Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:0383 - Security Advisory
Issued:
2026-01-08
Updated:
2026-01-08

RHSA-2026:0383 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: Red Hat JBoss Enterprise Application Platform 8.1.3 security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

A security update is now available for Red Hat JBoss Enterprise Application Platform 8.1 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.1.3 serves as a replacement for Red Hat JBoss Enterprise Application Platform 8.1.2, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 8.1.3 Release Notes for information about the most significant bug fixes and enhancements included in this release.

Security Fix(es):

  • undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF [eap-8.1.z] (CVE-2025-12543)
  • undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded [eap-8.1.z] (CVE-2024-3884)
  • undertow-core: Undertow MadeYouReset HTTP/2 DDoS Vulnerability [eap-8.1.z] (CVE-2025-9784)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258

Affected Products

  • JBoss Enterprise Application Platform 8.1 for RHEL 8 x86_64

Fixes

  • BZ - 2275287 - CVE-2024-3884 undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded
  • BZ - 2392306 - CVE-2025-9784 undertow: Undertow MadeYouReset HTTP/2 DDoS Vulnerability
  • BZ - 2408784 - CVE-2025-12543 undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF
  • JBEAP-31373 - Tracker bug for the EAP 8.1.3 release for RHEL-8
  • JBEAP-30596 - (8.1.z) Upgrade Undertow from 2.3.18.SP1-redhat-00001 to 2.3.20.SP2-redhat-00001
  • JBEAP-31250 - [GSS](8.1.z) Upgrade hibernate ORM from 6.6.31.Final-redhat-00001 to 6.6.36.Final-redhat-00001
  • JBEAP-31326 - (8.1.z) Upgrade WildFly Elytron from 2.6.5.Final-redhat-00001 to 2.6.6.Final-redhat-00001
  • JBEAP-31344 - [GSS](8.1.z) CXF-9171 - DelayedCachedOutputStreamCleaner thread accumulation after CVE-2025-23184 fix
  • JBEAP-31345 - (8.1.z) Upgrade WildFly Core from 27.1.2.Final-redhat-00002 to 27.1.3.Final-redhat-00001
  • JBEAP-31380 - [GSS](8.1.z) Upgrade JBoss EAP to 8.1.1.GA-redhat-00007 in 8.1 Update 3
  • JBEAP-31396 - [GSS](8.1.z) Upgrade org.jboss.spec.jakarta.el:jboss-el-api_5_0_spec from 4.0.1.Final-redhat-00001 to 4.0.2.Final-redhat-00001
  • JBEAP-31414 - [GSS](8.1.z) Upgrade Apache CXF from 4.0.9.redhat-00002 to 4.0.10.redhat-00001
  • JBEAP-31421 - [GSS](8.1.z) Upgrade wildfly-clustering from 5.0.11.Final-redhat-00001 to 5.0.12.Final-redhat-00001
  • JBEAP-31474 - [GSS](8.1.z) Upgrade JBoss Threads from 2.4.0.Final-redhat-00001 to 2.5.0.redhat-00001
  • JBEAP-31494 - [GSS](8.1.z) Upgrade galleon-plugins from 7.3.1.Final-redhat-00003 to 7.3.2.Final
  • JBEAP-31495 - (8.1.z) Upgrade eap-maven-plugin to 2.0.1.Final
  • JBEAP-31601 - (8.1.z) Upgrade Undertow from 2.3.20.SP2-redhat-00001 to 2.3.20.SP4-redhat-00001

CVEs

  • CVE-2024-3884
  • CVE-2025-9784
  • CVE-2025-12543

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/8.1
  • https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/8.1/html/release_notes_for_red_hat_jboss_enterprise_application_platform_8.1/index
  • https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/8.1/html/red_hat_jboss_enterprise_application_platform_installation_methods/index
  • https://access.redhat.com/articles/7134190
Note: More recent versions of these packages may be available. Click a package name for more details.

JBoss Enterprise Application Platform 8.1 for RHEL 8

SRPM
eap8-apache-cxf-4.0.10-1.redhat_00001.1.el8eap.src.rpm SHA-256: 6d7aa1ae3fe664437df5137b1f3f684aafa87c4b043a603b9c335406fb5e402b
eap8-bouncycastle-1.82.0-1.redhat_00001.1.el8eap.src.rpm SHA-256: 1ec3a9c34e4d4dac6a6f6330f63f0f8d8156ffffd4611b2db8e982dc73bd3024
eap8-eap-product-conf-parent-801.3.0-1.GA_redhat_00001.1.el8eap.src.rpm SHA-256: 5424217395fe04805a976f0a6717a5085dd7623bb12715df7941f081f691a489
eap8-eventstream-1.0.1-3.redhat_00003.1.el8eap.src.rpm SHA-256: cc3587a87fa03f231b03adc29e4fb842599e38a5fa98979616ae05a536fcbf50
eap8-hibernate-6.6.36-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: d49a00cd4bf2c1dc28ab11e9b90493f97c32e6d7fbae0e3929db5c234a7ef3b7
eap8-jboss-el-api_5.0_spec-4.0.2-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: fff19cda7235604e2824e228da37a129449931f3369f7ec5cb0bfdd896fe4a78
eap8-jboss-threads-2.5.0-1.redhat_00001.1.el8eap.src.rpm SHA-256: 2961990a6b1518500d2426dc126c1457dd49e690e3cc5ad6ed09379812537519
eap8-undertow-2.3.20-2.SP4_redhat_00001.1.el8eap.src.rpm SHA-256: 7e1d79e064461408117d6887442b62e859dd288651277da646571ec7049b1c03
eap8-wildfly-8.1.3-4.GA_redhat_00006.1.el8eap.src.rpm SHA-256: 6e4a3a3e2c8177ea3915d6d6be79399bd45f1f5efad3130e30df093cc84e59e4
eap8-wildfly-clustering-5.0.12-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: 3a2de7805550c3a38df5cdf4c6351b9033b117a0a5243e1f05b272225ab56a90
eap8-wildfly-elytron-2.6.6-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: ac5815dcc389bb782f2dc2ead9e144e795afb13bda9ea181cc421ef98d17875d
eap8-wildfly-javadocs-8.1.1-4.GA_redhat_00007.1.el8eap.src.rpm SHA-256: 820809543b5cb3fc47a1d694694990f596bc6dbcf8394bc9cec1d6650cdfea18
x86_64
eap8-apache-cxf-4.0.10-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 572c6cf223680ad76e5ab9d21c7a031567a263ee049b7f431d55fe99c56a381a
eap8-apache-cxf-rt-4.0.10-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: c09cacddce19c6f872675795ff18c487b5cfa520fb96d536ef458f9599c8b929
eap8-apache-cxf-services-4.0.10-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 96442b0e4d065ab5d495f2b6c3bf5c1490f3f43c1657c86ad936fe0865fd7a21
eap8-apache-cxf-tools-4.0.10-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: bfe57fcc17c0c9b7fc31bbd05699eeea2bda0a12b6ab44d163d40d025d3f567f
eap8-bouncycastle-1.82.0-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 9ec01513e334a12cd6140f4ba574b97cacbd032376232adc24468a9e36a521b3
eap8-bouncycastle-jmail-1.82.0-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: ec7e446650e57eb6e7a6035249f6a28b47341b10989e324eca712b24245adb83
eap8-bouncycastle-pg-1.82.0-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: c00e172d13f4f4aa92b138aa1a990fe41fd2d80450d9e4b2fa76c103ee112f30
eap8-bouncycastle-pkix-1.82.0-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 3ba62176243f5e664ab7b139ca2d49acfdd44afaf229cd104aadbe4e28034319
eap8-bouncycastle-prov-1.82.0-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: ea99e350bc3ab48501c98b154334a6c3f9a3833e1d7b5e0c2375328cbffbe402
eap8-bouncycastle-util-1.82.0-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 005ef891cc783a7a195d83d6a19948993b93379cc3e3aaf2f7ec96c631f14404
eap8-eap-product-conf-parent-801.3.0-1.GA_redhat_00001.1.el8eap.noarch.rpm SHA-256: c1d17114430eb2d17aa297fae97b5ad6fa58868149770fb6cc40d7e6be4cd936
eap8-eap-product-conf-wildfly-ee-feature-pack-801.3.0-1.GA_redhat_00001.1.el8eap.noarch.rpm SHA-256: 3751b05572d7f701494e278aed9540e663f21f1442ebed03457923c7cb9fab6b
eap8-eventstream-1.0.1-3.redhat_00003.1.el8eap.noarch.rpm SHA-256: f98ce8e4d9dba2aa08c86323b8c0de0470730e854d5b34ce1326db140ff7f6ea
eap8-hibernate-6.6.36-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 419ed81b44b21bbdeabfd008a4fa2b4c272f641958e04a96294564abb05f9ef3
eap8-hibernate-core-6.6.36-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: f7e38d6bfd8d29f06f4a340abee5120080108c5e9b897600387e40457061b899
eap8-hibernate-envers-6.6.36-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 71e655e0d584cadeb2392811ff78bbe66af099bbebec021a54f66c4722b494df
eap8-jboss-el-api_5.0_spec-4.0.2-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: a2e8b8123379830d80a13547cfcaa12c5f8b6edc84487249b4739c9639d5e90f
eap8-jboss-threads-2.5.0-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 12fec6f4570e3f92330828191bd631c068451c2c178a0979c937097465f58f30
