-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: slf4j security update
Advisory ID:       RHSA-2018:0592-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:0592
Issue date:        2018-03-26
CVE Names:         CVE-2018-8088 
====================================================================
1. Summary:

An update for slf4j is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Client Optional (v. 7) - noarch
Red Hat Enterprise Linux ComputeNode (v. 7) - noarch
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch
Red Hat Enterprise Linux Server (v. 7) - noarch
Red Hat Enterprise Linux Server Optional (v. 7) - noarch
Red Hat Enterprise Linux Workstation (v. 7) - noarch
Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - noarch
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - noarch

3. Description:

The Simple Logging Facade for Java or (SLF4J) is a simple facade for
various logging APIs allowing the end-user to plug in the desired
implementation at deployment time. SLF4J also allows for a gradual
migration path away from Jakarta Commons Logging (JCL).

Security Fix(es):

* slf4j: Deserialisation vulnerability in EventData constructor can allow
for arbitrary code execution (CVE-2018-8088)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

Red Hat would like to thank Chris McCown for reporting this issue.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1548909 - CVE-2018-8088 slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution

6. Package List:

Red Hat Enterprise Linux Client Optional (v. 7):

Source:
slf4j-1.7.4-4.el7_4.src.rpm

noarch:
slf4j-1.7.4-4.el7_4.noarch.rpm
slf4j-javadoc-1.7.4-4.el7_4.noarch.rpm
slf4j-manual-1.7.4-4.el7_4.noarch.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
slf4j-1.7.4-4.el7_4.src.rpm

noarch:
slf4j-1.7.4-4.el7_4.noarch.rpm

Red Hat Enterprise Linux ComputeNode Optional (v. 7):

noarch:
slf4j-javadoc-1.7.4-4.el7_4.noarch.rpm
slf4j-manual-1.7.4-4.el7_4.noarch.rpm

Red Hat Enterprise Linux Server (v. 7):

Source:
slf4j-1.7.4-4.el7_4.src.rpm

noarch:
slf4j-1.7.4-4.el7_4.noarch.rpm

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):

Source:
slf4j-1.7.4-4.el7_4.src.rpm

noarch:
slf4j-1.7.4-4.el7_4.noarch.rpm

Red Hat Enterprise Linux Server Optional (v. 7):

noarch:
slf4j-javadoc-1.7.4-4.el7_4.noarch.rpm
slf4j-manual-1.7.4-4.el7_4.noarch.rpm

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):

noarch:
slf4j-javadoc-1.7.4-4.el7_4.noarch.rpm
slf4j-manual-1.7.4-4.el7_4.noarch.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source:
slf4j-1.7.4-4.el7_4.src.rpm

noarch:
slf4j-1.7.4-4.el7_4.noarch.rpm

Red Hat Enterprise Linux Workstation Optional (v. 7):

noarch:
slf4j-javadoc-1.7.4-4.el7_4.noarch.rpm
slf4j-manual-1.7.4-4.el7_4.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-8088
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFauU9pXlSAg2UNWIIRAq5nAJ43DFuDCDID+XOZbqzAVYLT1FfH8QCfT3a0
zGEVfR4/IZha9mgrcCMOJFo=Jvxx
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2018-0592:01 Important: slf4j security update

An update for slf4j is now available for Red Hat Enterprise Linux 7

Summary

The Simple Logging Facade for Java or (SLF4J) is a simple facade for various logging APIs allowing the end-user to plug in the desired implementation at deployment time. SLF4J also allows for a gradual migration path away from Jakarta Commons Logging (JCL).
Security Fix(es):
* slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution (CVE-2018-8088)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Red Hat would like to thank Chris McCown for reporting this issue.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2018-8088 https://access.redhat.com/security/updates/classification/#important

Package List

Red Hat Enterprise Linux Client Optional (v. 7):
Source: slf4j-1.7.4-4.el7_4.src.rpm
noarch: slf4j-1.7.4-4.el7_4.noarch.rpm slf4j-javadoc-1.7.4-4.el7_4.noarch.rpm slf4j-manual-1.7.4-4.el7_4.noarch.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: slf4j-1.7.4-4.el7_4.src.rpm
noarch: slf4j-1.7.4-4.el7_4.noarch.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
noarch: slf4j-javadoc-1.7.4-4.el7_4.noarch.rpm slf4j-manual-1.7.4-4.el7_4.noarch.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: slf4j-1.7.4-4.el7_4.src.rpm
noarch: slf4j-1.7.4-4.el7_4.noarch.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
Source: slf4j-1.7.4-4.el7_4.src.rpm
noarch: slf4j-1.7.4-4.el7_4.noarch.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch: slf4j-javadoc-1.7.4-4.el7_4.noarch.rpm slf4j-manual-1.7.4-4.el7_4.noarch.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):
noarch: slf4j-javadoc-1.7.4-4.el7_4.noarch.rpm slf4j-manual-1.7.4-4.el7_4.noarch.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: slf4j-1.7.4-4.el7_4.src.rpm
noarch: slf4j-1.7.4-4.el7_4.noarch.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
noarch: slf4j-javadoc-1.7.4-4.el7_4.noarch.rpm slf4j-manual-1.7.4-4.el7_4.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2018:0592-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2018:0592
Issued Date: : 2018-03-26
CVE Names: CVE-2018-8088

Topic

An update for slf4j is now available for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux Client Optional (v. 7) - noarch

Red Hat Enterprise Linux ComputeNode (v. 7) - noarch

Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch

Red Hat Enterprise Linux Server (v. 7) - noarch

Red Hat Enterprise Linux Server Optional (v. 7) - noarch

Red Hat Enterprise Linux Workstation (v. 7) - noarch

Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - noarch

Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - noarch


Bugs Fixed

1548909 - CVE-2018-8088 slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution


Related News