- Issued:
- 2021-09-23
- Updated:
- 2021-09-23
RHSA-2021:3658 - Security Advisory
Synopsis
Important: Red Hat JBoss Enterprise Application Platform 7.4.1 security update on RHEL 8
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.
This release of Red Hat JBoss Enterprise Application Platform 7.4.1 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.0 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.1 Release Notes for information about the most significant bug fixes and enhancements included in this release.
Security Fix(es):
- velocity: arbitrary code execution when attacker is able to modify templates (CVE-2020-13936)
- undertow: buffer leak on incoming websocket PONG message may lead to DoS (CVE-2021-3690)
- undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS (CVE-2021-3597)
- wildfly-elytron: possible timing attack in ScramServer (CVE-2021-3642)
- netty: possible request smuggling in HTTP/2 due missing validation (CVE-2021-21295)
- netty: Request smuggling via content-length header (CVE-2021-21409)
- jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate (CVE-2021-28170)
- apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 (CVE-2021-29425)
- wildfly: XSS via admin console when creating roles in domain mode (CVE-2021-3536)
- wildfly-core: Invalid Sensitivity Classification of Vault Expression (CVE-2021-3644)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
Before applying this update, ensure all previously released errata relevant to your system have been applied.
For details about how to apply this update, see:
Affected Products
- JBoss Enterprise Application Platform 7.4 for RHEL 8 x86_64
Fixes
- BZ - 1937364 - CVE-2021-21295 netty: possible request smuggling in HTTP/2 due missing validation
- BZ - 1937440 - CVE-2020-13936 velocity: arbitrary code execution when attacker is able to modify templates
- BZ - 1944888 - CVE-2021-21409 netty: Request smuggling via content-length header
- BZ - 1948001 - CVE-2021-3536 wildfly: XSS via admin console when creating roles in domain mode
- BZ - 1948752 - CVE-2021-29425 apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6
- BZ - 1965497 - CVE-2021-28170 jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate
- BZ - 1970930 - CVE-2021-3597 undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS
- BZ - 1976052 - CVE-2021-3644 wildfly-core: Invalid Sensitivity Classification of Vault Expression
- BZ - 1981407 - CVE-2021-3642 wildfly-elytron: possible timing attack in ScramServer
- BZ - 1991299 - CVE-2021-3690 undertow: buffer leak on incoming websocket PONG message may lead to DoS
- JBEAP-18402 - Tracker bug for the EAP 7.4.1 release for RHEL-8
- JBEAP-21231 - (7.4.x) Upgrade jgroups-kubernetes to 1.0.16.Final
- JBEAP-21257 - (7.4.z) Upgrade Infinispan from 11.0.9.Final to 11.0.11.Final
- JBEAP-21258 - (7.4.z) ISPN-12807 - Simple cache does not update eviction statistics
- JBEAP-21261 - (7.4.z) Upgrade to wildfly-http-client to 1.1.7.Final
- JBEAP-21263 - [GSS](7.4.z) Upgrade yasson from 1.0.5 to 1.0.9
- JBEAP-21270 - [GSS] (7.4.z) Upgrade undertow from 2.2.5.Final to 2.2.8.SP1
- JBEAP-21276 - [GSS](7.4.z) Non Transactional Cache needs to be invalidated after commit on JPQL update/delete operation
- JBEAP-21277 - [GSS](7.4.z) Upgrade Hibernate ORM from 5.3.20.Final-redhat-00001 to 5.3.20.SP1-redhat-00001
