RedHat: RHSA-2018-2276:01 Important: Red Hat JBoss Enterprise Application
Summary
Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on Wildfly.
This asynchronous patch is a security update for wildfly-core and
apache-cxf packages in Red Hat JBoss Enterprise Application Platform 7.1
Security Fix(es):
* apache-cxf: TLS hostname verification does not work correctly with
com.sun.net.ssl.* (CVE-2018-8039)
* wildfly-core: Path traversal can allow the extraction of .war archives to
write arbitrary files. (CVE-2018-10862)
Summary
Solution
Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.
The JBoss server process must be restarted for the update to take effect.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
References
https://access.redhat.com/security/cve/CVE-2018-8039 https://access.redhat.com/security/cve/CVE-2018-10862 https://access.redhat.com/security/updates/classification/#important
Package List
Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6 Server:
Source:
eap7-apache-cxf-3.1.16-1.redhat_1.1.ep7.el6.src.rpm
eap7-wildfly-7.1.3-4.GA_redhat_3.1.ep7.el6.src.rpm
eap7-wss4j-2.1.12-1.redhat_1.1.ep7.el6.src.rpm
eap7-xml-security-2.0.10-1.redhat_1.1.ep7.el6.src.rpm
noarch:
eap7-apache-cxf-3.1.16-1.redhat_1.1.ep7.el6.noarch.rpm
eap7-apache-cxf-rt-3.1.16-1.redhat_1.1.ep7.el6.noarch.rpm
eap7-apache-cxf-services-3.1.16-1.redhat_1.1.ep7.el6.noarch.rpm
eap7-apache-cxf-tools-3.1.16-1.redhat_1.1.ep7.el6.noarch.rpm
eap7-wildfly-7.1.3-4.GA_redhat_3.1.ep7.el6.noarch.rpm
eap7-wildfly-modules-7.1.3-4.GA_redhat_3.1.ep7.el6.noarch.rpm
eap7-wss4j-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm
eap7-wss4j-bindings-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm
eap7-wss4j-policy-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm
eap7-wss4j-ws-security-common-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm
eap7-wss4j-ws-security-dom-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm
eap7-wss4j-ws-security-policy-stax-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm
eap7-wss4j-ws-security-stax-2.1.12-1.redhat_1.1.ep7.el6.noarch.rpm
eap7-xml-security-2.0.10-1.redhat_1.1.ep7.el6.noarch.rpm
Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7 Server:
Source:
eap7-apache-cxf-3.1.16-1.redhat_1.1.ep7.el7.src.rpm
eap7-wildfly-7.1.3-4.GA_redhat_3.1.ep7.el7.src.rpm
eap7-wss4j-2.1.12-1.redhat_1.1.ep7.el7.src.rpm
eap7-xml-security-2.0.10-1.redhat_1.1.ep7.el7.src.rpm
noarch:
eap7-apache-cxf-3.1.16-1.redhat_1.1.ep7.el7.noarch.rpm
eap7-apache-cxf-rt-3.1.16-1.redhat_1.1.ep7.el7.noarch.rpm
eap7-apache-cxf-services-3.1.16-1.redhat_1.1.ep7.el7.noarch.rpm
eap7-apache-cxf-tools-3.1.16-1.redhat_1.1.ep7.el7.noarch.rpm
eap7-wildfly-7.1.3-4.GA_redhat_3.1.ep7.el7.noarch.rpm
eap7-wildfly-modules-7.1.3-4.GA_redhat_3.1.ep7.el7.noarch.rpm
eap7-wss4j-2.1.12-1.redhat_1.1.ep7.el7.noarch.rpm
eap7-wss4j-bindings-2.1.12-1.redhat_1.1.ep7.el7.noarch.rpm
eap7-wss4j-policy-2.1.12-1.redhat_1.1.ep7.el7.noarch.rpm
eap7-wss4j-ws-security-common-2.1.12-1.redhat_1.1.ep7.el7.noarch.rpm
eap7-wss4j-ws-security-dom-2.1.12-1.redhat_1.1.ep7.el7.noarch.rpm
eap7-wss4j-ws-security-policy-stax-2.1.12-1.redhat_1.1.ep7.el7.noarch.rpm
eap7-wss4j-ws-security-stax-2.1.12-1.redhat_1.1.ep7.el7.noarch.rpm
eap7-xml-security-2.0.10-1.redhat_1.1.ep7.el7.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
A security update is now available for Red Hat JBoss Enterprise ApplicationPlatform from the Customer Portal.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 6 Server - noarch
Red Hat JBoss Enterprise Application Platform 7.1 for RHEL 7 Server - noarch
Bugs Fixed
1593527 - CVE-2018-10862 wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip)
1595332 - CVE-2018-8039 apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.*