-security-2.0.10-1.redhat_1.1.ep7.el7.src.rpm SHA-256: 960056bd48d9cc62b9a8e711458a52c666e8ab2d1fb2d96f035e1e7be1c8d0ae
x86_64
eap7-apache-cxf-3.1.16-1.redhat_1.1.ep7.el7.noarch.rpm SHA-256: d78752619aa2710bee5b4a7bb42716a01ac9aa9d09c34dad85af7aadb0e77811
eap7-apache-cxf-rt-3.1.16-1.redhat_1.1.ep7.el7.noarch.rpm SHA-256: 8547f58bbde9d758b362a0f9beb550e765dd1974d2b9b91d285ac2ddbc4745a2
eap7-apache-cxf-services-3.1.16-1.redhat_1.1.ep7.el7.noarch.rpm SHA-256: 95806e164cd382919d92ac594d1d069c5f72c276c4cd7e2f5290bd6f50247669
eap7-apache-cxf-tools-3.1.16-1.redhat_1.1.ep7.el7.noarch.rpm SHA-256: 91708ae06e65081a88c180a9b0a64e299888674f6ec3ab10c37efaa963431aa8
eap7-wildfly-7.1.3-4.GA_redhat_3.1.ep7.el7.noarch.rpm SHA-256: 3f1519533f5e8f59fe9d255fb03889337b551d2d09c2ced397692b4670cb810c
eap7-wildfly-modules-7.1.3-4.GA_redhat_3.1.ep7.el7.noarch.rpm SHA-256: 44bf92a440da8acfd6360878932322956397b52155612cd729ab4a6215387936
eap7-wss4j-2.1.12-1.redhat_1.1.ep7.el7.noarch.rpm SHA-256: 5a78d418c48ee95acd129b6dc6e4cf7140c83e4d2bfd0b322c00bcfb14508dfa
eap7-wss4j-bindings-2.1.12-1.redhat_1.1.ep7.el7.noarch.rpm SHA-256: 1ff5f76c9301266afce5c89d4ab77162cd3f6d03b2ae187beb87e48d6c811b40
eap7-wss4j-policy-2.1.12-1.redhat_1.1.ep7.el7.noarch.rpm SHA-256: 8ad97455dc56ced9585573a82802d8fbc3fb6d3c6a695b6acda01185021ab675
eap7-wss4j-ws-security-common-2.1.12-1.redhat_1.1.ep7.el7.noarch.rpm SHA-256: 6da84d0c30dd78f3f35762fe12061e2dc8a703a19185d4f2011a575dc0fdb19d
eap7-wss4j-ws-security-dom-2.1.12-1.redhat_1.1.ep7.el7.noarch.rpm SHA-256: bf82e78442b809d0f3df60b78ca0e5b44edf98b8f4b5d78122b3599956b5fbc8
eap7-wss4j-ws-security-policy-stax-2.1.12-1.redhat_1.1.ep7.el7.noarch.rpm SHA-256: 8348e673abe4404c5b9087db5b023c9e9c284325c6f232b1d1178b2e6921da4e
eap7-wss4j-ws-security-stax-2.1.12-1.redhat_1.1.ep7.el7.noarch.rpm SHA-256: 68ae28bf15afaa0b61cf982160769790919211c06bdb7414ded3f5518be8505e
eap7-xml-security-2.0.10-1.redhat_1.1.ep7.el7.noarch.rpm SHA-256: 84544b2ec5dc114c14c4f05106a79f74576624fe29b18f109fb13afb81cfa1f0

JBoss Enterprise Application Platform 7.1 for RHEL 6

SRPM
eap7-apache-cxf-3.1.16-1.redhat_1.1.ep7.el6.src.rpm SHA-256: 21cbc04be4f01ebb732b08874ea2d9ce39618dc108f1297a7977743bea32b51e
eap7-wildfly-7.1.3-4.GA_redhat_3.1.ep7.el6.src.rpm SHA-256: 3edfe1057ee7f869381d807f081edff48f621f707d9ea54bd846c19b8082438c
eap7-wss4j-2.1.12-1.redhat_1.1.ep7.el6.src.rpm SHA-256: 5a36d95bf91d0284448781bb063e3dfa20725b9d7e015027e4b02f173a00c53f
eap7-xml-security-2.0.10-1.redhat_1.1.ep7.el6.src.rpm SHA-256: 8c59baabe59ec2b7a303318d43cc48046d79cb19924f2e3ea5a54536f10756d3
x86_64
eap7-apache-cxf-3.1.16-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: bcd7ef170b9ac7044d627d81ea95ec0a5fb4017e67e26fc4d702214f2cfdb409
eap7-apache-cxf-rt-3.1.16-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 8e6726f13e640020719f3559ec9bff1b5f381c1a88e1fda1a6b0c0d347771a2d
eap7-apache-cxf-services-3.1.16-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 72d3d1ee22a0fc9d3f06043bae58ca0ee870d343a5d4bf2e31206ccfb67e99a4
eap7-apache-cxf-tools-3.1.16-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: c833c19446c3b4b3b8663b6d4f9245c3fe0defd2cbffd5172c67a9a3bae08403
eap7-wildfly-7.1.3-4.GA_redhat_3.1.ep7.el6.noarch.rpm SHA-256: 91327d46a813c718bb8a0050d7d64433b91859ba9d80a01e5d7f4133a00edfb3
eap7-wildfly-modules-7.1.3-4.GA_redhat_3.1.ep7.el6.noarch.rpm SHA-256: c2d0b48b8a3bf5bebb6ce0bb1e842c5e36cb08b04a6f4a09c9a98a0288c35d79
eap7-wss4j-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 56a25c889a4aee63fd4d31ace25782b7352b365d3c5bbc0d1ea8a2b480499d47
eap7-wss4j-bindings-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: a68043dc5350e172cbd7bd881986641dbfe4ced5ccfa25c6ced53429f8321ecf
eap7-wss4j-policy-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 1d5ecfe7097abaecab0a2c452390b1381aad1f299e18e7e66e72566b7efd2082
eap7-wss4j-ws-security-common-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 6db1f962e51edabbf3c86ba43e7be88b71fc51220dc7ac5aea9628cdaa8a2602
eap7-wss4j-ws-security-dom-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 66ebaa48b47e441f3d1179307150f2b1f29c1537e6b5a0939ac3aba9f5bd7d02
eap7-wss4j-ws-security-policy-stax-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 687796a5370964f3aa4f69dfbc52f4bf24bc0cfe374134bcf3004623137485f6
eap7-wss4j-ws-security-stax-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 725f1f868198e265ef72357b55ba6bfa5c14cc940e082b34a52759e514051e28
eap7-xml-security-2.0.10-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 11c0663dc9babbb43671d242b198cd3060884b9114c94f2eb15c93a598449b17
i386
eap7-apache-cxf-3.1.16-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: bcd7ef170b9ac7044d627d81ea95ec0a5fb4017e67e26fc4d702214f2cfdb409
eap7-apache-cxf-rt-3.1.16-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 8e6726f13e640020719f3559ec9bff1b5f381c1a88e1fda1a6b0c0d347771a2d
eap7-apache-cxf-services-3.1.16-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 72d3d1ee22a0fc9d3f06043bae58ca0ee870d343a5d4bf2e31206ccfb67e99a4
eap7-apache-cxf-tools-3.1.16-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: c833c19446c3b4b3b8663b6d4f9245c3fe0defd2cbffd5172c67a9a3bae08403
eap7-wildfly-7.1.3-4.GA_redhat_3.1.ep7.el6.noarch.rpm SHA-256: 91327d46a813c718bb8a0050d7d64433b91859ba9d80a01e5d7f4133a00edfb3
eap7-wildfly-modules-7.1.3-4.GA_redhat_3.1.ep7.el6.noarch.rpm SHA-256: c2d0b48b8a3bf5bebb6ce0bb1e842c5e36cb08b04a6f4a09c9a98a0288c35d79
eap7-wss4j-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 56a25c889a4aee63fd4d31ace25782b7352b365d3c5bbc0d1ea8a2b480499d47
eap7-wss4j-bindings-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: a68043dc5350e172cbd7bd881986641dbfe4ced5ccfa25c6ced53429f8321ecf
eap7-wss4j-policy-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 1d5ecfe7097abaecab0a2c452390b1381aad1f299e18e7e66e72566b7efd2082
eap7-wss4j-ws-security-common-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 6db1f962e51edabbf3c86ba43e7be88b71fc51220dc7ac5aea9628cdaa8a2602
eap7-wss4j-ws-security-dom-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 66ebaa48b47e441f3d1179307150f2b1f29c1537e6b5a0939ac3aba9f5bd7d02
eap7-wss4j-ws-security-policy-stax-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 687796a5370964f3aa4f69dfbc52f4bf24bc0cfe374134bcf3004623137485f6
eap7-wss4j-ws-security-stax-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 725f1f868198e265ef72357b55ba6bfa5c14cc940e082b34a52759e514051e28
eap7-xml-security-2.0.10-1.redhat_1.1.ep7.el6.noarch.rpm SHA-256: 11c0663dc9babbb43671d242b198cd3060884b9114c94f2eb15c93a598449b17

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility