{"id":"RHSA-2024:4390","summary":"Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 8.0 security update","modified":"2026-05-01T10:12:59Z","published":"2024-09-30T19:52:19Z","upstream":["CVE-2024-27316"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4390"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/8.0/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2268277"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_4390.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27316"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27316"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27316"},{"type":"ARTICLE","url":"https://httpd.apache.org/security/vulnerabilities_24.html"},{"type":"ARTICLE","url":"https://nowotarski.info/http2-continuation-flood/"},{"type":"ADVISORY","url":"https://www.kb.cert.org/vuls/id/421644"}],"affected":[{"package":{"name":"eap8-hibernate","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-hibernate"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.2.26-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-hibernate-core","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-hibernate-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.2.26-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-hibernate-envers","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-hibernate-envers"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.2.26-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-jboss-remoting","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-jboss-remoting"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.0.29-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-jboss-xnio-base","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-jboss-xnio-base"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.8.16-1.Final_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-jose4j","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-jose4j"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.9.6-1.redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-undertow","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-undertow"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.3.14-1.SP1_redhat_00001.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-wildfly","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-wildfly"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.2-5.GA_redhat_00012.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-wildfly-java-jdk11","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-wildfly-java-jdk11"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.2-5.GA_redhat_00012.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-wildfly-java-jdk17","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-wildfly-java-jdk17"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.2-5.GA_redhat_00012.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-wildfly-modules","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el8","purl":"pkg:rpm/redhat/eap8-wildfly-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.2-5.GA_redhat_00012.1.el8eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-hibernate","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-hibernate"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.2.26-1.Final_redhat_00001.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-hibernate-core","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-hibernate-core"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.2.26-1.Final_redhat_00001.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-hibernate-envers","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-hibernate-envers"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.2.26-1.Final_redhat_00001.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-jboss-remoting","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-jboss-remoting"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.0.29-1.Final_redhat_00001.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-jboss-xnio-base","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-jboss-xnio-base"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.8.16-1.Final_redhat_00001.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-jose4j","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-jose4j"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.9.6-1.redhat_00001.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-undertow","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-undertow"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.3.14-1.SP1_redhat_00001.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-wildfly","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-wildfly"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.2-5.GA_redhat_00012.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-wildfly-java-jdk11","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-wildfly-java-jdk11"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.2-5.GA_redhat_00012.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-wildfly-java-jdk17","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-wildfly-java-jdk17"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.2-5.GA_redhat_00012.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}},{"package":{"name":"eap8-wildfly-modules","ecosystem":"Red Hat:jboss_enterprise_application_platform:8.0::el9","purl":"pkg:rpm/redhat/eap8-wildfly-modules"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:8.0.2-5.GA_redhat_00012.1.el9eap"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:4390.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}