First published: Mon Aug 07 2023(Updated: )
Important: Red Hat JBoss Enterprise Application Platform security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/eap7-activemq-artemis | <2.16.0-12.redhat_00048.1.el7ea | 2.16.0-12.redhat_00048.1.el7ea |
redhat/eap7-glassfish-jaf | <1.2.2-2.redhat_00002.1.el7ea | 1.2.2-2.redhat_00002.1.el7ea |
redhat/eap7-glassfish-javamail | <1.6.7-2.redhat_00003.1.el7ea | 1.6.7-2.redhat_00003.1.el7ea |
redhat/eap7-hal-console | <3.3.18-1.Final_redhat_00001.1.el7ea | 3.3.18-1.Final_redhat_00001.1.el7ea |
redhat/eap7-hibernate | <5.3.30-1.Final_redhat_00001.1.el7ea | 5.3.30-1.Final_redhat_00001.1.el7ea |
redhat/eap7-insights-java-client | <1.0.9-1.redhat_00001.1.el7ea | 1.0.9-1.redhat_00001.1.el7ea |
redhat/eap7-jboss-cert-helper | <1.0.9-1.redhat_00001.1.el7ea | 1.0.9-1.redhat_00001.1.el7ea |
redhat/eap7-jboss-ejb-client | <4.0.53-1.Final_redhat_00001.1.el7ea | 4.0.53-1.Final_redhat_00001.1.el7ea |
redhat/eap7-jboss-server-migration | <1.10.0-30.Final_redhat_00029.1.el7ea | 1.10.0-30.Final_redhat_00029.1.el7ea |
redhat/eap7-jettison | <1.5.4-1.redhat_00002.1.el7ea | 1.5.4-1.redhat_00002.1.el7ea |
redhat/eap7-picketlink-bindings | <2.5.5-27.SP12_redhat_00016.1.el7ea | 2.5.5-27.SP12_redhat_00016.1.el7ea |
redhat/eap7-picketlink-federation | <2.5.5-23.SP12_redhat_00013.1.el7ea | 2.5.5-23.SP12_redhat_00013.1.el7ea |
redhat/eap7-protostream | <4.3.5-2.Final_redhat_00003.1.el7ea | 4.3.5-2.Final_redhat_00003.1.el7ea |
redhat/eap7-undertow | <2.2.25-3.SP3_redhat_00001.1.el7ea | 2.2.25-3.SP3_redhat_00001.1.el7ea |
redhat/eap7-wildfly | <7.4.12-3.GA_redhat_00003.1.el7ea | 7.4.12-3.GA_redhat_00003.1.el7ea |
redhat/eap7-wildfly-elytron | <1.15.17-1.Final_redhat_00001.1.el7ea | 1.15.17-1.Final_redhat_00001.1.el7ea |
redhat/eap7-xalan-j2 | <2.7.1-36.redhat_00014.1.el7ea | 2.7.1-36.redhat_00014.1.el7ea |
redhat/eap7-activemq-artemis-cli | <2.16.0-12.redhat_00048.1.el7ea | 2.16.0-12.redhat_00048.1.el7ea |
redhat/eap7-activemq-artemis-commons | <2.16.0-12.redhat_00048.1.el7ea | 2.16.0-12.redhat_00048.1.el7ea |
redhat/eap7-activemq-artemis-core-client | <2.16.0-12.redhat_00048.1.el7ea | 2.16.0-12.redhat_00048.1.el7ea |
redhat/eap7-activemq-artemis-dto | <2.16.0-12.redhat_00048.1.el7ea | 2.16.0-12.redhat_00048.1.el7ea |
redhat/eap7-activemq-artemis-hornetq-protocol | <2.16.0-12.redhat_00048.1.el7ea | 2.16.0-12.redhat_00048.1.el7ea |
redhat/eap7-activemq-artemis-hqclient-protocol | <2.16.0-12.redhat_00048.1.el7ea | 2.16.0-12.redhat_00048.1.el7ea |
redhat/eap7-activemq-artemis-jdbc-store | <2.16.0-12.redhat_00048.1.el7ea | 2.16.0-12.redhat_00048.1.el7ea |
redhat/eap7-activemq-artemis-jms-client | <2.16.0-12.redhat_00048.1.el7ea | 2.16.0-12.redhat_00048.1.el7ea |
redhat/eap7-activemq-artemis-jms-server | <2.16.0-12.redhat_00048.1.el7ea | 2.16.0-12.redhat_00048.1.el7ea |
redhat/eap7-activemq-artemis-journal | <2.16.0-12.redhat_00048.1.el7ea | 2.16.0-12.redhat_00048.1.el7ea |
redhat/eap7-activemq-artemis-ra | <2.16.0-12.redhat_00048.1.el7ea | 2.16.0-12.redhat_00048.1.el7ea |
redhat/eap7-activemq-artemis-selector | <2.16.0-12.redhat_00048.1.el7ea | 2.16.0-12.redhat_00048.1.el7ea |
redhat/eap7-activemq-artemis-server | <2.16.0-12.redhat_00048.1.el7ea | 2.16.0-12.redhat_00048.1.el7ea |
redhat/eap7-activemq-artemis-service-extensions | <2.16.0-12.redhat_00048.1.el7ea | 2.16.0-12.redhat_00048.1.el7ea |
redhat/eap7-activemq-artemis-tools | <2.16.0-12.redhat_00048.1.el7ea | 2.16.0-12.redhat_00048.1.el7ea |
redhat/eap7-hibernate-core | <5.3.30-1.Final_redhat_00001.1.el7ea | 5.3.30-1.Final_redhat_00001.1.el7ea |
redhat/eap7-hibernate-entitymanager | <5.3.30-1.Final_redhat_00001.1.el7ea | 5.3.30-1.Final_redhat_00001.1.el7ea |
redhat/eap7-hibernate-envers | <5.3.30-1.Final_redhat_00001.1.el7ea | 5.3.30-1.Final_redhat_00001.1.el7ea |
redhat/eap7-hibernate-java8 | <5.3.30-1.Final_redhat_00001.1.el7ea | 5.3.30-1.Final_redhat_00001.1.el7ea |
redhat/eap7-jboss-cert-helper-debuginfo | <1.0.9-1.redhat_00001.1.el7ea | 1.0.9-1.redhat_00001.1.el7ea |
redhat/eap7-jboss-server-migration-cli | <1.10.0-30.Final_redhat_00029.1.el7ea | 1.10.0-30.Final_redhat_00029.1.el7ea |
redhat/eap7-jboss-server-migration-core | <1.10.0-30.Final_redhat_00029.1.el7ea | 1.10.0-30.Final_redhat_00029.1.el7ea |
redhat/eap7-picketlink-api | <2.5.5-23.SP12_redhat_00013.1.el7ea | 2.5.5-23.SP12_redhat_00013.1.el7ea |
redhat/eap7-picketlink-common | <2.5.5-23.SP12_redhat_00013.1.el7ea | 2.5.5-23.SP12_redhat_00013.1.el7ea |
redhat/eap7-picketlink-config | <2.5.5-23.SP12_redhat_00013.1.el7ea | 2.5.5-23.SP12_redhat_00013.1.el7ea |
redhat/eap7-picketlink-idm-api | <2.5.5-23.SP12_redhat_00013.1.el7ea | 2.5.5-23.SP12_redhat_00013.1.el7ea |
redhat/eap7-picketlink-idm-impl | <2.5.5-23.SP12_redhat_00013.1.el7ea | 2.5.5-23.SP12_redhat_00013.1.el7ea |
redhat/eap7-picketlink-idm-simple-schema | <2.5.5-23.SP12_redhat_00013.1.el7ea | 2.5.5-23.SP12_redhat_00013.1.el7ea |
redhat/eap7-picketlink-impl | <2.5.5-23.SP12_redhat_00013.1.el7ea | 2.5.5-23.SP12_redhat_00013.1.el7ea |
redhat/eap7-picketlink-wildfly8 | <2.5.5-27.SP12_redhat_00016.1.el7ea | 2.5.5-27.SP12_redhat_00016.1.el7ea |
redhat/eap7-wildfly-elytron-tool | <1.15.17-1.Final_redhat_00001.1.el7ea | 1.15.17-1.Final_redhat_00001.1.el7ea |
redhat/eap7-wildfly-java-jdk11 | <7.4.12-3.GA_redhat_00003.1.el7ea | 7.4.12-3.GA_redhat_00003.1.el7ea |
redhat/eap7-wildfly-java-jdk8 | <7.4.12-3.GA_redhat_00003.1.el7ea | 7.4.12-3.GA_redhat_00003.1.el7ea |
redhat/eap7-wildfly-javadocs | <7.4.12-3.GA_redhat_00003.1.el7ea | 7.4.12-3.GA_redhat_00003.1.el7ea |
redhat/eap7-wildfly-modules | <7.4.12-3.GA_redhat_00003.1.el7ea | 7.4.12-3.GA_redhat_00003.1.el7ea |
JBoss Enterprise Application Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:4505 is classified as Important.
To fix RHSA-2023:4505, update the affected JBoss Enterprise Application Platform packages to the provided remedial versions.
RHSA-2023:4505 affects multiple packages in the Red Hat JBoss Enterprise Application Platform, including eap7-activemq-artemis and eap7-hibernate.
You should upgrade to the specific remedial versions specified in the advisery for each affected package.
Detailed information about the vulnerabilities can be found in the Red Hat advisory for RHSA-2023:4505.