eap8-undertow-2.3.20-2.SP4_redhat_00001.1.el8eap.noarch.rpm SHA-256: 0115e4382c8b0aae3b29889f3873cc1c497041c7091c788b35005c0b88e00d6a
eap8-wildfly-8.1.3-4.GA_redhat_00006.1.el8eap.noarch.rpm SHA-256: a2be5b8b7eece69b690fb7b0c01511cf69a37ace01dab5ceb27dc56be4717850
eap8-wildfly-clustering-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 58db4313a9fbf059c905cdc9ec87405c1fe4a4abdbd6848082092804537ebd6a
eap8-wildfly-clustering-cache-infinispan-common-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 658c2b64b87dc48b39287edc3feb7937555e15de9e5ba6faf63a2377d9df7557
eap8-wildfly-clustering-cache-infinispan-embedded-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: a84fe9772f140fd06008147db2b191998dcf30d053bf4529a75342c2d5f1fe5b
eap8-wildfly-clustering-cache-infinispan-remote-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: e8577c671aa2ab837d317123cbf23c08baa4b9e7389c5cebccec772ccad0bd8f
eap8-wildfly-clustering-cache-spi-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: dda5f1a86e7b5b4e79755017f8d336f7ba0e18ff57e32a3e1357ff10aff9b108
eap8-wildfly-clustering-context-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: eb372504ff9240ad587e3d943761996c20531c3b0acac15470bc5bc6c65ef0f0
eap8-wildfly-clustering-marshalling-jboss-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: a3a13c2eb5d091fa19da2d77be94065f4a942ab8673a0584b9d7c39c8c8cd209
eap8-wildfly-clustering-marshalling-protostream-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: d611d7f11ed8b07027e61d5be15d70592e57a15bc3d5e2111d9cabea12ad8418
eap8-wildfly-clustering-marshalling-spi-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 79ebb134e82d0ea66a12fefd8fe6fa6a3ba2f37fb4c860979838d68bcd0d6f79
eap8-wildfly-clustering-server-api-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: c27ad41221fdedae655011d19be9a71c8cd1b36a722f0c21655dd9aa8835d928
eap8-wildfly-clustering-server-infinispan-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 126302ba83d6c26144f16defe6cbdb5d97d7674f689d6dec1e5f6e85e59fed95
eap8-wildfly-clustering-server-jgroups-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 7f3d46958bccee722edb9d5e4cc095cc8478b01bcc6000c35b59a3ba7da4283d
eap8-wildfly-clustering-server-local-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 4d26387f557a00f321d527be1337a03e773639cb4e2a0e5c0e952f4f2e25e8dc
eap8-wildfly-clustering-server-spi-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: a8197daa8c797d6af0a5a3ab9d12b8e110aaf87d5a9327c1c513190ec688a38c
eap8-wildfly-clustering-session-cache-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 39014bdc54c41a0ba2bc4a55e81d00f7464b9e14c4928988340942b1a3081a80
eap8-wildfly-clustering-session-infinispan-embedded-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: d4e8d411e85f36959d5b6fe96ab35e4520abd5e88265ad04232dccd03e146c8a
eap8-wildfly-clustering-session-infinispan-remote-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: c10571719bd2c1a3ab98a33537ee2fa420a7b91b53ae96a1c69ae76655768e8b
eap8-wildfly-clustering-session-spec-servlet-6.0-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: a4e19180dd418f67653f91265116b7ec7d760487f8ba46b3b7a2cfc3a0be93e3
eap8-wildfly-clustering-session-spec-spi-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 36ac4fecddb4293fd431938c3e1f9901c71b30d0ba9a82c574c0c69c2d72ffbf
eap8-wildfly-clustering-session-spi-5.0.12-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: ad118d6c2632ab53b67116f052486ce5cd7d7ef79133b61be0abaedcdd7d45ed
eap8-wildfly-elytron-2.6.6-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: fcbb36b4a0acd0dad9d62275e73864750bee8e78ef2176ed5cf195d88b2844e2
eap8-wildfly-elytron-tool-2.6.6-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 6a2d2ee3a3b2e8f70c6ea188d1f627f1867cdf89a78fc7e62485e16ae8042124
eap8-wildfly-java-jdk17-8.1.3-4.GA_redhat_00006.1.el8eap.noarch.rpm SHA-256: 068884021babf8e2d4072d4a996ccdb9b942c85a9b984484cae868525e09746a
eap8-wildfly-java-jdk21-8.1.3-4.GA_redhat_00006.1.el8eap.noarch.rpm SHA-256: fc950df6418640d805b694812e6a05bc75e04cc0761bed347f8cbfcf5b8b7709
eap8-wildfly-javadocs-8.1.1-4.GA_redhat_00007.1.el8eap.noarch.rpm SHA-256: fed1d65df690c5b20c644a65991785141d39eb38104e0657f4b7ca05157a1383
eap8-wildfly-modules-8.1.3-4.GA_redhat_00006.1.el8eap.noarch.rpm SHA-256: e3039a41f4a63b325236fb2151e03c71ed2578aa36068f13149eb78a104b56bf

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility