-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 6.4.22 security update Advisory ID: RHSA-2019:1162-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2019:1162 Issue date: 2019-05-13 CVE Names: CVE-2018-8034 CVE-2018-10934 CVE-2018-1000632 ==================================================================== 1. Summary: An update is now available for Red Hat JBoss Enterprise Application Platform 6.4. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.22 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.21, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es): * admin-cli: wildfly-core: Cross-site scripting (XSS) in JBoss Management Console (CVE-2018-10934) * dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents (CVE-2018-1000632) * jbossweb: tomcat: host name verification missing in WebSocket client (CVE-2018-8034) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. All users of Red Hat JBoss Enterprise Application Platform 6.4 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect. 3. Solution: Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications. The References section of this erratum contains a download link (you must log in to download the update). 4. Bugs fixed (https://bugzilla.redhat.com/): 1607580 - CVE-2018-8034 tomcat: host name verification missing in WebSocket client 1613428 - [GSS](6.4.z) Upgrade Ironjacamar from 1.0.42 to 1.0.43 1615673 - CVE-2018-10934 wildfly-core: Cross-site scripting (XSS) in JBoss Management Console 1620529 - CVE-2018-1000632 dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents 1630924 - [GSS](6.4.z) Upgrade Apache CXF from 2.7.18.SP6 to 2.7.18.SP7 1630928 - [GSS](6.4.z) Upgrade JBoss Web from 7.5.29 to 7.5.30 1631773 - [GSS](6.4.z) Upgrade HornetQ from 2.3.25.SP28 to 2.3.25.SP29 1643557 - [GSS](6.4.z) Upgrade HAL from 2.5.17 to 2.5.19 1675264 - [GSS](6.4.z) Upgrade RESTEasy from 2.3.22 to 2.3.23 1691431 - [GSS](6.4.z) Upgrade JBoss Remote Naming from 1.0.13 to 1.0.15 5. References: https://access.redhat.com/security/cve/CVE-2018-8034 https://access.redhat.com/security/cve/CVE-2018-10934 https://access.redhat.com/security/cve/CVE-2018-1000632 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/6.4/ https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIUAwUBXNmodNzjgjWX9erEAQghcA/4w/76DtpL5247P+KOeYX7Z4qZXHTC5Cxw aTzBasOcZueXvmhCUMIAXOwCJq9lBi+LkB7NvbiYCnymjjF6zzx+w7HXz5OThYAs Op+a427WblPdmjgj4lu2waU16Hlt17RCfWi4F7s5gUgPO598ECsfVLDAOvXLogM4 RoZT34aEYN31xLbej0xXOKMY22JoJ9FWKIVLqNF+WmKD/dqeBn2i8H7oTeY0pZNV 8NaBuHs4zl6yA9YH9GIZBuMitT1pVlvjzvoRWxINSub0ZkN29O695+uQC4F1DOhA nDlHetCqznTl1zZL+lpTIGkVncBUYFjDRwiA1RTprFS5VVHivqhKh+eGfuZXKROr xdcDh7nZ86HjtO4immYIhfGKPcompOg8gHXfSg7LwwJYqeueRrbF8uP3tD3RNA2E YPj9NGBwEgb0emcgqkk60rXdhi+CMS/X+ic+BTztEKT7Dnt253RNzoVflgo7Hd0t 4TwPAVGpWf7TGRm+/vi3j47vhWSHd0R6kMkljSdnGHS29aUHquu7rpBxEI+0+5FZ llAPRt1VCmaOifM7sdY+Fv1lkaYKxJLD1gQqQ8hKni+HwJkUu0SsyvLIDI5XF3e3 lZtZ2DmMLhxcgMcQ1ZHn8jRiy5y1xkxkR3YwV9DIBbGz8JUbwHHbO1KKlz53piIp lfyVGrwz9g==PZaR -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce