WildFly 27.0.1 is released!
WildFly 27.0.1.Final is now available for download.
It’s been about five weeks since the WildFly 27 release, so we’ve done a small bug fix update, WildFly 27.0.1. This includes an update to WildFly Preview.
The following issues were resolved in 27.0.1:
Bugs
-
[WFLY-17186] - Wrong exception handling by ManagedScheduledExecutorService.schedule(…)
-
[WFLY-17287] - Cannot persist ejb timers into database
-
[WFLY-17313] - Distributed TimerService fails when cache is configured with jdbc-store
-
[WFLY-17350] - Custom mail providers are not loaded
-
[WFLY-17352] - NoSuchElementException during scale up under load
-
[WFLY-17362] - Messaging - Transaction remained in prepared state after failover
-
[WFLY-17367] - NPE throws from WSEndpointMetrics
Component Upgrades
-
[WFLY-16807] - Upgrade RESTEasy Spring to 3.0.0.Final
-
[WFLY-17285] - Upgrade Bootable JAR to 8.1.0.Final
-
[WFLY-17341] - Upgrade Woodstox from 6.2.8 to 6.4.0 (resolves CVE-2022-40152)
-
[WFLY-17359] - Update protobuf to 3.19.6 (resolves CVE-2022-3171)
-
[WFLY-17363] - Upgrade artemis-wildfly-integration to 1.0.7
-
[WFLY-17374] - Upgrade to Xerces 2.12.0.SP05
-
[WFLY-17376] - Upgrade HAL to 3.6.5.Final (WildFly 27.0.1.Final)
-
[WFLY-17406] - Upgrade WildFly Core to 19.0.1.Final
-
[WFLY-17410] - Upgrade CXF from 3.5.2-jbossorg-3 to 3.5.2-jbossorg-4 (resolves CVE-2022-46364)
Issues resolved in the WildFly Core update included with WildFly 27.0.1 were:
Bugs
-
[WFCORE-6145] - Unbound SocketChannels do not correctly register with SocketBindingManager
-
[WFCORE-6146] - Socket binding "bind-address" and "bind-port" runtime attributes throw NPE if network channel is unbound
-
[WFCORE-6168] - Wildfly does not start when non-ascii chars are used in configuration
-
[WFCORE-6169] - Disable YAML deserialization in the YAML Configuration Extension
Component Upgrades
-
[WFCORE-6099] - Upgrade byteman to 4.0.20
-
[WFCORE-6110] - Upgrade Jandex to 3.0.3
-
[WFCORE-6111] - Upgrade Bootable JAR to 8.1.0.Final
-
[WFCORE-6132] - Upgrade sshd-common from 2.8.0 to 2.9.2 to address CVE-2022-45047
Enjoy!