{"id":"RHSA-2021:3658","summary":"Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.1 security update on RHEL 8","modified":"2026-04-02T10:02:03Z","published":"2024-09-20T15:04:40Z","upstream":["CVE-2020-13936","CVE-2021-21295","CVE-2021-21409","CVE-2021-28170","CVE-2021-29425","CVE-2021-3536","CVE-2021-3597","CVE-2021-3642","CVE-2021-3644","CVE-2021-3690"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2021:3658"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1937364"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1937440"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1944888"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1948001"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1948752"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1965497"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1970930"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1976052"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1981407"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1991299"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-18402"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21231"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21257"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21258"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21261"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21263"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21270"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21276"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21277"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21281"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21300"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21309"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21313"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21472"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21569"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21777"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21781"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21818"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21961"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-21978"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-22009"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-22084"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-22088"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-22160"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-22209"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-22318"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/JBEAP-22319"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3658.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-13936"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-13936"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-13936"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3536"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3536"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3536"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3597"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3597"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3597"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3642"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3642"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3642"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3644"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3644"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3644"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-3690"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-3690"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3690"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-21295"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-21295"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21295"},{"type":"ARTICLE","url":"https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-21409"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-21409"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-21409"},{"type":"ARTICLE","url":"https://github.com/netty/netty/security/advisories/GHSA-f256-j965-7f32"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-28170"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-28170"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-28170"},{"type":"ARTICLE","url":"https://securitylab.github.com/advisories/GHSL-2020-021-jakarta-el/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-29425"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-29425"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-29425"}],"affected":[{"package":{"name":"eap7-velocity","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-velocity"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.3.0-1.redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:3658.json"}},{"package":{"name":"eap7-velocity-engine-core","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-velocity-engine-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.3.0-1.redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:3658.json"}},{"package":{"name":"eap7-wildfly","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-wildfly"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.4.1-2.GA_redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:3658.json"}},{"package":{"name":"eap7-wildfly-javadocs","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-wildfly-javadocs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.4.1-2.GA_redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:3658.json"}},{"package":{"name":"eap7-wildfly-modules","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-wildfly-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:7.4.1-2.GA_redhat_00003.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:3658.json"}},{"package":{"name":"eap7-undertow","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-undertow"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.9-2.SP1_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:3658.json"}},{"package":{"name":"eap7-wildfly-elytron","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-wildfly-elytron"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.15.5-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:3658.json"}},{"package":{"name":"eap7-wildfly-elytron-tool","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-wildfly-elytron-tool"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.15.5-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:3658.json"}},{"package":{"name":"eap7-netty","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-netty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.63-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:3658.json"}},{"package":{"name":"eap7-netty-all","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-netty-all"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.1.63-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:3658.json"}},{"package":{"name":"eap7-jakarta-el","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-jakarta-el"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.3-2.redhat_00006.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:3658.json"}},{"package":{"name":"eap7-apache-commons-io","ecosystem":"Red Hat:jboss_enterprise_application_platform:7.4::el8","purl":"pkg:rpm/redhat/eap7-apache-commons-io"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.10.0-1.redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2021:3658.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}