- JBEAP-21281 - (7.4.z) Upgrade xalan from 2.7.1.redhat-12 to 2.7.1.redhat-13
- JBEAP-21300 - (7.4.x) Upgrade velocity from 2.2.0.redhat-00001 to 2.3.0.redhat-00001
- JBEAP-21309 - (7.4.z) Upgrade artemis-wildfly-integration from 1.0.2 to 1.0.4
- JBEAP-21313 - [GSS](7.4.z) Upgrade Ironjacamar from 1.4.27.Final to 1.4.33.Final
- JBEAP-21472 - (7.4.z) Upgrade Elytron from 1.15.3.Final-redhat-00001 to 1.15.5.Final-redhat-00001
- JBEAP-21569 - [GSS](7.4.z) Upgrade HAL from 3.3.2.Final-redhat-00001 to 3.3.7.Final-redhat-00001
- JBEAP-21777 - (7.4.z) Upgrade jberet from 1.3.7.Final-redhat-00001 to 1.3.8.Final-redhat-00001
- JBEAP-21781 - [GSS](7.4.z) WFCORE-5185 - Update ProviderDefinition to use optimised service loading API
- JBEAP-21818 - (7.4.z) Upgrade elytron-web from 1.6.2.Final-redhat-00001 to 1.9.1.Final
- JBEAP-21961 - (7.4.z) Upgrade remoting from 5.0.20.SP1-redhat-00001 to 5.0.23.Final-redhat-00001
- JBEAP-21978 - (7.4.z) Upgrade WildFly Core from 15.0.2.Final-redhat-00001 to 15.0.3.Final-redhat-00001
- JBEAP-22009 - [GSS](7.4.z) HAL-1753 - The Locations table is not updated after changing the profile in breadcrumb navigation
- JBEAP-22084 - [GSS](7.4.z) Upgrade PicketBox from 5.0.3.Final-redhat-00007 to 5.0.3.Final-redhat-00008
- JBEAP-22088 - (7.4.z) Upgrade wildfly-transaction-client from 1.1.13.Final-redhat-00001 to 1.1.14.Final-redhat-00001
- JBEAP-22160 - (7.4.z) Upgrade jakarta.el from 3.0.3.redhat-00002 to 3.0.3.redhat-00006
- JBEAP-22209 - (7.4.z) Upgrade commons-io from 2.5 to 2.10.0
- JBEAP-22318 - (7.4.z) Upgrade WildFly Core from 15.0.3.Final-redhat-00001 to 15.0.4.Final-redhat-00001
- JBEAP-22319 - (7.4.z) Upgrade undertow from 2.2.9.Final-redhat-00001 to 2.2.9.SP1-redhat-00001
CVEs
References
JBoss Enterprise Application Platform 7.4 for RHEL 8
SRPM | |
---|---|
eap7-apache-commons-io-2.10.0-1.redhat_00001.1.el8eap.src.rpm | SHA-256: b4625be1efc9a6d6b0e27fb2747717dc93f2e2ef0b12ea7ac8b865c831ef9395 |
eap7-artemis-wildfly-integration-1.0.4-1.redhat_00001.1.el8eap.src.rpm | SHA-256: 61970fb868ccac49b583b89b3edf30f1b80ec7da56b81f067c493a5b1920c681 |
eap7-elytron-web-1.9.1-1.Final_redhat_00001.1.el8eap.src.rpm | SHA-256: 9891378606407aa820cf71798a75e22e903bd5dad26151830e26ac3f8c19360d |
eap7-hal-console-3.3.7-1.Final_redhat_00001.1.el8eap.src.rpm | SHA-256: 92d23ec9dd044610dbec68476f9456ec1a5210b78488cc6fdbacb8ad3334f2f8 |
eap7-hibernate-5.3.21-1.Final_redhat_00001.1.el8eap.src.rpm | SHA-256: 7a0b302ef6507e4d7e0661fefba6e567060cc87fa252dad1d8a5dea55ef37f87 |
eap7-infinispan-11.0.12-1.Final_redhat_00001.1.el8eap.src.rpm | SHA-256: 13a797ec2aaa8a8f7f7418b3096049845ed4710ac5a6f367322455f45556263a |
eap7-ironjacamar-1.4.35-1.Final_redhat_00001.1.el8eap.src.rpm | SHA-256: a0afa080b8418cb0fb12bcbda8896cba0696f80c146d03f0ddd422ddbedb05d4 |
eap7-jakarta-el-3.0.3-2.redhat_00006.1.el8eap.src.rpm | SHA-256: 648c57ed9d045fb38fc39fa181490912e4780316941916f5745001996714f307 |
eap7-jberet-1.3.9-1.Final_redhat_00001.1.el8eap.src.rpm | SHA-256: f59684edec5005af3b7dfd35dce5ea068ee1261588e83b3aa16de0b0f0faa62e |
eap7-jboss-remoting-5.0.23-2.SP1_redhat_00001.1.el8eap.src.rpm | SHA-256: 75482f52202f8d2ee5c69d02b1c30da7b0a17ead3b046e9c4689a7affee9dc08 |
