Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2022:4919 - Security Advisory
Issued:
2022-06-06
Updated:
2022-06-06

RHSA-2022:4919 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: Red Hat JBoss Enterprise Application Platform 7.4.5 security update on RHEL 8

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.

This release of Red Hat JBoss Enterprise Application Platform 7.4.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.4 and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.5 Release Notes for information about the most significant bug fixes and enhancements included in this release.

Security Fix(es):

  • h2: Loading of custom classes from remote servers through JNDI (CVE-2022-23221)
  • jackson-databind: denial of service via a large depth of nested objects (CVE-2020-36518)
  • netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data (CVE-2021-37136)
  • netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way (CVE-2021-37137)
  • h2: Remote Code Execution in Console (CVE-2021-42392)
  • netty: control chars in header names may lead to HTTP request smuggling (CVE-2021-43797)
  • xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr (CVE-2022-0084)
  • wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled (CVE-2022-0866)
  • undertow: Double AJP response for 400 from EAP 7 results in CPING failures (CVE-2022-1319)
  • OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) (CVE-2022-21299)
  • mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors (CVE-2022-21363)
  • xerces-j2: infinite loop when handling specially crafted XML document payloads (CVE-2022-23437)
  • artemis-commons: Apache ActiveMQ Artemis DoS (CVE-2022-23913)
  • Moment.js: Path traversal in moment.locale (CVE-2022-24785)
  • jboss-client: memory leakage in remote client transaction (CVE-2022-0853)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • JBoss Enterprise Application Platform 7.4 for RHEL 8 x86_64

Fixes

  • BZ - 2004133 - CVE-2021-37136 netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data
  • BZ - 2004135 - CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way
  • BZ - 2031958 - CVE-2021-43797 netty: control chars in header names may lead to HTTP request smuggling
  • BZ - 2039403 - CVE-2021-42392 h2: Remote Code Execution in Console
  • BZ - 2041472 - CVE-2022-21299 OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646)
  • BZ - 2044596 - CVE-2022-23221 h2: Loading of custom classes from remote servers through JNDI
  • BZ - 2047200 - CVE-2022-23437 xerces-j2: infinite loop when handling specially crafted XML document payloads
  • BZ - 2047343 - CVE-2022-21363 mysql-connector-java: Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors
  • BZ - 2060725 - CVE-2022-0853 jboss-client: memory leakage in remote client transaction
  • BZ - 2060929 - CVE-2022-0866 wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled
  • BZ - 2063601 - CVE-2022-23913 artemis-commons: Apache ActiveMQ Artemis DoS
  • BZ - 2064226 - CVE-2022-0084 xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr
  • BZ - 2064698 - CVE-2020-36518 jackson-databind: denial of service via a large depth of nested objects
  • BZ - 2072009 - CVE-2022-24785 Moment.js: Path traversal in moment.locale
  • BZ - 2073890 - CVE-2022-1319 undertow: Double AJP response for 400 from EAP 7 results in CPING failures
  • JBEAP-23121 - Tracker bug for the EAP 7.4.5 release for RHEL-8
  • JBEAP-23171 - (7.4.z) Upgrade HAL from 3.3.9.Final-redhat-00001 to 3.3.12.Final-redhat-00001
  • JBEAP-23194 - Upgrade hibernate-validator from 6.0.22.Final-redhat-00002 to 6.0.23-redhat-00001
  • JBEAP-23241 - [GSS](7.4.z) Upgrade jberet from 1.3.9 to 1.3.9.SP1
  • JBEAP-23299 - (7.4.z) Upgrade Artemis from 2.16.0.redhat-00034 to 2.16.0.redhat-00042
  • JBEAP-23300 - [GSS](7.4.z) Upgrade JBoss Remoting from 5.0.23.SP1 to 5.0.24.SP1
  • JBEAP-23312 - (7.4.z) Upgrade WildFly Core from 15.0.8.Final-redhat-00001 to 15.0.12.Final-redhat-00001
  • JBEAP-23313 - (7.4.z) Upgrade Elytron from 1.15.11.Final-redhat-00002 to 1.15.12.Final-redhat-00001
  • JBEAP-23336 - (7.4.z) Upgrade Hibernate ORM from 5.3.25.Final-redhat-00002 to 5.3.26.Final-redhat-00002
  • JBEAP-23338 - [GSS](7.4.z) Upgrade Undertow from 2.2.16 to 2.2.17.SP3
  • JBEAP-23339 - [GSS](7.4.z) Upgrade wildfly-http-ejb-client from 1.1.10 to 1.1.11.SP1
  • JBEAP-23351 - (7.4.z) Upgrade org.apache.logging.log4j from 2.17.1.redhat-00001 to 2.17.1.redhat-00002
  • JBEAP-23353 - (7.4.z) Upgrade wildfly-transaction-client from 1.1.14.Final-redhat-00001 to 1.1.15.Final-redhat-x
  • JBEAP-23429 - [PM](7.4.z) JDK17 Update Tested Configurations page and make note in Update release notes
  • JBEAP-23432 - [GSS](7.4.z) Upgrade JSF API from 3.0.0.SP04 to 3.0.0.SP05
  • JBEAP-23451 - [PST] (7.4.z) Upgrade to FasterXML Jackson to 2.12.6.redhat-00001 and Jackson Databind to 2.12.6.1.redhat-00003
  • JBEAP-23531 - [GSS](7.4.z) Upgrade Undertow from 2.2.17.SP3 to 2.2.17.SP4
  • JBEAP-23532 - (7.4.z) Upgrade WildFly Core from 15.0.12.Final-redhat-00001 to 15.0.13.Final-redhat-00001

CVEs

  • CVE-2020-36518
  • CVE-2021-37136
  • CVE-2021-37137
  • CVE-2021-42392
  • CVE-2021-43797
  • CVE-2022-0084
  • CVE-2022-0853
  • CVE-2022-0866
  • CVE-2022-1319
  • CVE-2022-21299
  • CVE-2022-21363
  • CVE-2022-23221
  • CVE-2022-23437
  • CVE-2022-23913
  • CVE-2022-24785

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/
  • https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/
Note: More recent versions of these packages may be available. Click a package name for more details.

JBoss Enterprise Application Platform 7.4 for RHEL 8

SRPM
eap7-activemq-artemis-2.16.0-9.redhat_00042.1.el8eap.src.rpm SHA-256: df8d76ffaad7e6e55601694b639f3f89104790cbc129594a3eff13afbe102396
eap7-h2database-1.4.197-2.redhat_00004.1.el8eap.src.rpm SHA-256: a297be316e1dde74b9c48d87da0aa5002dcdb1356bb2c9cc76c8ca5a12f1127c
eap7-hal-console-3.3.12-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: 1a8ee96952b6dc7fbe7b6a78354327c3299887360f208d0eba4a2f764f31fb30
eap7-hibernate-5.3.26-1.Final_redhat_00002.2.el8eap.src.rpm SHA-256: 12881f4507a1146a38b668503e1433e9a1fe70239bd777a467e2144bca7cae1f
eap7-hibernate-validator-6.0.23-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: 8fdba01741af5c2e0ac2e44d15c80c703790be110705223bb047254376fb8159
eap7-jackson-annotations-2.12.6-1.redhat_00001.1.el8eap.src.rpm SHA-256: 69da4762c525a4d6e62d9e2d825e40971b47878a7aa1823f1a23a9964262d1c9
eap7-jackson-core-2.12.6-1.redhat_00001.1.el8eap.src.rpm SHA-256: 8c5bbd9ebc6a48e139049d95bbc4ceff8be3e01eccb76f3976ccf2411158b309
eap7-jackson-databind-2.12.6.1-1.redhat_00003.1.el8eap.src.rpm SHA-256: e377d68dcfd960eef7743918a14f95968a2e299bf4fd12c5339292979051fb4d
eap7-jackson-jaxrs-providers-2.12.6-1.redhat_00001.1.el8eap.src.rpm SHA-256: 6027b1e28c203955333c0f8d32af4331a69d173bf6d2435c92a468274d99d252
eap7-jackson-modules-base-2.12.6-1.redhat_00001.1.el8eap.src.rpm SHA-256: c3f2f1a1d6ae5436e44f6551e9f2eb917e660395511b3097154eb53de03736bf
eap7-jackson-modules-java8-2.12.6-1.redhat_00001.1.el8eap.src.rpm SHA-256: 0c1ff1dd1b783d683399fa71223379bbc249ad4b24f7253376eeddb17a777a72
eap7-jberet-1.3.9-1.SP1_redhat_00001.1.el8eap.src.rpm SHA-256: 8fe4972ace70051a9d20eb59e19e866acddaeefa03504a539bb2c4321cf28d68
eap7-jboss-jsf-api_2.3_spec-3.0.0-4.SP05_redhat_00002.1.el8eap.src.rpm SHA-256: 87db015687475eece07e58c46e6ff627c3b11c7f3ad7879c8d2e70c43500fc59
eap7-jboss-remoting-5.0.24-1.SP1_redhat_00001.1.el8eap.src.rpm SHA-256: a58fc1e4b7d26d594a7a064e567a150178d8726dc6d7e393c666df7b5499cb21
eap7-jboss-server-migration-1.10.0-16.Final_redhat_00015.1.el8eap.src.rpm SHA-256: cdefcb630b2588c943868c225c7ca13ab59abf1065d44e2351b6838abcd1d0cc
eap7-jboss-xnio-base-3.8.7-1.SP1_redhat_00001.1.el8eap.src.rpm SHA-256: c08b1cdb7fe6a73acd2c3e2b1296b5fa54779cc23be9b4057f6df0ef560afbea
eap7-log4j-2.17.1-2.redhat_00002.1.el8eap.src.rpm SHA-256: eee9d3e967e15e5eb413da45f4ca85d3be1e095caf1e71f8283d0a107d5f5bdc
eap7-netty-4.1.72-4.Final_redhat_00001.1.el8eap.src.rpm SHA-256: bd0389a99d4264a2d4130efadb2ba25d33768965e5a1af18f18470357e91d11e
eap7-netty-tcnative-2.0.48-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: ab518bc23794325b50f68bbe016da30d3456a7c08e83cb19f67f166c9c9db7df
eap7-netty-transport-native-epoll-4.1.72-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: d7e93bee17b983c96ce8960baebd1ad4aae86d10f7f2f94f60c166ebd8c770ed
eap7-snakeyaml-1.29.0-1.redhat_00001.2.el8eap.src.rpm SHA-256: 6b8d952e322a934fe0efa3229cf407596438d30aa41d5020baf5bbe8e7a0a360
eap7-undertow-2.2.17-2.SP4_redhat_00001.1.el8eap.src.rpm SHA-256: 74016024a732b1aa13baf872a2aa272bf23cde2ec68875b21c93730a6820c158
eap7-wildfly-7.4.5-3.GA_redhat_00001.1.el8eap.src.rpm SHA-256: db7db5e4f7a78a0f21af07eab837544e2f9b4522102c060a0b11c6f958544863
eap7-wildfly-elytron-1.15.12-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: 620f27a0c7f425e5aa8b12e7120a4729b95ce51c65fca5ebd6d1bc6c3729356f
eap7-wildfly-http-client-1.1.11-1.SP1_redhat_00001.1.el8eap.src.rpm SHA-256: 48809b02c530e14b3b2a914e7fe8758bf5e9099a2ff31606b6a85396485045dd
eap7-wildfly-transaction-client-1.1.15-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: 2a222f14ad5220db75225f882d272ba50e927d2fb7392cf2869bd8a74e3f1cfc
eap7-xerces-j2-2.12.0-3.SP04_redhat_00001.1.el8eap.src.rpm SHA-256: 319d220ae80f22379405056fdc5eb03422f4f5fb7e6f16135d0b91b3f5ec5c57
x86_64
eap7-activemq-artemis-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm SHA-256: c8b37427e84e14e7f481adc0865bfe368d361e32d64728649b31ade2f6812b8d
eap7-activemq-artemis-cli-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm SHA-256: 604fbd121f3c682465c81f9d8dccd1c259cb3612651534c2db800c36be8bab07
eap7-activemq-artemis-commons-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm SHA-256: 2c0a1b583e25c4498e677e7b5d0c56db0f28d6a824ff31a64f85bd5bc02fa917
eap7-activemq-artemis-core-client-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm SHA-256: f96d140400bd6bfe21a711aa540b74b02863578b1bed23321c3216dd2cc0e467
eap7-activemq-artemis-dto-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm SHA-256: a2bf8e4bdf342ebc2eb9e39fad0c5d10dc9198ebb6f877478ba6c9eaac21aaf0
eap7-activemq-artemis-hornetq-protocol-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm SHA-256: ab1a568d12d5bf7ed8646069705628136340927e2227cdd82c9404c51c02cb76
eap7-activemq-artemis-hqclient-protocol-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm SHA-256: fc884e5c202e71ef72b50e741df5b5b3501a59b5ddc96fc4740c97da7d4652af
eap7-activemq-artemis-jdbc-store-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm SHA-256: a2bfacc1007f55b80e31669d44a4f8b9997e74384435ef138e622777511e24e4
eap7-activemq-artemis-jms-client-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm SHA-256: 4f9da4fca3b12db2727b19b5990ac5b1f57d71481d34aaa2a58900fc66b9682c
eap7-activemq-artemis-jms-server-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm SHA-256: 3f4281c339c088e0b7c1a84b75f845434aa069e56cd9bcb0c0a1a541c0d6921e
eap7-activemq-artemis-journal-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm SHA-256: 7338b14bc00ca4cf73f480374e1d18ec73fbbe0e8ef48ee6f7301d5749290293
eap7-activemq-artemis-ra-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm SHA-256: c646cacb53ae9d2e647159124d17706f4829aad6ad0d75291d4b0d064d07a2d3
eap7-activemq-artemis-selector-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm SHA-256: 33a3db5b658f0053a9561145e7ab48b9e2619e6a203364639713b9e37735bb8b
eap7-activemq-artemis-server-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm SHA-256: 06f1655fd70186666685a6133c0ca3dde69d0cb7d79977a65a740d900318b1ed
eap7-activemq-artemis-service-extensions-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm SHA-256: 3cd7eb078ba793ec4437c961db5b02edac859af97fce6e4f4d3349f370c55adf
eap7-activemq-artemis-tools-2.16.0-9.redhat_00042.1.el8eap.noarch.rpm SHA-256: 5a5c8e30741cf8df6898bb2dc1e263b4a7f60b4256c631c12a2e23d9ab767d54
eap7-h2database-1.4.197-2.redhat_00004.1.el8eap.noarch.rpm SHA-256: e16b6124f6ab1ac4caaa5e7ba249d3fe58add0f43bcc5728298c96f9b924474e
eap7-hal-console-3.3.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 33a5b6571ec91b77eaa76f0bc4e218117a63a4d2f06f530c01e914183d1024da
eap7-hibernate-5.3.26-1.Final_redhat_00002.2.el8eap.noarch.rpm SHA-256: dfec94b7f983bbb730d6da75199b617a0d33d392a82b5febb9a65066f5a8e95b
eap7-hibernate-core-5.3.26-1.Final_redhat_00002.2.el8eap.noarch.rpm SHA-256: 3cc524b9befe261a3895910bee3145f445bec31560e91f77d2e3c970d33c7906
eap7-hibernate-entitymanager-5.3.26-1.Final_redhat_00002.2.el8eap.noarch.rpm SHA-256: d6ff2000367c0597a373d9d80f8ff1c118c144d36d352550c6c993e3d5ea076d
eap7-hibernate-envers-5.3.26-1.Final_redhat_00002.2.el8eap.noarch.rpm SHA-256: 11f7b953f27406d839c3c3d2d8aff0d8b56b4704f9add97c4cc2ce967b0fe87b
eap7-hibernate-java8-5.3.26-1.Final_redhat_00002.2.el8eap.noarch.rpm SHA-256: 84aac7962083d71925f295e8dcd84abbe74465646bb9f5489dad45801aeabb30
eap7-hibernate-validator-6.0.23-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 9d913c345e8f4793d8ef3a71ee2d81cfa7ab15b2cc2eba29bb21cb4760ad8d54
eap7-hibernate-validator-cdi-6.0.23-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 284cc716bb68209998df5b371bf5696349855b254054ed5c78b6d399d6ecbfa8
eap7-jackson-annotations-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 66f44e54288f2f95d4e62ad2ac42510ddad3cf671031587025800a3521c8f9d3
eap7-jackson-core-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 7fbbde43c6b796ae0d156cf9c9a2269bfed263b2d9cc68629d215cec0ddf4b10
eap7-jackson-databind-2.12.6.1-1.redhat_00003.1.el8eap.noarch.rpm SHA-256: bde3573d15af1c5a69d36a47d1436f55ea5ecb323b08a50124d0c270ebe9ea81
eap7-jackson-datatype-jdk8-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 079e56556e0403a2c5c89603cab9a4d9897f8679973d5613dd2bda5f9591413b
eap7-jackson-datatype-jsr310-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 2b3232a609d169cb55fa3718db7f844e3a0c5782160d3f9699cf8fbb45f102d6
eap7-jackson-jaxrs-base-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 8369c13bd715eaf9f27ce38c5795e595f10d55f46f86ff8dbff0e5bb28413f6b
eap7-jackson-jaxrs-json-provider-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: bd92631857f0bcc9f5240c2d7cb651d25383bd4ade6ba14e2c475afc4eabfac7
eap7-jackson-module-jaxb-annotations-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 45af4238430be8c1d4d2bc74736afb2c032a28527c71e39fb01108154ada0df8
eap7-jackson-modules-base-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 97075e96dfc3ebe07ec0dea10838267336e6da70d3693c0f5d7ce1eada0e1692
eap7-jackson-modules-java8-2.12.6-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: fde2e5f859844f4acc5d110fd88ceceb6322df220ccebe2e263ed2956f62240a
eap7-jberet-1.3.9-1.SP1_redhat_00001.1.el8eap.noarch.rpm SHA-256: 0287be1cbc2c6db34686cdc0ee413dd335a8668c1c9e4596cfc8169c224419fd
eap7-jberet-core-1.3.9-1.SP1_redhat_00001.1.el8eap.noarch.rpm SHA-256: cc6cc3cc58ca724921333960368c16a1dea34b86bcedc5d59ed96f81a7d0595f
eap7-jboss-jsf-api_2.3_spec-3.0.0-4.SP05_redhat_00002.1.el8eap.noarch.rpm SHA-256: 68974628e300c11d1bd7be1c79f42875b5d6cd763f5d92ae0898063e1d37322a
eap7-jboss-remoting-5.0.24-1.SP1_redhat_00001.1.el8eap.noarch.rpm SHA-256: 9672dffc24a7def7565ea9ab4986bf17307b76accc3f4e3ca94c8187e5dd86f1
eap7-jboss-server-migration-1.10.0-16.Final_redhat_00015.1.el8eap.noarch.rpm SHA-256: dcffd8dc1657e74c07de40f3a0a0cb944e001f90367dc073891f87a6f8ad2912
eap7-jboss-server-migration-cli-1.10.0-16.Final_redhat_00015.1.el8eap.noarch.rpm SHA-256: e8bdb1ccfb87fa7bf0a2d029f2bb7cad324379ed661c3bd5c3c622dbba3cccaf
eap7-jboss-server-migration-core-1.10.0-16.Final_redhat_00015.1.el8eap.noarch.rpm SHA-256: 2d71c62832a7aab9691a5193f26740e84f80f869278630fbd5e6b7bf5d58c2f4
eap7-jboss-xnio-base-3.8.7-1.SP1_redhat_00001.1.el8eap.noarch.rpm SHA-256: f5a8fde9d1a48666f8347a3a4590ba5f050db4765e5ad2d8ad1c2bd5fe75315f
eap7-log4j-2.17.1-2.redhat_00002.1.el8eap.noarch.rpm SHA-256: 602bff5f840cfa713ff290db8b7c89d3353de4c44affa7316a8bc3e9f9332500
eap7-netty-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 4510a68def92b6a57323db622f62bb7fc7aa51e68092a79ea4f14105d754cae1
eap7-netty-all-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 90616a6b34fe4a82a51a5c0dad4422e4632ab21939fd2979af0968de93a990ad
eap7-netty-buffer-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 650c6fb5964a07b32b7774fe87482d4fd08a41cce644e4638f777d2e79f6e98e
eap7-netty-codec-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: f8b84c0aca9b74fe69accd069173964635c029b5a5a8435ece019743df8a3128
eap7-netty-codec-dns-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 10eab5865cd2e674594ac199e65bccb810a8013f2694995672b1218b10e14def
eap7-netty-codec-haproxy-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: cc31831eaaf09c7561b4f3ed50bc82c1aae926725d68866e67a483d1c9a82dbd
eap7-netty-codec-http-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: a78464abc2ce01626cb769aa75605862732d6e6f6487dd868e09a1a0489f737a
eap7-netty-codec-http2-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 9354fd86157767b66f2e674a4de0ca3de7888486e99a27ae7351283df4e61e0f
eap7-netty-codec-memcache-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: a90077e3ff14c9dbadffd2f769bb3536ef1250578378d4187fb73988c47e2450
eap7-netty-codec-mqtt-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 12b94f0d14966a757acb663fcae04c505e869a01c518b6dc2d0eb7032349ad17
eap7-netty-codec-redis-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 85c81108427999e1e48afba745951840b06587dc87d334b1c22f3b31f8f788c5
eap7-netty-codec-smtp-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: c76f325a96f51feb698dac0056e16b07f3c25b243af9c7555e62ba7a813d782d
eap7-netty-codec-socks-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: c2115a47147392560f4fc224a805241acb02b7cadb250119030cbd6667139bf2
eap7-netty-codec-stomp-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 1461f64fcc670bd632cecdbbb84b4d6bd73935940671cb6a6bc931d69671ed12
eap7-netty-codec-xml-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 49461ef048650e59a560dd2e2453c23310520144d66ca66784c673957e7ba53f
eap7-netty-common-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: b94a1e25334296c7b7b69e1f29f2440f200f39615182daf82e6765afc5c0659f
eap7-netty-handler-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: c8a976061c5cf95b4633e64a2d4d78058bca0890e83a1e257f2425618471c6fd
eap7-netty-handler-proxy-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 32247a0b84906e2e86b936e3de027b6d26f569bd72838e3ba869fde5b8c94729
eap7-netty-resolver-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 0d207e3cb7ef401851b6a64688bab1c29bd2b836cb7c5644c4ce5869ccd1a5b8
eap7-netty-resolver-dns-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 87e011eb8f33992a09e2e1886b84a1053c79cbe9f601e274695e19d0ef808c06
eap7-netty-resolver-dns-classes-macos-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 70c9df8d1375377f6960c0a70a776818a6035c785c1afe9dc96c066f2c203e4e
eap7-netty-tcnative-2.0.48-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: fd5135bf1092cbd2cb70a5ec94ec534b1f1d6ea66cc6ec4d6981ccc1b297e190
eap7-netty-transport-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 64d3a2e4bc6c7af2ca6a25d61223175dd93fd6370531f0e743145ba31ea8d611
eap7-netty-transport-classes-epoll-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 520ccb7c1d0e382946fc7e2ee430f1cd64d679d32f4fac90242b35be622cbe82
eap7-netty-transport-classes-kqueue-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 153501658f6962b5ec718e7689d949e579f76a475f58698c9454a4ae48ba9e61
eap7-netty-transport-native-epoll-4.1.72-1.Final_redhat_00001.1.el8eap.x86_64.rpm SHA-256: b850d9da882a576bbd13df8282c2e7f7ee96de6e66c0f94bf3b575a0c848168e
eap7-netty-transport-native-epoll-debuginfo-4.1.72-1.Final_redhat_00001.1.el8eap.x86_64.rpm SHA-256: 8751d233b6c20ccca7ababae21b03e1a1f982d4771eacda1e0a189846ab9a389
eap7-netty-transport-native-unix-common-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 28b3edcd80038b5ee25c2777f2412d6498fd8c305c4f6b19455e4196bc74a2a4
eap7-netty-transport-rxtx-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 431b9a55a9bd732f9177b6347f1431c5a74e0401d514c331581aba3ea99063ed
eap7-netty-transport-sctp-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 5c8e3e242aced13d2bf22b2330e6df4fcfa12a5167f96bea34c839a2640a7970
eap7-netty-transport-udt-4.1.72-4.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: fc7d23860f264f28282bf5361b2f37c12e5f765a3734449b035809b39eaed0bf
eap7-snakeyaml-1.29.0-1.redhat_00001.2.el8eap.noarch.rpm SHA-256: fc57e2f815d013fefd690a3dc98103b4b01ccd7b041b800be07b4ebb1a6a1e98
eap7-undertow-2.2.17-2.SP4_redhat_00001.1.el8eap.noarch.rpm SHA-256: 79fe9f1198738ed64432b79e55a184fb96c2a91c4bf8ab4a39a2d0a47188be21
eap7-wildfly-7.4.5-3.GA_redhat_00001.1.el8eap.noarch.rpm SHA-256: fdbe258a516e6b80d81792c668f86b0d0aeefa00e1bcd09df6536fecd077cc77
eap7-wildfly-elytron-1.15.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 27aa63beeabb60e877e96c335ba3443e48e1a3847795a197378ecf5f842ed67e
eap7-wildfly-elytron-tool-1.15.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 008fbcc542b2f94023087060b2153b6b9f51479568431da30053e9114bddbc90
eap7-wildfly-http-client-common-1.1.11-1.SP1_redhat_00001.1.el8eap.noarch.rpm SHA-256: aac024ca8b17214117dd6391242f10ed17eb2153ed76d98d5d48bd4aef3a0486
eap7-wildfly-http-ejb-client-1.1.11-1.SP1_redhat_00001.1.el8eap.noarch.rpm SHA-256: 5f48d504b24cd83436da68e8e26877e2232fde70854ce6b33faeb98096cff5f7
eap7-wildfly-http-naming-client-1.1.11-1.SP1_redhat_00001.1.el8eap.noarch.rpm SHA-256: 37e1425474116d024d14076cb885d041ec01bc5a0be91fa65215137c3df02f4d
eap7-wildfly-http-transaction-client-1.1.11-1.SP1_redhat_00001.1.el8eap.noarch.rpm SHA-256: ef4223c4e1a27782ca5a85c553e804980682eeb920b766941e380b64b9cc6983
eap7-wildfly-javadocs-7.4.5-3.GA_redhat_00001.1.el8eap.noarch.rpm SHA-256: 703eead681592d84fd524a3ac7b02c2936d1bb5e7c879840495670dd92b106a9
eap7-wildfly-modules-7.4.5-3.GA_redhat_00001.1.el8eap.noarch.rpm SHA-256: a750a03bf612fd7edb77b1fb599228d91d8b7ae4187279d18f348b9d9f0b7b7e
eap7-wildfly-transaction-client-1.1.15-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: eff6ee0ecaa2a5a565d5036ab0fc47dc9dc20c36b660b1e87bbac90c4f4a991a
eap7-xerces-j2-2.12.0-3.SP04_redhat_00001.1.el8eap.noarch.rpm SHA-256: 5ca924f84c0a6e40429a8a179c9420470ca323083481ca57c02070ff86ecabac

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility