RedHat: RHSA-2020-0899:01 Important: Red Hat Decision Manager 7.7.0

    Date 18 Mar 2020
    203
    Posted By LinuxSecurity Advisories
    An update is now available for Red Hat Decision Manager. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256
    
    =====================================================================
                       Red Hat Security Advisory
    
    Synopsis:          Important: Red Hat Decision Manager 7.7.0 Security Update
    Advisory ID:       RHSA-2020:0899-01
    Product:           Red Hat Decision Manager
    Advisory URL:      https://access.redhat.com/errata/RHSA-2020:0899
    Issue date:        2020-03-18
    CVE Names:         CVE-2019-0231 CVE-2019-7611 CVE-2019-10086 
                       CVE-2019-14540 CVE-2019-14892 CVE-2019-14893 
                       CVE-2019-16335 CVE-2019-16942 CVE-2019-16943 
                       CVE-2019-17267 CVE-2019-17531 
    =====================================================================
    
    1. Summary:
    
    An update is now available for Red Hat Decision Manager.
    
    Red Hat Product Security has rated this update as having a security impact
    of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
    gives a detailed severity rating, is available for each vulnerability from
    the CVE link(s) in the References section.
    
    2. Description:
    
    Red Hat Decision Manager is an open source decision management platform
    that combines business rules management, complex event processing, Decision
    Model & Notation (DMN) execution, and Business Optimizer for solving
    planning problems. It automates business decisions and makes that logic
    available to the entire business. 
    
    This release of Red Hat Decision Manager 7.7.0 serves as an update to Red
    Hat Decision Manager 7.6.0, and includes bug fixes and enhancements, which
    are documented in the Release Notes document linked to in the References.
    
    Security Fix(es):
    
    * commons-beanutils: apache-commons-beanutils: does not suppresses the
    class property in PropertyUtilsBean by default (CVE-2019-10086)
    
    * elasticsearch: Improper permission issue when attaching a new name to an
    index (CVE-2019-7611)
    
    * jackson-databind: polymorphic typing issue related to
    com.zaxxer.hikari.HikariConfig (CVE-2019-14540)
    
    * jackson-databind: polymorphic typing issue related to
    com.zaxxer.hikari.HikariDataSource (CVE-2019-16335)
    
    * jackson-databind: polymorphic typing issue when enabling default typing
    for an externally exposed JSON endpoint and having apache-log4j-extra in
    the classpath leads to code execution (CVE-2019-17531)
    
    * jackson-databind: Serialization gadgets in classes of the
    commons-configuration package (CVE-2019-14892)
    
    * jackson-databind: Serialization gadgets in classes of the commons-dbcp
    package (CVE-2019-16942)
    
    * jackson-databind: Serialization gadgets in classes of the ehcache package
    (CVE-2019-17267)
    
    * jackson-databind: Serialization gadgets in classes of the p6spy package
    (CVE-2019-16943)
    
    * jackson-databind: Serialization gadgets in classes of the xalan package
    (CVE-2019-14893)
    
    * mina-core: Retaining an open socket in close_notify SSL-TLS leading to
    Information disclosure (CVE-2019-0231)
    
    For more details about the security issue(s), including the impact, a CVSS
    score, and other related information, refer to the CVE page(s) listed in
    the References section.
    
    3. Solution:
    
    For on-premise installations, before applying the update, back up your
    existing installation, including all applications, configuration files,
    databases and database settings, and so on.
    
    It is recommended to halt the server by stopping the JBoss Application
    Server process before installing this update; after installing the update,
    restart the server by starting the JBoss Application Server process.
    
    The References section of this erratum contains a download link (you must
    log in to download the update).
    
    4. Bugs fixed (https://bugzilla.redhat.com/):
    
    1696034 - CVE-2019-7611 elasticsearch: Improper permission issue when attaching a new name to an index
    1700016 - CVE-2019-0231 mina-core: Retaining an open socket in close_notify SSL-TLS leading to Information disclosure.
    1755831 - CVE-2019-16335 jackson-databind: polymorphic typing issue related to com.zaxxer.hikari.HikariDataSource
    1755849 - CVE-2019-14540 jackson-databind: polymorphic typing issue related to com.zaxxer.hikari.HikariConfig
    1758167 - CVE-2019-17267 jackson-databind: Serialization gadgets in classes of the ehcache package
    1758171 - CVE-2019-14892 jackson-databind: Serialization gadgets in classes of the commons-configuration package
    1758182 - CVE-2019-14893 jackson-databind: Serialization gadgets in classes of the xalan package
    1758187 - CVE-2019-16942 jackson-databind: Serialization gadgets in classes of the commons-dbcp package
    1758191 - CVE-2019-16943 jackson-databind: Serialization gadgets in classes of the p6spy package
    1767483 - CVE-2019-10086 apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
    1775293 - CVE-2019-17531 jackson-databind: polymorphic typing issue when enabling default typing for an externally exposed JSON endpoint and having apache-log4j-extra in the classpath leads to code execution
    
    5. References:
    
    https://access.redhat.com/security/cve/CVE-2019-0231
    https://access.redhat.com/security/cve/CVE-2019-7611
    https://access.redhat.com/security/cve/CVE-2019-10086
    https://access.redhat.com/security/cve/CVE-2019-14540
    https://access.redhat.com/security/cve/CVE-2019-14892
    https://access.redhat.com/security/cve/CVE-2019-14893
    https://access.redhat.com/security/cve/CVE-2019-16335
    https://access.redhat.com/security/cve/CVE-2019-16942
    https://access.redhat.com/security/cve/CVE-2019-16943
    https://access.redhat.com/security/cve/CVE-2019-17267
    https://access.redhat.com/security/cve/CVE-2019-17531
    https://access.redhat.com/security/updates/classification/#important
    https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=rhdm&version=7.7.0
    https://access.redhat.com/documentation/en-us/red_hat_decision_manager/7.7/html/release_notes_for_red_hat_decision_manager_7.7/index
    
    6. Contact:
    
    The Red Hat security contact is . More contact
    details at https://access.redhat.com/security/team/contact/
    
    Copyright 2020 Red Hat, Inc.
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1
    
    iQIVAwUBXnJcf9zjgjWX9erEAQg+yg//REkzHgyVSjxW8yFD5ZpFTsqdh4/gNh7g
    j4hsAlTJA+UHr2vSmShHJ6gwghNp91I2nXE7v4qtTa0eSnlReFEnDxwgUtNrAKMR
    0WGUlzy/Nn6KTFD3AUOz06zSfVM6Ywsa1kOcvLyMa02k8U3Gzso2ljEeQ/5650n7
    odAfPSJKdc/jIUSsHdPWN1/QuLzDwrcQ5QChelNQZTdNhgumRx9kuPZjwOxtn4gt
    0Eh7iOUQCKg+K0cE4dMPtHQ2cdCxVR6WXzxKM+U4ZtcSnQUmWe/TWXvVkm7dVBRw
    /VXMcfG1So1Gjjbx0YJv31btPlnGiHF4KKlI1mDqNujzSedI9dibRxd2N5dG/xbd
    yot9aGOmkWZfMc4ESoXM9NXh07GPLEMP4xVPiybfDfznDSR6RuDJIzpOGc9cG4d6
    S5yvWt4mDgf2utcWnIzgRYgOPB9k30BSDbToH3+vEYy0cfztE4xAXNgOPsXlTEGl
    m6MG3ahM6QoHe4jNxZYYmH4B1z74KkwjPAZqqwBrV1+S5R61dGk3cqd3V0N1WmJg
    EoEqh1q94+C3UK1AoiB3idNANttzheiTY++zKas62VYxb6+QvHLIYneBKlEPGvS1
    gODY3LL+QB1LECaQNB5yD9oIhSupt0V16rezVY/AvM8WmEaR62FIkCE4l23PZ7Xi
    E/15KasGcvU=
    =cMka
    -----END PGP SIGNATURE-----
    
    --
    RHSA-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.redhat.com/mailman/listinfo/rhsa-announce
    

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/25-what-do-you-think-of-the-linuxsecurity-privacy-news-articles?task=poll.vote&format=json
    25
    radio
    [{"id":"90","title":"Love them!","votes":"96","type":"x","order":"1","pct":80,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"18","type":"x","order":"2","pct":15,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"6","type":"x","order":"3","pct":5,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]