eap7-jboss-server-migration-1.10.0-8.Final_redhat_00009.1.el8eap.src.rpm | SHA-256: c287b847d87246a6b3b39824f02446eccccf991c9599ebcb1769cb15d2b81aa1 |
eap7-jgroups-kubernetes-1.0.16-1.Final_redhat_00001.1.el8eap.src.rpm | SHA-256: b600c178781f2247796596b149f1ce5ffbb20d5549ae676a731254b686f9975e |
eap7-netty-4.1.63-1.Final_redhat_00001.1.el8eap.src.rpm | SHA-256: 109bc213fbc15bed9029d129360a9e6c3b661715e3d6e574dc65cd724b3b7af7 |
eap7-picketbox-5.0.3-9.Final_redhat_00008.1.el8eap.src.rpm | SHA-256: e88616b58e89db13627fbc2bce8b48638a694f5434d5ed23d9010dfa1a899c49 |
eap7-undertow-2.2.9-2.SP1_redhat_00001.1.el8eap.src.rpm | SHA-256: aa57b82c5a23c1aa5f18ececbd22402f0df153ae1682d18f193f8d12c3e83bbd |
eap7-velocity-2.3.0-1.redhat_00001.1.el8eap.src.rpm | SHA-256: 1faceee9aac9aba0bf7accd1b83fdd136d03ee80cc06f3738a4a913faedc2cea |
eap7-wildfly-7.4.1-2.GA_redhat_00003.1.el8eap.src.rpm | SHA-256: 1aa4dfaafe6bc9dfdc744d6317b2c1ae36894871fa54d941726957e51858a02c |
eap7-wildfly-elytron-1.15.5-1.Final_redhat_00001.1.el8eap.src.rpm | SHA-256: 901bb8be4ec66d34d4d276ef4b640a0070d43a368d1d43853c8bd26c4f9433f6 |
eap7-wildfly-http-client-1.1.8-1.Final_redhat_00001.1.el8eap.src.rpm | SHA-256: cbce05bec6863a0668d46a65e6dfa558d390ce4303934f884cddee36f8c821ed |
eap7-wildfly-transaction-client-1.1.14-2.Final_redhat_00001.1.el8eap.src.rpm | SHA-256: 4fdcb7e6c85adc3c1dbc0913f90c3a14e394ba33799e7589ff98617dffb88eb8 |
eap7-xalan-j2-2.7.1-36.redhat_00013.1.el8eap.src.rpm | SHA-256: 4e505ec179837f8ba4923671faea15c6da93b1b6e5e18879b66830096fa8fcbf |
eap7-yasson-1.0.9-1.redhat_00001.1.el8eap.src.rpm | SHA-256: 5bc3f764de01085488367e370ff716eaa0e50110a2dc05988b193f8acd9b34b1 |
x86_64 | |
eap7-apache-commons-io-2.10.0-1.redhat_00001.1.el8eap.noarch.rpm | SHA-256: 3df69ad932936f20a7c6f70d6d16d9888d8fbb2af556fb32443b229dc5e6af32 |
eap7-artemis-wildfly-integration-1.0.4-1.redhat_00001.1.el8eap.noarch.rpm | SHA-256: d427d904bd6f16372ab37c73bdf419a979b3f62084e08414594dab608848f816 |
eap7-hal-console-3.3.7-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 73c84ade3d07595fdc00fd4d30d9d6a4e9a57e348772047c93a96297da0ead75 |
eap7-hibernate-5.3.21-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: a714313503ebb3a6f03d4918814a7e05de36b4c61f4761cda590bf59be6e0341 |
eap7-hibernate-core-5.3.21-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 7c26bd3986505969d68efb6d6652ead805b45b769d264cc36eb8c2512dccbe99 |
eap7-hibernate-entitymanager-5.3.21-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: f4cb315c56502affa48ad8392dff6bacf8b63c59f8559a9698e5f9639dcbbf8d |
eap7-hibernate-envers-5.3.21-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: e5519e829680380d4e44382cf0c977d79697760feff6dadd091c42a1ac6427cb |
eap7-hibernate-java8-5.3.21-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 51363c511326cda9323cf8a757006afbb0dd98bd141852e0e86fbd5c89dbf19d |
eap7-infinispan-11.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 08db25c97c970fa8b8f1cb4f4d7490c0c7a926b2a75882a8ae7c10cd94032848 |
eap7-infinispan-cachestore-jdbc-11.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 02ab89a7523a9b795762fde0f6aacacb7dd3de1740be2504cf52ef2fd73e5ad8 |
eap7-infinispan-cachestore-remote-11.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 9a6c85e9b1df2c24ad1554cf1eb38e3280a998b0626a042268aedb64951bb2d5 |
