-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat JBoss Operations Network 3.3.11 security and bug fix update Advisory ID: RHSA-2018:2930-01 Product: Red Hat JBoss Operations Network Advisory URL: https://access.redhat.com/errata/RHSA-2018:2930 Issue date: 2018-10-16 CVE Names: CVE-2017-17485 CVE-2018-1336 CVE-2018-8088 CVE-2018-12533 ===================================================================== 1. Summary: An update is now available for Red Hat JBoss Operations Network. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat JBoss Operations Network is a Middleware management solution that provides a single point of control to deploy, manage, and monitor JBoss Enterprise Middleware, applications, and services. This JBoss Operations Network 3.3.11 release serves as a replacement for JBoss Operations Network 3.3.10, and includes several bug fixes. Refer to the Customer Portal page linked in the References section for information on the most significant of these changes. Security Fix(es): * RichFaces: Injection of arbitrary EL expressions allows remote code execution via org.richfaces.renderkit.html.Paint2DResource (CVE-2018-12533) * jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) (CVE-2017-17485) * tomcat: A bug in the UTF-8 decoder can lead to DoS (CVE-2018-1336) * slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution (CVE-2018-8088) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank 0c0c0f from 360eSSaea(r)eaa(r)$? for reporting CVE-2017-17485 and Chris McCown for reporting CVE-2018-8088. 3. Solution: Before applying this update, back up your existing JBoss Operations Network installation (including its databases, applications, configuration files, the JBoss Operations Network server's file system directory, and so on). The References section of this erratum contains a download link (you must log in to download the update). 4. Bugs fixed (https://bugzilla.redhat.com/): 1127359 - WARN [org.jboss.as.txn] (ServerService Thread Pool -- 54) JBAS010153: Node identifier property is set to the default value 1418034 - Orphaned configuration still left in database 1517717 - JBoss ON storage nodes fail to form the cluster due to rpc_address set to the hostname instead to the IP address as configured in the rhq-server.properties file 1522728 - Attempt to execute disablePlugin, enablePlugin or deletePlugin methods (PluginManager) fails due to method is not supplied 1528565 - CVE-2017-17485 jackson-databind: Unsafe deserialization due to incomplete black list (incomplete fix for CVE-2017-15095) 1540527 - Exceptions in server and agent log after uninvetory of platform with storage node 1540707 - rhq-agent-wrapper.sh is stuck on Solaris 11 SPARC 1542125 - JBoss ON user's roles do not match LDAP mapping if user is logged in using REST API 1544424 - NPE - Error updating MeasurementSchedules for Agent 1545742 - Failure to collect measurement data for {RHQStorage}MessagingService in additional storage node 1548909 - CVE-2018-8088 slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution 1559622 - Add note to rhq-server.properties about URL format and values dependent on database configuration 1575920 - When an alert template is applied to a message containing Russian characters (which are properly shown in the JBoss ON UI), they will be replaced in the received email with the "?" characters 1579733 - JBoss ON server unable to purge unused alert definitions due to the transaction timeout 1584490 - CVE-2018-12533 RichFaces: Injection of arbitrary EL expressions allows remote code execution via org.richfaces.renderkit.html.Paint2DResource 1594305 - Failed to auto-calculate baselines due to TransientPropertyValueException: object references an unsaved transient instance org.rhq.core.domain.measurement.MeasurementSchedule.baseline -> org.rhq.core.domain.measurement.MeasurementBaseline 1597947 - Failure to enable Alert:Email Server Plugin 1607591 - CVE-2018-1336 tomcat: A bug in the UTF-8 decoder can lead to DoS 5. References: https://access.redhat.com/security/cve/CVE-2017-17485 https://access.redhat.com/security/cve/CVE-2018-1336 https://access.redhat.com/security/cve/CVE-2018-8088 https://access.redhat.com/security/cve/CVE-2018-12533 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=em&downloadType=securityPatches&version=3.3 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBW8YagdzjgjWX9erEAQhp+A/5AbljwJ4cSVyiVSdjyS2WHgTlRxL43OEK gSxZ0W6FDuOAlXRIkNknaWOrDW0tgPAXLwWAXJNVzd2m3Gtawoz3UFdAnCV3Y9FM Cnl6yW0Ewmby6fIkO3C4RRs8ruG76gC8Zwh9CHlWLlf8FOElRd9j2hQ6vJXVMjDk pp0wJeQG72BohTCLJQXZaEvUsLz5/9ln9c3jkdU1UVk0qbHefQ5I5QN0OI6pcLrS RPIcT8dl0zKcjzQEZk7r9bCQHc2YOBabYwF8EsznQmyha2+xAzrSW4pTObCkUU7U is4UkA87qluPoRwE4FkJ8FC52ThnCY4pD268AsUzpw8pn2kg51jdSxdY5s2O53BV kZllxeDafHoX9tYrzDoAywTJJPXL85Od40X+UzxUGBHy732F817YOrjqbDoS09xa Y2VcK2xl9Li7+Z1c5M6KDX+UBPGA+M42MEyxW6ubN6LmMau64/vOTI7MhjiEwxPM 3I5FpFxwT0jnT/TZJGx8kzUZ9cqTvHHqN5aPWoqh2KssXIskRZNzROuqGqWH6KBg xodniq9vrC9ATT0cTv86Z52TV5NcjuSKBj2aqbIMhqVZty82lb2u/OmRlsH2WAUr ndW5P+S0cr2XUZjZh2SS9FVYfKXc0gsBmt7+cTYNZ6U+kpMlX0YQ3vMYCExY5sUX 1R/d7rmXVmo= =WdMi -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce