RedHat: RHSA-2019-1162:01 Moderate: Red Hat JBoss Enterprise Application
Summary
Red Hat JBoss Enterprise Application Platform is a platform for Java
applications based on the JBoss Application Server.
This release of Red Hat JBoss Enterprise Application Platform 6.4.22 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.21,
and includes bug fixes and enhancements, which are documented in the
Release Notes document linked to in the References.
Security Fix(es):
* admin-cli: wildfly-core: Cross-site scripting (XSS) in JBoss Management
Console (CVE-2018-10934)
* dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute
which can impact the integrity of XML documents (CVE-2018-1000632)
* jbossweb: tomcat: host name verification missing in WebSocket client
(CVE-2018-8034)
For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.
All users of Red Hat JBoss Enterprise Application Platform 6.4 are advised
to upgrade to these updated packages. The JBoss server process must be
restarted for the update to take effect.
Summary
Solution
Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.
The References section of this erratum contains a download link (you must
log in to download the update).
References
https://access.redhat.com/security/cve/CVE-2018-8034 https://access.redhat.com/security/cve/CVE-2018-10934 https://access.redhat.com/security/cve/CVE-2018-1000632 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/6.4/ https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4
Package List
Topic
An update is now available for Red Hat JBoss Enterprise ApplicationPlatform 6.4.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Bugs Fixed
1607580 - CVE-2018-8034 tomcat: host name verification missing in WebSocket client
1613428 - [GSS](6.4.z) Upgrade Ironjacamar from 1.0.42 to 1.0.43
1615673 - CVE-2018-10934 wildfly-core: Cross-site scripting (XSS) in JBoss Management Console
1620529 - CVE-2018-1000632 dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents
1630924 - [GSS](6.4.z) Upgrade Apache CXF from 2.7.18.SP6 to 2.7.18.SP7
1630928 - [GSS](6.4.z) Upgrade JBoss Web from 7.5.29 to 7.5.30
1631773 - [GSS](6.4.z) Upgrade HornetQ from 2.3.25.SP28 to 2.3.25.SP29
1643557 - [GSS](6.4.z) Upgrade HAL from 2.5.17 to 2.5.19
1675264 - [GSS](6.4.z) Upgrade RESTEasy from 2.3.22 to 2.3.23
1691431 - [GSS](6.4.z) Upgrade JBoss Remote Naming from 1.0.13 to 1.0.15