[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[RHSA-2019:1162-01] Moderate: Red Hat JBoss Enterprise Application Platform 6.4.22 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat JBoss Enterprise Application Platform 6.4.22 security update
Advisory ID:       RHSA-2019:1162-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:1162
Issue date:        2019-05-13
CVE Names:         CVE-2018-8034 CVE-2018-10934 CVE-2018-1000632 
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 6.4.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Enterprise Application Platform is a platform for Java
applications based on the JBoss Application Server.

This release of Red Hat JBoss Enterprise Application Platform 6.4.22 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.21,
and includes bug fixes and enhancements, which are documented in the
Release Notes document linked to in the References.

Security Fix(es):

* admin-cli: wildfly-core: Cross-site scripting (XSS) in JBoss Management
Console (CVE-2018-10934)

* dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute
which can impact the integrity of XML documents (CVE-2018-1000632)

* jbossweb: tomcat: host name verification missing in WebSocket client
(CVE-2018-8034)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

All users of Red Hat JBoss Enterprise Application Platform 6.4 are advised
to upgrade to these updated packages. The JBoss server process must be
restarted for the update to take effect.

3. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (https://bugzilla.redhat.com/):

1607580 - CVE-2018-8034 tomcat: host name verification missing in WebSocket client
1613428 - [GSS](6.4.z) Upgrade Ironjacamar from 1.0.42 to 1.0.43
1615673 - CVE-2018-10934 wildfly-core: Cross-site scripting (XSS) in JBoss Management Console
1620529 - CVE-2018-1000632 dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents
1630924 - [GSS](6.4.z) Upgrade Apache CXF from 2.7.18.SP6 to 2.7.18.SP7
1630928 - [GSS](6.4.z) Upgrade JBoss Web from 7.5.29 to 7.5.30
1631773 - [GSS](6.4.z) Upgrade HornetQ from 2.3.25.SP28 to 2.3.25.SP29
1643557 - [GSS](6.4.z) Upgrade HAL from 2.5.17 to 2.5.19
1675264 - [GSS](6.4.z) Upgrade RESTEasy from 2.3.22 to 2.3.23
1691431 - [GSS](6.4.z) Upgrade JBoss Remote Naming from 1.0.13 to 1.0.15

5. References:

https://access.redhat.com/security/cve/CVE-2018-8034
https://access.redhat.com/security/cve/CVE-2018-10934
https://access.redhat.com/security/cve/CVE-2018-1000632
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/6.4/
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4

6. Contact:

The Red Hat security contact is <secalert redhat com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIUAwUBXNmodNzjgjWX9erEAQghcA/4w/76DtpL5247P+KOeYX7Z4qZXHTC5Cxw
aTzBasOcZueXvmhCUMIAXOwCJq9lBi+LkB7NvbiYCnymjjF6zzx+w7HXz5OThYAs
Op+a427WblPdmjgj4lu2waU16Hlt17RCfWi4F7s5gUgPO598ECsfVLDAOvXLogM4
RoZT34aEYN31xLbej0xXOKMY22JoJ9FWKIVLqNF+WmKD/dqeBn2i8H7oTeY0pZNV
8NaBuHs4zl6yA9YH9GIZBuMitT1pVlvjzvoRWxINSub0ZkN29O695+uQC4F1DOhA
nDlHetCqznTl1zZL+lpTIGkVncBUYFjDRwiA1RTprFS5VVHivqhKh+eGfuZXKROr
xdcDh7nZ86HjtO4immYIhfGKPcompOg8gHXfSg7LwwJYqeueRrbF8uP3tD3RNA2E
YPj9NGBwEgb0emcgqkk60rXdhi+CMS/X+ic+BTztEKT7Dnt253RNzoVflgo7Hd0t
4TwPAVGpWf7TGRm+/vi3j47vhWSHd0R6kMkljSdnGHS29aUHquu7rpBxEI+0+5FZ
llAPRt1VCmaOifM7sdY+Fv1lkaYKxJLD1gQqQ8hKni+HwJkUu0SsyvLIDI5XF3e3
lZtZ2DmMLhxcgMcQ1ZHn8jRiy5y1xkxkR3YwV9DIBbGz8JUbwHHbO1KKlz53piIp
lfyVGrwz9g==
=PZaR
-----END PGP SIGNATURE-----


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]