Red Hat Security Advisory 2018-2938-01 - Red Hat OpenShift Application Runtimes provides an application platform that reduces the complexity of developing and operating applications for OpenShift as a containerized platform. This release of RHOAR Thorntail 2.2.0 serves as a replacement for RHOAR WildFly Swarm 7.1.0, and includes security and bug fixes and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include a traversal vulnerability.
c4ab1f675076791f9f8924f862c33bff93183dc8b2b2b92ae0f236fc39bfdd09
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: Red Hat OpenShift Application Runtimes Thorntail 2.2.0 security & bug fix update
Advisory ID: RHSA-2018:2938-01
Product: Red Hat OpenShift Application Runtimes
Advisory URL: https://access.redhat.com/errata/RHSA-2018:2938
Issue date: 2018-10-17
CVE Names: CVE-2018-1047 CVE-2018-7489
====================================================================
1. Summary:
An update is now available for Red Hat OpenShift Application Runtimes.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Description:
Red Hat OpenShift Application Runtimes provides an application platform
that reduces the complexity of developing and operating applications
(monoliths and microservices) for OpenShift as a containerized platform.
This release of RHOAR Thorntail 2.2.0 serves as a replacement for RHOAR
WildFly Swarm 7.1.0, and includes security and bug fixes and enhancements.
For further information, refer to the release notes linked to in the
References section.
Security Fix(es):
* undertow: Path traversal in ServletResourceManager class (CVE-2018-1047)
* jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe
serialization via c3p0 libraries (CVE-2018-7489)
For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.
3. Solution:
Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.
The References section of this erratum contains a download link (you must
log in to download the update).
4. Bugs fixed (https://bugzilla.redhat.com/):
1528361 - CVE-2018-1047 undertow: Path traversal in ServletResourceManager class
1549276 - CVE-2018-7489 jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries
5. References:
https://access.redhat.com/security/cve/CVE-2018-1047
https://access.redhat.com/security/cve/CVE-2018-7489
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&productEtRhoar.wildFly.swarm&version=2.2.0
https://access.redhat.com/documentation/en-us/red_hat_openshift_application_runtimes/1/html-single/red_hat_openshift_application_runtimes_release_notes/
6. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQIVAwUBW8czrtzjgjWX9erEAQgCNw/9EbNNow/AzpCR+b2hL8LzCpu0dio6neYI
tmVv5ITJS+lA/bA55tRRRr4T+AD4lwHoUrrdN8gRNbu81T/RMZfjupkQHunO1bYj
5n4e/0mGsxNEBlIR4XeLmdFVJfdaqfzz0IiBhvXME9UcSjJQxQlLYIK0sXceFaWp
HATkczYlzh2b0J3cgSDnaDrcW4hbX17gsTLbIkb+qoct/ZJOQINgg1I1lpSveejj
uSWxQuwGhlm/ciNDkmJAFPU/DjthkoXiKrLKWpca1YmBoNgL1hVxgyR7apiPW5wy
PxgqkDnjmZ6XSCBZyL6n6WU9YTiBHgZpJ8SbJx7WjtCoGZbyUJPSR8T2fhi+0sS2
u+Aezzi1G8iyIhaVtVWAfsVORuIlgngntT7tH7PoZtE9MI8dAa6IDEEaBeBzbFP0
x5v+Ds9vPQo4KPe95hmHsCgyNt+moPnI2tICKHL4ppSiLp4UPCHyRH8xhTvIU/Bx
kUdGTjMHK+Xr/pkSmo4qfZ2pVPf7n871MzlR75diCTQ6kJ8aoFcRtrLARw16sNsa
cYIIQdWHfB6a/GFuqjSiuO/ev4pHQY6EOQiLZYyqpQ5YKn+aOzxp7DYm6x0m5xsM
V5TYHi6CgwzEJWztnR5DU/cgAwVAe/qUD8Qyj3GymXFXs1e7UM9szNgSsul0zCHp
eM1VeQQvvOo=x5e8
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce