RedHat: RHSA-2019-1106:01 Important: Red Hat JBoss Enterprise Application

    Date08 May 2019
    CategoryRed Hat
    2466
    Posted ByLinuxSecurity Advisories
    An update is now available for Red Hat JBoss Enterprise Application Platform 7.2 for Red Hat Enterprise Linux. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 7.2.1 security update
    Advisory ID:       RHSA-2019:1106-01
    Product:           Red Hat JBoss Enterprise Application Platform
    Advisory URL:      https://access.redhat.com/errata/RHSA-2019:1106
    Issue date:        2019-05-08
    CVE Names:         CVE-2018-11307 CVE-2018-12022 CVE-2018-12023 
                       CVE-2018-14642 CVE-2018-14720 CVE-2018-14721 
                       CVE-2019-3805 CVE-2019-3894 
    =====================================================================
    
    1. Summary:
    
    An update is now available for Red Hat JBoss Enterprise Application
    Platform 7.2 for Red Hat Enterprise Linux.
    
    Red Hat Product Security has rated this update as having a security impact
    of Important. A Common Vulnerability Scoring System (CVSS) base score,
    which gives a detailed severity rating, is available for each vulnerability
    from the CVE link(s) in the References section.
    
    2. Description:
    
    Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
    applications based on JBoss Application Server 7. 
    
    This release of Red Hat JBoss Enterprise Application Platform 7.2.1 serves
    as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.0,
    and includes bug fixes and enhancements. Refer to the Red Hat JBoss
    Enterprise Application Platform 7.2.1 Release Notes for information on the
    most significant bug fixes and enhancements included in this release.
    
    Security Fix(es):
    
    * jackson-databind: Potential information exfiltration with default typing,
    serialization gadget from MyBatis (CVE-2018-11307)
    
    * jackson-databind: improper polymorphic deserialization of types from
    Jodd-db library (CVE-2018-12022)
    
    * jackson-databind: improper polymorphic deserialization of types from
    Oracle JDBC driver (CVE-2018-12023)
    
    * undertow: Infoleak in some circumstances where Undertow can serve data
    from a random buffer (CVE-2018-14642)
    
    * jackson-databind: exfiltration/XXE in some JDK classes (CVE-2018-14720)
    
    * jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class
    (CVE-2018-14721)
    
    * wildfly: Race condition on PID file allows for termination of arbitrary
    processes by local users (CVE-2019-3805)
    
    * wildfly: wrong SecurityIdentity for EE concurrency threads that are
    reused (CVE-2019-3894)
    
    For more details about the security issue(s), including the impact, a CVSS
    score, and other related information, refer to the CVE page(s) listed in
    the References section.
    
    3. Solution:
    
    Before applying this update, back up your existing Red Hat JBoss Enterprise
    Application Platform installation and deployed applications.
    
    The References section of this erratum contains a download link (you must
    log in to download the update).
    
    The JBoss server process must be restarted for the update to take effect.
    
    4. Bugs fixed (https://bugzilla.redhat.com/):
    
    1628702 - CVE-2018-14642 undertow: Infoleak in some circumstances where Undertow can serve data from a random buffer
    1660263 - CVE-2019-3805 wildfly: Race condition on PID file allows for termination of arbitrary processes by local users
    1666423 - CVE-2018-14720 jackson-databind: exfiltration/XXE in some JDK classes
    1666428 - CVE-2018-14721 jackson-databind: server-side request forgery (SSRF) in axis2-jaxws class
    1671096 - CVE-2018-12023 jackson-databind: improper polymorphic deserialization of types from Oracle JDBC driver
    1671097 - CVE-2018-12022 jackson-databind: improper polymorphic deserialization of types from Jodd-db library
    1677341 - CVE-2018-11307 jackson-databind: Potential information exfiltration with default typing, serialization gadget from MyBatis
    1682108 - CVE-2019-3894 wildfly: wrong SecurityIdentity for EE concurrency threads that are reused
    
    5. JIRA issues fixed (https://issues.jboss.org/):
    
    JBEAP-14861 - [GSS](7.2.z) Upgrade JBeret from 1.3.1.Final to 1.3.2.Final
    JBEAP-15392 - (7.2.z) Upgrade Apache CXF from 3.2.5 to 3.2.7
    JBEAP-15477 - (7.2.z) Upgrade PicketLink bindings from 2.5.5.SP12-redhat-2 to 2.5.5.SP12-redhat-4
    JBEAP-15478 - (7.2.z) Upgrade PicketLink from 2.5.5.SP12-redhat-2 to 2.5.5.SP12-redhat-4
    JBEAP-15568 - [GSS](7.2.z) Upgrade ironjacamar from 1.4.11 Final to 1.4.15 Final
    JBEAP-15617 - (7.2.z) Upgrade WildFly Core from 6.0.11 to 6.0.12
    JBEAP-15622 - [GSS](7.2.z) Upgrade jboss-el-api_spec from 1.0.12.Final to 1.0.13.Final
    JBEAP-15748 - [GSS](7.2.z) Upgrade jastow from 2.0.6.Final-redhat-00001 to 2.0.7.Final-redhat-00001
    JBEAP-15805 - (7.2.z) Upgrade Hibernate ORM from 5.3.7 to 5.3.8
    JBEAP-15851 - [ENG] (7.2.z) Upgrade Infinispan from 9.3.3.Final to 9.3.6.Final
    JBEAP-15869 - (7.2.z) Upgrade Undertow from 2.0.15 to 2.0.19
    JBEAP-15876 - (7.2.z) Upgrade Artemis from 2.6.3.redhat-00014 to 2.6.3.redhat-00020
    JBEAP-16025 - Upgrade yasson from 1.0.1 to 1.0.2
    JBEAP-16037 - [GSS](7.2.z) Upgrade Narayana from 5.9.0.Final to 5.9.1.Final
    JBEAP-16086 - (7.2.z) Upgrade WildFly HTTP client from 1.0.12.Final to 1.0.13.Final
    JBEAP-16090 - [GSS](7.2.z) Upgrade jboss-ejb-client from 4.0.12 to 4.0.15
    JBEAP-16091 - [GSS](7.2.z) Upgrade wildfly-transaction-client from 1.1.2.Final-redhat-1 to 1.1.3.Final-redhat-1
    JBEAP-16122 - [Runtimes] (7.2.z) Upgrade istack from 3.0.5.redhat-1 to 3.0.7.redhat-00001
    JBEAP-16123 - [Runtimes] (7.2.x) Upgrade commons-digester from 1.8 to 1.8.1.redhat-4
    JBEAP-16125 - [Runtimes] (7.2.x) Upgrade org.jboss.genericjms from 2.0.1.Final-redhat-1 to 2.0.1.Final-redhat-00002
    JBEAP-16137 - (7.2.z) (WFCORE) Upgrade FasterXML Jackson from 2.9.2 to 2.9.8
    JBEAP-16146 - (7.2.z) Upgrade Elytron from 1.6.1.Final to 1.6.2.Final
    JBEAP-16147 - (7.2.z) Upgrade Elytron-Tool from 1.4.0 to 1.4.1.Final
    JBEAP-16259 -  (7.2.z) Upgrade legacy EJB Client from 3.0.2.Final-redhat-1 to 3.0.3.Final-redhat-1
    JBEAP-16276 - (7.2.z) Upgrade elytron-web from 1.2.3.Final to 1.2.4.Final
    JBEAP-16321 - (7.2.z) HHH-13099 HHH-13283 Upgrade ByteBuddy from 1.8.17 to 1.9.5
    JBEAP-16347 - (7.2.z) Upgrade jboss-logmanager from 2.1.5.Final-redhat-00001 to 2.1.7.Final
    JBEAP-16356 - (7.2.z) Upgrade RESTEasy from 3.6.1.SP2 to 3.6.1.SP3
    JBEAP-16367 - (7.2.z) Upgrade commons-lang3 from 3.6.0-redhat-1 to 3.8-redhat-00001
    JBEAP-16368 - (7.2.z) Upgrade cxf-xjc from 3.2.2.redhat-00001 to 3.2.3.redhat-00002
    JBEAP-16369 - (7.2.z) Upgrade httpasyncclient from 4.1.3.redhat-2 to 4.1.4.redhat-00001
    JBEAP-16381 - (7.2.z) Upgrade jboss-remoting-jmx from 3.0.0.Final to 3.0.1.Final
    JBEAP-16418 - (7.2.z) Upgrade Hibernate ORM from 5.3.8 to 5.3.9
    JBEAP-9657 - (7.2.z) Upgrade jboss-negotiation from 3.0.4 to 3.0.5.Final-redhat-00001
    
    6. References:
    
    https://access.redhat.com/security/cve/CVE-2018-11307
    https://access.redhat.com/security/cve/CVE-2018-12022
    https://access.redhat.com/security/cve/CVE-2018-12023
    https://access.redhat.com/security/cve/CVE-2018-14642
    https://access.redhat.com/security/cve/CVE-2018-14720
    https://access.redhat.com/security/cve/CVE-2018-14721
    https://access.redhat.com/security/cve/CVE-2019-3805
    https://access.redhat.com/security/cve/CVE-2019-3894
    https://access.redhat.com/security/updates/classification/#important
    https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=7.2
    https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/
    https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/
    
    7. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2019 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBXNLF99zjgjWX9erEAQiVVw//ZoMhHBw7s7IKqfGcAVwBQehQVmXLjrMY
    vsW7dosZvfYI2atM3dut1+phnBK0c69GrSuN2JLU4LEoE7ecjPE0UdrY9RIc2HDx
    fkaxAcSQhlOwcEwTQiKDTHb3bURnnENJnp2jnfRG9rROTSwqN05ssHFG8JZPVSBG
    /S4oeSdIK2elEY+BQQt72BYNw+GuTRIoDRG4gQ65EGl0EHiL3XWx4ZBU/qEE00MY
    izSGllMEveF51TfdW72qrVGVvItJ5pZ8BpASaNNChWjei5XYrzVgYO8Mzii54oe2
    NgAJxCJ01Eih6dC9lxnpiFBhr/Rdl62sXUbmsqOe8mk6L/KJdwCO6dFR5PNV0vqx
    2PS53RpfqgXlb9Le+soxR1hGtV7Tjdo5u5MxIPLaaAEB69eHTSgWhL3qgc9DLFYr
    9VLzUAFuC5NPUpqECuzeuRHQh+8ve0rFQT9dRuuxpcqKyDW7tfp5y/8uFcVWH5mW
    gU3ljHO9Q8WO5PQ/gDkdnKySHNkrBWNnuiNph+X4FKypBiEDKMTOBy0yysyxh1YG
    HlBD4IJZi7TZT/pvFjHUdDdvsVqcUPlpD7yOepNi7ob+LyKr+GOlWqZzRHyPTed7
    wxIkKZ7+A9qJXLgoWGoS6RMNnG8/FnU+ZrznRDBbnYG/l2MQAvO2/HZYHZgqgxqS
    5IOyD9FZNfo=
    =kqxf
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"22","type":"x","order":"1","pct":55,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.5,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":32.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.