Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Red Hat JBoss Enterprise Application Platform
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Red Hat JBoss Enterprise Application Platform
ID: RHSA-2019:2938-01
Distribution: Red Hat
Plattformen: Red Hat JBoss Enterprise Application Platform
Datum: Di, 1. Oktober 2019, 07:05
Referenzen: https://access.redhat.com/security/cve/CVE-2019-12086
https://access.redhat.com/security/cve/CVE-2019-10212
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=7.2
https://access.redhat.com/security/cve/CVE-2019-14379
https://access.redhat.com/security/cve/CVE-2019-12384
https://access.redhat.com/security/cve/CVE-2019-12814
https://access.redhat.com/security/cve/CVE-2019-10184
https://access.redhat.com/security/cve/CVE-2019-10202
Applikationen: Red Hat JBoss Enterprise Application Platform

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat JBoss Enterprise Application Platform
7.2.4 security update
Advisory ID: RHSA-2019:2938-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2019:2938
Issue date: 2019-09-30
CVE Names: CVE-2019-10184 CVE-2019-10202 CVE-2019-10212
CVE-2019-12086 CVE-2019-12384 CVE-2019-12814
CVE-2019-14379
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 7.2 for Red Hat Enterprise Linux.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

This release of Red Hat JBoss Enterprise Application Platform 7.2.4 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.3,
and includes bug fixes and enhancements. Refer to the Red Hat JBoss
Enterprise Application Platform 7.2.4 Release Notes for information on the
most significant bug fixes and enhancements included in this release.

Security Fix(es):

* jackson-databind: default typing mishandling leading to remote code
execution (CVE-2019-14379)

* jackson-databind: failure to block the logback-core class from
polymorphic deserialization leading to remote code execution
(CVE-2019-12384)

* jackson-databind: polymorphic typing issue allows attacker to read
arbitrary local files on the server via crafted JSON message
(CVE-2019-12814)

* undertow: DEBUG log for io.undertow.request.security if enabled leaks
credentials to log files (CVE-2019-10212)

* codehaus: incomplete fix for unsafe deserialization in jackson-databind
vulnerabilities (CVE-2019-10202)

* jackson-databind: polymorphic typing issue allows attacker to read
arbitrary local files on the server (CVE-2019-12086)

* undertow: Information leak in requests for directories without trailing
slashes (CVE-2019-10184)

3. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

The References section of this erratum contains a download link (you must
log in to download the update).

The JBoss server process must be restarted for the update to take effect.

4. Bugs fixed (https://bugzilla.redhat.com/):

1713068 - CVE-2019-10184 undertow: Information leak in requests for directories
without trailing slashes
1713468 - CVE-2019-12086 jackson-databind: polymorphic typing issue allows
attacker to read arbitrary local files on the server.
1725795 - CVE-2019-12814 jackson-databind: polymorphic typing issue allows
attacker to read arbitrary local files on the server via crafted JSON message.
1725807 - CVE-2019-12384 jackson-databind: failure to block the logback-core
class from polymorphic deserialization leading to remote code execution
1731271 - CVE-2019-10202 codehaus: incomplete fix for unsafe deserialization in
jackson-databind vulnerabilities
1731984 - CVE-2019-10212 undertow: DEBUG log for io.undertow.request.security
if enabled leaks credentials to log files
1737517 - CVE-2019-14379 jackson-databind: default typing mishandling leading
to remote code execution

5. JIRA issues fixed (https://issues.jboss.org/):

JBEAP-16455 - [GSS](7.2.z) Upgrade Infinispan from 9.3.6 to 9.3.7
JBEAP-16779 - [GSS](7.2.z) Upgrade Hibernate ORM from 5.3.10 to 5.3.11
JBEAP-17045 - [GSS](7.2.z) Upgrade JSF based on Mojarra 2.3.5.SP3-redhat-00001
to 2.3.5.SP3-redhat-00002
JBEAP-17062 - [GSS](7.2.z) Upgrade Artemis from 2.7.0.redhat-00057 to
2.9.0.redhat-00005
JBEAP-17073 - [GSS](7.2.z) Upgrade jboss-ejb-client from 4.0.20 to 4.0.23
JBEAP-17109 - (7.2.z) Upgrade XNIO from 3.6.6.Final-redhat-00001 to
3.7.3.Final-redhat-00001
JBEAP-17112 - [GSS](7.2.z) Upgrade JBoss Remoting from 5.0.12 to 5.0.14.SP1
JBEAP-17162 - [GSS](7.2.z) Upgrade jgroups from 4.0.19 to 4.0.20
JBEAP-17178 - (7.2.z) Upgrade IronJacamar from 1.4.16.Final to 1.4.17.Final
JBEAP-17182 - (7.2.z) Upgrade PicketLink from 2.5.5.SP12-redhat-00006 to
2.5.5.SP12-redhat-00007
JBEAP-17183 - (7.2.z) Upgrade PicketLink bindings from 2.5.5.SP12-redhat-00006
to 2.5.5.SP12-redhat-00007
JBEAP-17223 - [GSS](7.2.z) Upgrade WildFly Core from 6.0.15 to 6.0.16
JBEAP-17238 - [GSS](7.2.z) Upgrade HAL from 3.0.13 to 3.0.16
JBEAP-17250 - [GSS](7.2.z) Upgrade JBoss MSC from 1.4.5 to 1.4.8
JBEAP-17271 - [GSS](7.2.z) Upgrade jboss-logmanager from
2.1.7.Final-redhat-00001 to 2.1.14.Final-redhat-00001
JBEAP-17273 - [GSS](7.2.z) Upgrade jboss-logging from 3.3.2.Final-redhat-00001
to 3.3.3.Final-redhat-00001
JBEAP-17274 - [GSS](7.2.z) Upgrade Wildfly Elytron from
1.6.3.Final-redhat-00001 to 1.6.4.Final-redhat-00001
JBEAP-17276 - [GSS](7.2.z) Upgrade wildfly-transaction-client from
1.1.4.Final-redhat-00001 to 1.1.6.Final-redhat-00001
JBEAP-17277 - [GSS](7.2.z) Upgrade Undertow from 2.0.22 to 2.0.25.SP1
JBEAP-17278 - [GSS](7.2.z) Upgrade JBoss Marshalling from 2.0.7 to 2.0.9
JBEAP-17294 - [GSS](7.2.z) Upgrade weld from 3.0.6.Final-redhat-00001 to
3.0.6.Final-redhat-00002
JBEAP-17311 - [GSS](7.2.z) Upgrade jboss-jaxrs-api_2.1_spec from
1.0.1.Final-redhat-00001 to 1.0.3.Final-redhat-00001
JBEAP-17320 - [GSS](7.2.z) Upgrade PicketBox from 5.0.3.Final-redhat-3 to
5.0.3.Final-redhat-00004
JBEAP-17321 - [GSS](7.2.z) Upgrade Narayana from 5.9.3.Final to 5.9.6.Final
JBEAP-17334 - (7.2.z) Upgrade Elytron-Tool from 1.4.2 to 1.4.3.Final
JBEAP-17527 - [GSS](7.2.z) Upgrade Hibernate ORM from 5.3.11 to 5.3.11.SP1

6. References:

https://access.redhat.com/security/cve/CVE-2019-10184
https://access.redhat.com/security/cve/CVE-2019-10202
https://access.redhat.com/security/cve/CVE-2019-10212
https://access.redhat.com/security/cve/CVE-2019-12086
https://access.redhat.com/security/cve/CVE-2019-12384
https://access.redhat.com/security/cve/CVE-2019-12814
https://access.redhat.com/security/cve/CVE-2019-14379
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=7.2
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/

7. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=RyFs
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung