First published: Tue May 06 2025(Updated: )
Important: Red Hat JBoss Enterprise Application Platform 7.4.22 security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/eap7-apache-commons-io | <2.16.1-1.redhat_00001.1.el8ea | 2.16.1-1.redhat_00001.1.el8ea |
redhat/eap7-hal-console | <3.3.26-1.Final_redhat_00001.1.el8ea | 3.3.26-1.Final_redhat_00001.1.el8ea |
redhat/eap7-ironjacamar | <1.5.19-1.Final_redhat_00001.1.el8ea | 1.5.19-1.Final_redhat_00001.1.el8ea |
redhat/eap7-jboss-remoting | <5.0.31-1.Final_redhat_00001.1.el8ea | 5.0.31-1.Final_redhat_00001.1.el8ea |
redhat/eap7-jboss-server-migration | <1.10.0-41.Final_redhat_00041.1.el8ea | 1.10.0-41.Final_redhat_00041.1.el8ea |
redhat/eap7-weld-core | <3.1.11-1.Final_redhat_00001.1.el8ea | 3.1.11-1.Final_redhat_00001.1.el8ea |
redhat/eap7-wildfly | <7.4.22-2.GA_redhat_00001.1.el8ea | 7.4.22-2.GA_redhat_00001.1.el8ea |
redhat/eap7-wildfly-elytron | <1.15.25-1.Final_redhat_00001.1.el8ea | 1.15.25-1.Final_redhat_00001.1.el8ea |
redhat/eap7-ironjacamar-common-api | <1.5.19-1.Final_redhat_00001.1.el8ea | 1.5.19-1.Final_redhat_00001.1.el8ea |
redhat/eap7-ironjacamar-common-impl | <1.5.19-1.Final_redhat_00001.1.el8ea | 1.5.19-1.Final_redhat_00001.1.el8ea |
redhat/eap7-ironjacamar-common-spi | <1.5.19-1.Final_redhat_00001.1.el8ea | 1.5.19-1.Final_redhat_00001.1.el8ea |
redhat/eap7-ironjacamar-core-api | <1.5.19-1.Final_redhat_00001.1.el8ea | 1.5.19-1.Final_redhat_00001.1.el8ea |
redhat/eap7-ironjacamar-core-impl | <1.5.19-1.Final_redhat_00001.1.el8ea | 1.5.19-1.Final_redhat_00001.1.el8ea |
redhat/eap7-ironjacamar-deployers-common | <1.5.19-1.Final_redhat_00001.1.el8ea | 1.5.19-1.Final_redhat_00001.1.el8ea |
redhat/eap7-ironjacamar-jdbc | <1.5.19-1.Final_redhat_00001.1.el8ea | 1.5.19-1.Final_redhat_00001.1.el8ea |
redhat/eap7-ironjacamar-validator | <1.5.19-1.Final_redhat_00001.1.el8ea | 1.5.19-1.Final_redhat_00001.1.el8ea |
redhat/eap7-jboss-server-migration-cli | <1.10.0-41.Final_redhat_00041.1.el8ea | 1.10.0-41.Final_redhat_00041.1.el8ea |
redhat/eap7-jboss-server-migration-core | <1.10.0-41.Final_redhat_00041.1.el8ea | 1.10.0-41.Final_redhat_00041.1.el8ea |
redhat/eap7-weld-core-impl | <3.1.11-1.Final_redhat_00001.1.el8ea | 3.1.11-1.Final_redhat_00001.1.el8ea |
redhat/eap7-weld-core-jsf | <3.1.11-1.Final_redhat_00001.1.el8ea | 3.1.11-1.Final_redhat_00001.1.el8ea |
redhat/eap7-weld-ejb | <3.1.11-1.Final_redhat_00001.1.el8ea | 3.1.11-1.Final_redhat_00001.1.el8ea |
redhat/eap7-weld-jta | <3.1.11-1.Final_redhat_00001.1.el8ea | 3.1.11-1.Final_redhat_00001.1.el8ea |
redhat/eap7-weld-probe-core | <3.1.11-1.Final_redhat_00001.1.el8ea | 3.1.11-1.Final_redhat_00001.1.el8ea |
redhat/eap7-weld-web | <3.1.11-1.Final_redhat_00001.1.el8ea | 3.1.11-1.Final_redhat_00001.1.el8ea |
redhat/eap7-wildfly-elytron-tool | <1.15.25-1.Final_redhat_00001.1.el8ea | 1.15.25-1.Final_redhat_00001.1.el8ea |
redhat/eap7-wildfly-java-jdk11 | <7.4.22-2.GA_redhat_00001.1.el8ea | 7.4.22-2.GA_redhat_00001.1.el8ea |
redhat/eap7-wildfly-java-jdk17 | <7.4.22-2.GA_redhat_00001.1.el8ea | 7.4.22-2.GA_redhat_00001.1.el8ea |
redhat/eap7-wildfly-java-jdk8 | <7.4.22-2.GA_redhat_00001.1.el8ea | 7.4.22-2.GA_redhat_00001.1.el8ea |
redhat/eap7-wildfly-javadocs | <7.4.22-2.GA_redhat_00001.1.el8ea | 7.4.22-2.GA_redhat_00001.1.el8ea |
redhat/eap7-wildfly-modules | <7.4.22-2.GA_redhat_00001.1.el8ea | 7.4.22-2.GA_redhat_00001.1.el8ea |
JBoss Enterprise Application Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:4549 is classified as important.
To fix RHSA-2025:4549, you should update to the latest available versions of the affected packages as specified in the advisory.
Affected packages include eap7-apache-commons-io, eap7-hal-console, eap7-ironjacamar, eap7-jboss-remoting, and several others listed in the advisory.
Yes, RHSA-2025:4549 is specifically a security update for Red Hat JBoss Enterprise Application Platform 7.4.22.
If you cannot apply the update immediately, consider reviewing your system for potential exposure and implement temporary security measures until the update can be applied.