what you don't know can hurt you

Red Hat Security Advisory 2018-2185-01

Red Hat Security Advisory 2018-2185-01
Posted Jul 12, 2018
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2018-2185-01 - This release adds the new Apache HTTP Server 2.4.29 packages that are part of the JBoss Core Services offering. This release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes and enhancements. Issues addressed include a remote SQL injection vulnerability.

tags | advisory, remote, web, sql injection
systems | linux, redhat
advisories | CVE-2016-2182, CVE-2016-6302, CVE-2016-6306, CVE-2016-7055, CVE-2017-3731, CVE-2017-3732, CVE-2017-3736, CVE-2017-3737, CVE-2017-3738
MD5 | eb9397531418cb50bca46adcac0cd964

Red Hat Security Advisory 2018-2185-01

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 RHEL 7 security update
Advisory ID: RHSA-2018:2185-01
Product: Red Hat JBoss Core Services
Advisory URL: https://access.redhat.com/errata/RHSA-2018:2185
Issue date: 2018-07-12
CVE Names: CVE-2016-2182 CVE-2016-6302 CVE-2016-6306
CVE-2016-7055 CVE-2017-3731 CVE-2017-3732
CVE-2017-3736 CVE-2017-3737 CVE-2017-3738
====================================================================
1. Summary:

Red Hat JBoss Core Services Pack Apache Server 2.4.29 packages are now
available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this release as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss Core Services on RHEL 7 Server - noarch, ppc64, x86_64

3. Description:

This release adds the new Apache HTTP Server 2.4.29 packages that are part
of the JBoss Core Services offering.

This release serves as a replacement for Red Hat JBoss Core Services
Apache HTTP Server 2.4.23, and includes bug fixes and enhancements. Refer
to the Release Notes for information on the most significant bug fixes,
enhancements and component upgrades included in this release.

This release upgrades OpenSSL to version 1.0.2.n

Security Fix(es):

* openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()
(CVE-2016-2182)

* openssl: Insufficient TLS session ticket HMAC length checks
(CVE-2016-6302)

* openssl: certificate message OOB reads (CVE-2016-6306)

* openssl: Carry propagating bug in Montgomery multiplication
(CVE-2016-7055)

* openssl: Truncated packet could crash via OOB read (CVE-2017-3731)

* openssl: BN_mod_exp may produce incorrect results on x86_64
(CVE-2017-3732)

* openssl: bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)

* openssl: Read/write after SSL object in error state (CVE-2017-3737)

* openssl: rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)

Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6306
and CVE-2016-7055. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360
Inc.) as the original reporter of CVE-2016-6306.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1367340 - CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()
1369855 - CVE-2016-6302 openssl: Insufficient TLS session ticket HMAC length checks
1377594 - CVE-2016-6306 openssl: certificate message OOB reads
1393929 - CVE-2016-7055 openssl: Carry propagating bug in Montgomery multiplication
1416852 - CVE-2017-3731 openssl: Truncated packet could crash via OOB read
1416856 - CVE-2017-3732 openssl: BN_mod_exp may produce incorrect results on x86_64
1509169 - CVE-2017-3736 openssl: bn_sqrx8x_internal carry bug on x86_64
1523504 - CVE-2017-3737 openssl: Read/write after SSL object in error state
1523510 - CVE-2017-3738 openssl: rsaz_1024_mul_avx2 overflow bug on x86_64

6. JIRA issues fixed (https://issues.jboss.org/):

JBCS-373 - Errata for httpd 2.4.29 GA RHEL 7

7. Package List:

Red Hat JBoss Core Services on RHEL 7 Server:

Source:
jbcs-httpd24-apache-commons-daemon-1.1.0-1.redhat_2.1.jbcs.el7.src.rpm
jbcs-httpd24-apache-commons-daemon-jsvc-1.1.0-1.redhat_2.jbcs.el7.src.rpm
jbcs-httpd24-apr-1.6.3-14.jbcs.el7.src.rpm
jbcs-httpd24-apr-util-1.6.1-9.jbcs.el7.src.rpm
jbcs-httpd24-httpd-2.4.29-17.jbcs.el7.src.rpm
jbcs-httpd24-mod_auth_kerb-5.4-36.jbcs.el7.src.rpm
jbcs-httpd24-mod_bmx-0.9.6-17.GA.jbcs.el7.src.rpm
jbcs-httpd24-mod_cluster-native-1.3.8-1.Final_redhat_2.jbcs.el7.src.rpm
jbcs-httpd24-mod_jk-1.2.43-1.redhat_1.jbcs.el7.src.rpm
jbcs-httpd24-mod_rt-2.4.1-19.GA.jbcs.el7.src.rpm
jbcs-httpd24-mod_security-2.9.1-23.GA.jbcs.el7.src.rpm
jbcs-httpd24-nghttp2-1.29.0-8.jbcs.el7.src.rpm
jbcs-httpd24-openssl-1.0.2n-11.jbcs.el7.src.rpm

noarch:
jbcs-httpd24-apache-commons-daemon-1.1.0-1.redhat_2.1.jbcs.el7.noarch.rpm
jbcs-httpd24-httpd-manual-2.4.29-17.jbcs.el7.noarch.rpm

ppc64:
jbcs-httpd24-apache-commons-daemon-jsvc-1.1.0-1.redhat_2.jbcs.el7.ppc64.rpm
jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1.1.0-1.redhat_2.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-1.6.3-14.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-debuginfo-1.6.3-14.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-devel-1.6.3-14.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-debuginfo-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-devel-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-ldap-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-mysql-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-nss-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-odbc-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-openssl-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-pgsql-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-sqlite-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-httpd-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-httpd-debuginfo-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-httpd-devel-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-httpd-selinux-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-httpd-tools-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_auth_kerb-5.4-36.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_auth_kerb-debuginfo-5.4-36.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_bmx-0.9.6-17.GA.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_bmx-debuginfo-0.9.6-17.GA.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_cluster-native-1.3.8-1.Final_redhat_2.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_cluster-native-debuginfo-1.3.8-1.Final_redhat_2.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_jk-ap24-1.2.43-1.redhat_1.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_jk-debuginfo-1.2.43-1.redhat_1.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_jk-manual-1.2.43-1.redhat_1.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_ldap-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_proxy_html-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_rt-2.4.1-19.GA.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_rt-debuginfo-2.4.1-19.GA.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_security-2.9.1-23.GA.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_security-debuginfo-2.9.1-23.GA.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_session-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_ssl-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-nghttp2-1.29.0-8.jbcs.el7.ppc64.rpm
jbcs-httpd24-nghttp2-debuginfo-1.29.0-8.jbcs.el7.ppc64.rpm
jbcs-httpd24-nghttp2-devel-1.29.0-8.jbcs.el7.ppc64.rpm
jbcs-httpd24-openssl-1.0.2n-11.jbcs.el7.ppc64.rpm
jbcs-httpd24-openssl-debuginfo-1.0.2n-11.jbcs.el7.ppc64.rpm
jbcs-httpd24-openssl-devel-1.0.2n-11.jbcs.el7.ppc64.rpm
jbcs-httpd24-openssl-libs-1.0.2n-11.jbcs.el7.ppc64.rpm
jbcs-httpd24-openssl-perl-1.0.2n-11.jbcs.el7.ppc64.rpm
jbcs-httpd24-openssl-static-1.0.2n-11.jbcs.el7.ppc64.rpm

x86_64:
jbcs-httpd24-apache-commons-daemon-jsvc-1.1.0-1.redhat_2.jbcs.el7.x86_64.rpm
jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1.1.0-1.redhat_2.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-1.6.3-14.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-debuginfo-1.6.3-14.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-devel-1.6.3-14.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-debuginfo-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-devel-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-ldap-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-mysql-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-nss-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-odbc-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-openssl-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-pgsql-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-sqlite-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-httpd-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-httpd-debuginfo-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-httpd-devel-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-httpd-selinux-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-httpd-tools-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_auth_kerb-5.4-36.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_auth_kerb-debuginfo-5.4-36.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_bmx-0.9.6-17.GA.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_bmx-debuginfo-0.9.6-17.GA.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_cluster-native-1.3.8-1.Final_redhat_2.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_cluster-native-debuginfo-1.3.8-1.Final_redhat_2.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_jk-ap24-1.2.43-1.redhat_1.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_jk-debuginfo-1.2.43-1.redhat_1.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_jk-manual-1.2.43-1.redhat_1.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_ldap-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_proxy_html-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_rt-2.4.1-19.GA.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_rt-debuginfo-2.4.1-19.GA.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_security-2.9.1-23.GA.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_security-debuginfo-2.9.1-23.GA.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_session-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_ssl-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-nghttp2-1.29.0-8.jbcs.el7.x86_64.rpm
jbcs-httpd24-nghttp2-debuginfo-1.29.0-8.jbcs.el7.x86_64.rpm
jbcs-httpd24-nghttp2-devel-1.29.0-8.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-1.0.2n-11.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-debuginfo-1.0.2n-11.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-devel-1.0.2n-11.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-libs-1.0.2n-11.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-perl-1.0.2n-11.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-static-1.0.2n-11.jbcs.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

8. References:

https://access.redhat.com/security/cve/CVE-2016-2182
https://access.redhat.com/security/cve/CVE-2016-6302
https://access.redhat.com/security/cve/CVE-2016-6306
https://access.redhat.com/security/cve/CVE-2016-7055
https://access.redhat.com/security/cve/CVE-2017-3731
https://access.redhat.com/security/cve/CVE-2017-3732
https://access.redhat.com/security/cve/CVE-2017-3736
https://access.redhat.com/security/cve/CVE-2017-3737
https://access.redhat.com/security/cve/CVE-2017-3738
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/

9. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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l2Ei
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Login or Register to add favorites

File Archive:

October 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    16 Files
  • 2
    Oct 2nd
    1 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    24 Files
  • 5
    Oct 5th
    24 Files
  • 6
    Oct 6th
    11 Files
  • 7
    Oct 7th
    14 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    1 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    7 Files
  • 12
    Oct 12th
    15 Files
  • 13
    Oct 13th
    26 Files
  • 14
    Oct 14th
    10 Files
  • 15
    Oct 15th
    6 Files
  • 16
    Oct 16th
    2 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    15 Files
  • 20
    Oct 20th
    20 Files
  • 21
    Oct 21st
    12 Files
  • 22
    Oct 22nd
    14 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close