Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2026:4916 - Security Advisory
Issued:
2026-03-18
Updated:
2026-03-18

RHSA-2026:4916 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: Red Hat JBoss Enterprise Application Platform 7.4.24 security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.4.24 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.4.23, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.4.24 Release Notes for information about the most significant bug fixes and enhancements included in this release.

Security Fix(es):

  • jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)
  • undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF [eap-7.4.z] (CVE-2025-12543)
  • cxf: CXF JMS Code Execution Vulnerability [eap-7.4.z] (CVE-2025-48913)
  • netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability (CVE-2025-55163)
  • org.eclipse.jgit: XXE vulnerability in Eclipse JGit [eap-7.4.z] (CVE-2025-4949)
  • hibernate-core: Hibernate: Information disclosure and data deletion via second-order SQL injection [eap-7.4.z] (CVE-2026-0603)
  • com.google.protobuf/protobuf-java: StackOverflow vulnerability in Protocol Buffers (CVE-2024-7254)
  • undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded [eap-7.4.z] (CVE-2024-3884)
  • undertow-core: Undertow MadeYouReset HTTP/2 DDoS Vulnerability (CVE-2025-9784)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258

Affected Products

  • JBoss Enterprise Application Platform 7.4 ELS 7.4 for RHEL 8 x86_64

Fixes

  • BZ - 2275287 - CVE-2024-3884 undertow: OutOfMemory when parsing form data encoding with application/x-www-form-urlencoded
  • BZ - 2313454 - CVE-2024-7254 protobuf: StackOverflow vulnerability in Protocol Buffers
  • BZ - 2367730 - CVE-2025-4949 org.eclipse.jgit: XXE vulnerability in Eclipse JGit
  • BZ - 2374804 - CVE-2025-52999 com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError
  • BZ - 2387221 - CVE-2025-48913 org.apache.cxf/cxf: CXF JMS Code Execution Vulnerability
  • BZ - 2388252 - CVE-2025-55163 netty: netty-codec-http2: Netty MadeYouReset HTTP/2 DDoS Vulnerability
  • BZ - 2392306 - CVE-2025-9784 undertow: Undertow MadeYouReset HTTP/2 DDoS Vulnerability
  • BZ - 2408784 - CVE-2025-12543 undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF
  • BZ - 2427147 - CVE-2026-0603 org.hibernate/hibernate-core: Hibernate: Information disclosure and data deletion via second-order SQL injection
  • JBEAP-30075 - Tracker bug for the EAP 7.4.24 release for RHEL-8

CVEs

  • CVE-2024-3884
  • CVE-2024-7254
  • CVE-2025-4949
  • CVE-2025-9784
  • CVE-2025-12543
  • CVE-2025-48913
  • CVE-2025-52999
  • CVE-2025-55163
  • CVE-2026-0603

References

  • https://access.redhat.com/security/updates/classification/#important
  • https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4
  • https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index
Note: More recent versions of these packages may be available. Click a package name for more details.

JBoss Enterprise Application Platform 7.4 ELS 7.4 for RHEL 8

SRPM
eap7-apache-commons-beanutils-1.11.0-2.redhat_00001.1.el8eap.src.rpm SHA-256: 3cb0b1abfdc49bc36cfa569d3f3d0e34c43732a2a20c6e88f6b3c917c5617365
eap7-apache-cxf-3.5.11-1.SP1_redhat_00001.1.el8eap.src.rpm SHA-256: 930b167560eaf54f510093d799d38a151875af9f88e6d4e7a08ae1bcf3535779
eap7-eclipse-jgit-5.13.5.202508271544-2.r_redhat_00001.1.el8eap.src.rpm SHA-256: eb28295a2f8e2a196da5e3b460031b56ed235f2c1b5da06080fc61248c19adb1
eap7-elytron-web-1.9.6-2.Final_redhat_00001.1.el8eap.src.rpm SHA-256: f45850cb0d5711b930bc88f7033053b3786ead6ca77350a9882c9d229a7d7078
eap7-glassfish-jsf-2.3.14-10.SP10_redhat_00001.1.el8eap.src.rpm SHA-256: 369f5dc40473e3de12824c7f859ab535284bfda874b62f37983bfd2b1768c822
eap7-hal-console-3.3.27-2.Final_redhat_00001.1.el8eap.src.rpm SHA-256: 9940ce3f343ff29fa268bfd1710355aaa120e5c76721d5cae1faacd4f7bce770
eap7-hibernate-5.3.38-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: 91bae33ca637ea834167c0948a2aa700d47b3d0600d07c381c6a49b7b763c957
eap7-hibernate-validator-6.0.23-4.SP2_redhat_00001.1.el8eap.src.rpm SHA-256: 0eaa04bbf10243a014616974c89f5a1b1c29822e2a37b2494656fb8783bceb6d
eap7-ironjacamar-1.5.24-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: eeb05bf523ba3f7ce90edb3e590884e5695f1c176aa413a6a5c8b33968b092d6
eap7-jboss-marshalling-2.0.16-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: e41af15bbccccd4d06c6de2f875495aef451571b9e089fff94484ff4518f08a4
eap7-jboss-server-migration-1.10.0-43.Final_redhat_00043.1.el8eap.src.rpm SHA-256: 7707876156eaf37898cf53a66594cb4e64d5ff911ded3955ec89fdfe845d044d
eap7-jbossws-cxf-5.4.17-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: b4f4cd29819d3b8b34419b3f065ef2776698ccd359fd48f0f59416d55fcae4a4
eap7-netty-4.1.124-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: da983bc5e85c797fc6abf7c335504429a77998f0874af5a41332135cf987f9e8
eap7-netty-transport-native-epoll-4.1.124-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: 32ebb86e7fdc5f0b1f5c6b6e676687b9e39cf345075cd0332401d4480bf6aa15
eap7-resteasy-3.15.11-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: 91ecddd2a7ff1df5ce9495f3c4886b6fef622e5397916124db3c6d19f647929d
eap7-undertow-2.2.39-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: b5dfaffcd5b4689b1227964ee3449e7fa5db76c76871cb673b43e1624a83efa8
eap7-wildfly-7.4.24-4.GA_redhat_00002.1.el8eap.src.rpm SHA-256: c53c975e0a715be8061d2db8ad49ee63279ed0f7f2c09f31d6a1d8efa8ed9c52
eap7-wildfly-elytron-1.15.27-1.Final_redhat_00002.1.el8eap.src.rpm SHA-256: 6117731c2c55a69a7d2c632f392ad0e3cc50498ef16d80c43bede5079ad82639
x86_64
eap7-apache-commons-beanutils-1.11.0-2.redhat_00001.1.el8eap.noarch.rpm SHA-256: 96af4b8d863e6dd13880fea9f5353c7a569a12129d36780fe28874c2c5035e04
eap7-apache-cxf-3.5.11-1.SP1_redhat_00001.1.el8eap.noarch.rpm SHA-256: 6e06ce3dff8156357fbca8f16027a620d3b80ae7282ddca3b909b876a6344f19
eap7-apache-cxf-rt-3.5.11-1.SP1_redhat_00001.1.el8eap.noarch.rpm SHA-256: 5096fcf86f9fbef68742642a2ab1cf1079c6bd3ee096ca25ddb6c7430026f317
eap7-apache-cxf-services-3.5.11-1.SP1_redhat_00001.1.el8eap.noarch.rpm SHA-256: fb97337923e0129d4e368342bc3b963ee2e9fd9a9b444c5a29b9053369b6ef35
eap7-apache-cxf-tools-3.5.11-1.SP1_redhat_00001.1.el8eap.noarch.rpm SHA-256: cbe11b560a962b86723c7412a9b40b915c1ae9ce9caa78af1124fef7000e6261
eap7-eclipse-jgit-5.13.5.202508271544-2.r_redhat_00001.1.el8eap.noarch.rpm SHA-256: 04a6c738cbbd67c349ded3cd3aa260048b50628321e8fcff3f2aeadf0b10ead4
eap7-glassfish-jsf-2.3.14-10.SP10_redhat_00001.1.el8eap.noarch.rpm SHA-256: 349e35a1b0c629bd43dc888f400e526e1524fa58b08bb706ffe2fae503ba8cf7
eap7-hal-console-3.3.27-2.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 49dcee731726fa9d748463766077bb3740aa081dd946ef65244eeee6c7ed610c
eap7-hibernate-5.3.38-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 68943b4072ac4d360798979d87eeb9343905d5711f40549a805d673787fb28e1