eap7-infinispan-client-hotrod-11.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 0c5813e0c5559ff2d6117783dc0227bb0e03c028b88d6f8e2de9bc2f173c4150 |
eap7-infinispan-commons-11.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 49f8d009cc1da72e8280004b7b5ad0646b1b7823eb67b56352479dca6bbaef14 |
eap7-infinispan-component-annotations-11.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 9c4b15b79c0b49c216f8ae149f75e00714a20fc42d546030c6c32b9729277f96 |
eap7-infinispan-core-11.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 1ba063464ef8a0d6e88d7134340f00579e2090951211b627812a2fa49da299dc |
eap7-infinispan-hibernate-cache-commons-11.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 791b080e42b2330bdd4842f3c0048dc81c4d83f26b568737fc99058667a2b569 |
eap7-infinispan-hibernate-cache-spi-11.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 5afdf05fa38cea8992077756c7e23efc3b76ef94e95847b7999aa8edc23fd65b |
eap7-infinispan-hibernate-cache-v53-11.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 559e1d95aebd5b94b8b267770d70ff35aa1d89be347383a8ccb749c3ab591044 |
eap7-ironjacamar-1.4.35-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: f22e9fb2699431fffdd280fb5c40ded7c6a7aee6274a90ec6a993fa90cb22bfd |
eap7-ironjacamar-common-api-1.4.35-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: e3619672c7e615f1f2161e5935bb21fb8a4b660ba28313ae72e4361b9bcd5359 |
eap7-ironjacamar-common-impl-1.4.35-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: b09a55c1934e1b8a6e1604cbc63405fd067d4dbae0a8461c40395570154ddef4 |
eap7-ironjacamar-common-spi-1.4.35-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 98f9e5e591d2603e5020e43fc57a5691bef2b586a31edd1fc08cef224dbb13e9 |
eap7-ironjacamar-core-api-1.4.35-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 7cccbfe45a81f63ad4fcaa5ed32e1698637e160f70bcc578c89e4fce0b5d96a3 |
eap7-ironjacamar-core-impl-1.4.35-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 2320386b1378b6c9d59ea24001e2b2537006d31fc60a0a7508626f305ad2565d |
eap7-ironjacamar-deployers-common-1.4.35-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 4164f1c72d59f0c4128b0687dda598a23f7cc18cc68b363ca6d62a66cb7a796d |
eap7-ironjacamar-jdbc-1.4.35-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 4ce3f0422cd17cdd19969a86d2248b249d380f480ee0a343564031bfa762974f |
eap7-ironjacamar-validator-1.4.35-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 31a7f706acf1d63c8c218ed2fc0e19ffafd7f04e70fc4c4b5a7bc9166984b75b |
eap7-jakarta-el-3.0.3-2.redhat_00006.1.el8eap.noarch.rpm | SHA-256: e58e9c87443b48d17d9103ce4c1bac435dbb09c01ad76110ed414cc7b70d1593 |
eap7-jberet-1.3.9-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 1285144620527c7563ac41510edaa5de9ddeae3a07b07c0d9d372ae7adcb18a1 |
eap7-jberet-core-1.3.9-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 1252d748a055b6715d30eb44244dec5db99f558afd2a6fef3c4fb5f64431cda7 |
eap7-jboss-remoting-5.0.23-2.SP1_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 36f14c1bb28a28456b11e22654c8f955ec0d4d6790bac04e06ac5ef616f48676 |
eap7-jboss-server-migration-1.10.0-8.Final_redhat_00009.1.el8eap.noarch.rpm | SHA-256: 5f5cebae6c18937963425766f9cc549bc96cabf9411ff41c328be16647bcea98 |
eap7-jboss-server-migration-cli-1.10.0-8.Final_redhat_00009.1.el8eap.noarch.rpm | SHA-256: fa103b7a1d754a2e719083ee4737186bb49da74747d6b0c6ff2f4135b02fd19f |
eap7-jboss-server-migration-core-1.10.0-8.Final_redhat_00009.1.el8eap.noarch.rpm | SHA-256: 8d2b8f82c54db6599e4d413e32b92635431c421f55f3ffd049b4d0ab11281827 |
eap7-jgroups-kubernetes-1.0.16-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 79e8e3c4c56ab47c143e852e5b996067b43f632b52240a3e591b6ba87ef77e51 |
eap7-netty-4.1.63-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 00c27465ea659af5b0ac24142f4c76bd9d4c2c0a6c4a9fc8df99601a301a2957 |
eap7-netty-all-4.1.63-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 266183af649fd2aa0acf56236f5ddb2cdae26e051cd3f79c6fb99553c800a3fe |
eap7-picketbox-5.0.3-9.Final_redhat_00008.1.el8eap.noarch.rpm | SHA-256: a7ec7b5455031a85ec6dfb16c32f07a7a418244b93c5d23c6dcd1bfc6b631e1d |
eap7-picketbox-infinispan-5.0.3-9.Final_redhat_00008.1.el8eap.noarch.rpm | SHA-256: 6b920899542ab69a547a6328f7e6630ccd18ddd564426ca9000be71eba59faf2 |
eap7-undertow-2.2.9-2.SP1_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 6b95696e193560f5c8f3dbda85b2c5b85e4b4bfa358ba26eac9629bc7380cbd5 |
eap7-undertow-server-1.9.1-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 9a1ecc44ba513584bed77f42a26397b03d57a24c856c4d98a0301ebcbf66ed02 |
eap7-velocity-2.3.0-1.redhat_00001.1.el8eap.noarch.rpm | SHA-256: e6fe027d612f8e66be8f5da6b7337ce860737405668999dfbe59ace7da78ee7f |
eap7-velocity-engine-core-2.3.0-1.redhat_00001.1.el8eap.noarch.rpm | SHA-256: ffa1edbab4b1a17a0539d2647ec1d04c18da644da4ca31f8e823ea49d3bbbd61 |
eap7-wildfly-7.4.1-2.GA_redhat_00003.1.el8eap.noarch.rpm | SHA-256: 94beabebe6fa49b42d3fca7c26a7a063acc9cf0791b818043687425c2b11e611 |
eap7-wildfly-elytron-1.15.5-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 815fe227b0d0061f9e8cd16ad2d49a893010d98f5c9c3af67256dabab511b886 |
eap7-wildfly-elytron-tool-1.15.5-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: a6a6b261f9f845150015b4828a895b7b553edfa970f408dedcd392e35336df04 |
eap7-wildfly-http-client-common-1.1.8-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: f767b82fa6bac110588886cd68e7b984081237daa32772d4af33c7ee7dc8b438 |
eap7-wildfly-http-ejb-client-1.1.8-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: b984d8aa7e2d0c4dc061130af583d22a06b98bf379e1f586c7e2e22980448a7c |
eap7-wildfly-http-naming-client-1.1.8-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 790841ade92cbd20d98a102a221b7196d2b667e7320768d95399287872e37ea7 |
eap7-wildfly-http-transaction-client-1.1.8-1.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: 816dbe06f220f3155f1440d9cbe8f8c375cc2a37a1a734551492a9e680c6d864 |
eap7-wildfly-javadocs-7.4.1-2.GA_redhat_00003.1.el8eap.noarch.rpm | SHA-256: 51d8b9f5e32351f0fe9544c680abe8c4829815c2a81fd084c856f7485472b79b |
eap7-wildfly-modules-7.4.1-2.GA_redhat_00003.1.el8eap.noarch.rpm | SHA-256: b585e52f52aeb8c21320291d51371a07e470ca296b40aee2e5205bf18f05741e |
eap7-wildfly-transaction-client-1.1.14-2.Final_redhat_00001.1.el8eap.noarch.rpm | SHA-256: a29db77a14048ec1f0247e7a335fc4d5f32e15dd0cf99ed693a6d5119f3b5bd1 |
eap7-xalan-j2-2.7.1-36.redhat_00013.1.el8eap.noarch.rpm | SHA-256: 28146bcccd52fd8595508e9e05878a2910f1830b724c2d5ba62d62c07e984946 |
eap7-yasson-1.0.9-1.redhat_00001.1.el8eap.noarch.rpm | SHA-256: 4d24aba83b8b85fbafc3be1e118f676cb900b5d610021d03fd01365ad1325c8c |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.