eap7-hibernate-core-5.3.38-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 0cbd4336f81c6fb072a7c62cc309cf220be47dabcfb3b4dcbf4d5c46f6fa5958
eap7-hibernate-entitymanager-5.3.38-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: e09d9ff4f72ca2afff3caa065abbb04256b5fba78d4fd0cbf8f8f66bea7f8a33
eap7-hibernate-envers-5.3.38-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: eadcf01eecd34036f7b4c367015c371b9952efa94c8e0ffaffa18c873c48328b
eap7-hibernate-java8-5.3.38-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 3c5a5e2a8dd636894c3914b6c6e61f7d207d7d81111346115d6d6b43a202c11c
eap7-hibernate-validator-6.0.23-4.SP2_redhat_00001.1.el8eap.noarch.rpm SHA-256: a041aebb00bf76403c04e253c322acab78f3742359e96b9c963ff873259a4835
eap7-hibernate-validator-cdi-6.0.23-4.SP2_redhat_00001.1.el8eap.noarch.rpm SHA-256: a1e33a925de46f0a0b49f79fada8a727b306859ff073181fd0534d5f4e4c59a8
eap7-ironjacamar-1.5.24-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 074ae03198f19fed99dcf8ac0bed1b8882b46807483576cf403cb4bd514a7b26
eap7-ironjacamar-common-api-1.5.24-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 2b8809498b7aa2785f150dac00a91339c7f95801d01244ce5723b8284031df17
eap7-ironjacamar-common-impl-1.5.24-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 4f938d820e5670548eb305962bd3273672a79686f96d22e005826d56561a002f
eap7-ironjacamar-common-spi-1.5.24-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 7ea8dd76dd41532535f09b09caee4f31ac53714feb69eca0a2e7575bb7131875
eap7-ironjacamar-core-api-1.5.24-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: f855d66c49ca218f7c822add15c9442fb066e049cba2ddceb5ec33dbc71cf38f
eap7-ironjacamar-core-impl-1.5.24-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 19bcb6d7c3699e687d0f49fd4ed366ea462f2e427e55beda6b41b6b14e42ed1a
eap7-ironjacamar-deployers-common-1.5.24-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 643d7f441fef811e12e98440cc6689760746f9a07058874bd00089dc50c4d801
eap7-ironjacamar-jdbc-1.5.24-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: ffa398f61e4f343f574d42e5890f370269811d9ce3be039e0d61033a6c7e0fb6
eap7-ironjacamar-validator-1.5.24-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 7d43d0da8b7678859a447023b517e45300d99bebcfb138fdfd51f2028bf277a8
eap7-jboss-marshalling-2.0.16-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 3ede48433ce6ee7d9fd594ea28e764450ef5d2551770df4079ae3b306bf5db64
eap7-jboss-marshalling-river-2.0.16-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 36fb688e3504ec1bbc137528196a0d8a78de4a34ef9e610452e9e8cfd65ae604
eap7-jboss-server-migration-1.10.0-43.Final_redhat_00043.1.el8eap.noarch.rpm SHA-256: 37070fa9336fb947ea1d81109fd782bbc262d988708874a0d6163235f7c4ce56
eap7-jboss-server-migration-cli-1.10.0-43.Final_redhat_00043.1.el8eap.noarch.rpm SHA-256: 27df5bd75717ea233dff3f14123b84a355cf868977d02daf47228868857420d9
eap7-jboss-server-migration-core-1.10.0-43.Final_redhat_00043.1.el8eap.noarch.rpm SHA-256: 1c87aa50ec6bcffa69470abaf946c6b42cbeb011c00f951f8057c1fcf01f8ffc
eap7-jbossws-cxf-5.4.17-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: db9fc97923807d8d3d855035c3e856062fb35bab39b7b1b23f5c44d722ddf236
eap7-netty-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 759fa16d8de63e7427a69fca2ef68dd548a0cfdeada644f80c14d8fc101c3c30
eap7-netty-all-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: fccc4b31bb2db3a78d49970ac2c6ac6ebf35962cc4d264484b84dc85e2727261
eap7-netty-buffer-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: b4bbe79dc7790271a06e8ea51bf8cfb0c92b631cb6ca06e298ff854520e057a6
eap7-netty-codec-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 1e8bff9577e380569a4cdcdf740f3077acff3f1a571efb80853436ba90879018
eap7-netty-codec-dns-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: d5f57a9443ba43f447257ac7e1d79bd375e99fd4f059a980ef19cbd4dfb55aff
eap7-netty-codec-haproxy-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 4f1f6b8e6419f9c139eaf37a483f7797f0eb52610853e56d85e140af1f7737b1
eap7-netty-codec-http-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 3313e46811158290dacbef7249474bd06f929db6e94c1ee488c0b4bf2d449139
eap7-netty-codec-http2-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 3ea75f3840f45b096820032c24075fcb6f9c7249f070e84bdba56d4bae685a58
eap7-netty-codec-memcache-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: ef024273545e8217b432d9c5144fca6c4490c9012134b511c927a1b1aaa287cb
eap7-netty-codec-mqtt-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: bbe5496086b3e8fc56821bf076e3801e122139654457db14ccf997f4e7b9abec
eap7-netty-codec-redis-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: c016726e55efdfdb149e06bc57aaaabd0f08f790d29dfb2536dc7bc9ca1b23be
eap7-netty-codec-smtp-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 976cf6c60d35b5f88fc1711787dcd23d53a443a001d0f09b4b3801345a91c8be
eap7-netty-codec-socks-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 0ee2a6ab4a8d7b0f3c7615bc9836d43d0132b704eecda7dd4cad35d1d7829265
eap7-netty-codec-stomp-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 3e7d97dd7bde450a1408e3371e87099cd833f79bc979d93228948ea58b20f6d3
eap7-netty-codec-xml-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: da1bd8d31f6295dd508e1481f23fe6ecefe8c21b3a1ce05acc1bb1dbe5c75a66
eap7-netty-common-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 6135890092fb4cb39beccbc7014768a78bc8ec8b87b6c482cd45fef84d798260
eap7-netty-handler-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 23a15c99f3868fa8c570c5948930f9d9436308ac84101184218db94ccf32b743
eap7-netty-handler-proxy-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 15f51b26f3b486a7ac8bba58965c8086be8d6a71f7465e22a36fcff5e0da9a29
eap7-netty-resolver-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 4ade99f9131a758728ce38f600d8f63962217b9856c28214ec0539d012cad970
eap7-netty-resolver-dns-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 5e3d0c881d3cb08a1bb28c21481f79301cd0b39c120ff47482380ae9a71ce134
eap7-netty-resolver-dns-classes-macos-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: c82a361113f24220014956086fa11065f16de87c19c24c6e0fac25aa2a4e0cb5
eap7-netty-transport-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: b6fc2150875e6965d8f671f8f311cc867dc79d289deaf927a0d37fa65c6ac5ec
eap7-netty-transport-classes-epoll-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 155698314cf29873eaa546467b9c283ca887ef38f60155c4418ea94735be9f27
eap7-netty-transport-classes-kqueue-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 839be9095fb1f62c896bb07e6526a30222ba18e82579e14d94c8c8b14d6ee586
eap7-netty-transport-native-epoll-4.1.124-1.Final_redhat_00001.1.el8eap.x86_64.rpm SHA-256: d430afb610b13ec421fda5e960ad2acd68e185b635308031e305877644b3e31a
eap7-netty-transport-native-epoll-debuginfo-4.1.124-1.Final_redhat_00001.1.el8eap.x86_64.rpm SHA-256: 2235b7cd3983e93322289e5692d752bd26f1ce2088c8a4f0009e30d3a87c8e6a
eap7-netty-transport-native-unix-common-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 41efbea119405c7529a92697e0a355234a1bead9c0a11a5e32b703e1782f01b1
eap7-netty-transport-sctp-4.1.124-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 883470d4d6523fa433cddadd468bfeac07b5bda8134c6ecc8c685b069cc72d15
eap7-resteasy-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: a985c0c7c0f0ce1981381f3c77c5fae166a089115d752f76fb1c810e22eeace2
eap7-resteasy-atom-provider-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 24a66cb17897e0479e9d9908bf937d95a3716b72a04c4f2ec77611813f298cfd
eap7-resteasy-cdi-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: e3e6f3728d300c32bbd13c3efaf3f112a946cdce2f43ba8d04789bc2d2bc3126
eap7-resteasy-client-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 4dbefff532baabe307c4aea3a37350f65a49b9c0a2207daf7cbc84ba4436bcab
eap7-resteasy-crypto-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 8608f679d5dfc4f8b9f93b57e1cfdb2365bf58c0371a20bf6ba7119e48c828e2
eap7-resteasy-jackson-provider-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 3b9d5f3ee0862e8b54cc2b2112095d7c10ca316ce36c6bc9e0599c37b742de34
eap7-resteasy-jackson2-provider-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 446e9ce29d11fe60035949209c7179290b34885b47421cb1737270cce47276f7
eap7-resteasy-jaxb-provider-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: f1333705b18c59b28512ea49bcb2dd6860d9c3f20e48f9a6aa7d0567baad5af5
eap7-resteasy-jaxrs-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: a1401cc8a88376fed8125e0d4c6eeba246f640f0c1ef216715ef71a076093ff5
eap7-resteasy-jettison-provider-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: c2235ef5129e188d5d68eda14f9be1833008ab9502b6bfbc8203ef5ff3d420a5
eap7-resteasy-jose-jwt-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 96f430dba68e87305bd88b71b0667665e06d6a45708cf653dff6ea47a87ae018
eap7-resteasy-jsapi-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 6c9ba72e95ff440468d3f3f89030903ed29b27b75bc76eff0092ee470571943b
eap7-resteasy-json-binding-provider-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: dec18c7b43b97dbd0ad325e0f4f1cb9f97893cb768dec3538f13c669e0139111
eap7-resteasy-json-p-provider-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: d0d1fbf04b769efb662ba763a69ca8b41eacfe759b70254fbce180540ff5b9ea
eap7-resteasy-multipart-provider-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 91de64ab9a61e098948fe1d3a77255e5c28f254db9fa6926b67d2c24711f179d
eap7-resteasy-rxjava2-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 8a3fc9b4308ce1b746c8aefc297021df285cc52cf8b6bdc53bfeb0ed31bb6173
eap7-resteasy-spring-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: e5ef19bb2722d98abc5e1610834053c51013a52dc567d67099ab4c0924e9d75c
eap7-resteasy-validator-provider-11-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 79a00faa71b7e0dbee9e9ce3664f058fdd36d261103194e8d72a1c08345ba272
eap7-resteasy-yaml-provider-3.15.11-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 0ce14dddd9f6abe522fb79505a430cb72be29f7e4ba4ea8cd0d3015cd20a759c
eap7-undertow-2.2.39-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: e38f8d7d18572579dfcf3f4ab474b68be03d436ef85b41676dd9015399501855
eap7-undertow-server-1.9.6-2.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: bed8104c5ac203a5da0d1980caad20b1e5d8d6678693fdcd461a900ec52dca75
eap7-wildfly-7.4.24-4.GA_redhat_00002.1.el8eap.noarch.rpm SHA-256: f493f847100e6b2b33252267879562c9b8daaa0ea06ae16a75317f775a30aa30
eap7-wildfly-elytron-1.15.27-1.Final_redhat_00002.1.el8eap.noarch.rpm SHA-256: f1e36f98c9d1d58a2436aea852e01cdaab73847f78ff0c52bf2dc0e422b3d952
eap7-wildfly-elytron-tool-1.15.27-1.Final_redhat_00002.1.el8eap.noarch.rpm SHA-256: 531ae7c16e859c3e551f1d4a591314487a3553967166878c6dbe256377e9f4b4
eap7-wildfly-java-jdk11-7.4.24-4.GA_redhat_00002.1.el8eap.noarch.rpm SHA-256: d374676259da99f8e623132e620b752f8fb1d706b850d08fce7be28dd4f93666
eap7-wildfly-java-jdk17-7.4.24-4.GA_redhat_00002.1.el8eap.noarch.rpm SHA-256: 6e4bdaa3ea51f1c1e3b4b841035e0618765b9ba56f641f6b5b28288b5da08e5d
eap7-wildfly-java-jdk8-7.4.24-4.GA_redhat_00002.1.el8eap.noarch.rpm SHA-256: 47c3166d9ba5a447b114994891d6afa0d4f4558a6f970ca8b72671d6e91e4c9d
eap7-wildfly-javadocs-7.4.24-4.GA_redhat_00002.1.el8eap.noarch.rpm SHA-256: 62186200da13c7901ca53b5e0547769b1ed41e314ac88183ff5614d82f6be5fe
eap7-wildfly-modules-7.4.24-4.GA_redhat_00002.1.el8eap.noarch.rpm SHA-256: 94dc87a4ca6caf183f4e70a0a40329cdaff9440e15c2acec40e8baa897e8388f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility