You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa Red Hat JBoss Enterprise Application Platform

Sigurnosni nedostatak programskog paketa Red Hat JBoss Enterprise Application Platform

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LRH

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 6.4 security update
Advisory ID: RHSA-2020:2169-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2020:2169
Issue date: 2020-05-14
CVE Names: CVE-2019-14885
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 6.4 for Red Hat Enterprise Linux 5, 6, and 7.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server – noarch
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server – noarch
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server – noarch

3. Description:

Red Hat JBoss Enterprise Application Platform is a platform for Java
applications based on the JBoss Application Server.

This asynchronous patch is an update for JBoss Enterprise Application
Platform 6.4 for Red Hat Enterprise Linux 5, 6, and 7. All users of Red Hat
JBoss Enterprise Application Platform 6.4 are advised to upgrade to this
updated package.

Security Fix(es):

* jboss-cli: JBoss EAP: Vault system property security attribute value is
revealed on CLI ‘reload’ command (CVE-2019-14885)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, see the CVE page(s) listed in the
References section.

4. Solution:

Before applying this update, ensure all previously released errata relevant
to your system have been applied. The JBoss server process must be
restarted for the update to take effect.

For details about how to apply this update, see:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1770615 – CVE-2019-14885 JBoss EAP: Vault system property security attribute value is revealed on CLI ‘reload’ command

6. Package List:

Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server:

Source:
jboss-as-controller-7.5.22-3.Final_redhat_4.1.ep6.el5.src.rpm
jboss-as-server-7.5.22-3.Final_redhat_4.1.ep6.el5.src.rpm
jboss-as-weld-7.5.22-3.Final_redhat_4.1.ep6.el5.src.rpm

noarch:
jboss-as-controller-7.5.22-3.Final_redhat_4.1.ep6.el5.noarch.rpm
jboss-as-server-7.5.22-3.Final_redhat_4.1.ep6.el5.noarch.rpm
jboss-as-weld-7.5.22-3.Final_redhat_4.1.ep6.el5.noarch.rpm

Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server:

Source:
jboss-as-controller-7.5.22-3.Final_redhat_4.1.ep6.el6.src.rpm
jboss-as-server-7.5.22-3.Final_redhat_4.1.ep6.el6.src.rpm
jboss-as-weld-7.5.22-3.Final_redhat_4.1.ep6.el6.src.rpm

noarch:
jboss-as-controller-7.5.22-3.Final_redhat_4.1.ep6.el6.noarch.rpm
jboss-as-server-7.5.22-3.Final_redhat_4.1.ep6.el6.noarch.rpm
jboss-as-weld-7.5.22-3.Final_redhat_4.1.ep6.el6.noarch.rpm

Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server:

Source:
jboss-as-controller-7.5.22-3.Final_redhat_4.1.ep6.el7.src.rpm
jboss-as-server-7.5.22-3.Final_redhat_4.1.ep6.el7.src.rpm
jboss-as-weld-7.5.22-3.Final_redhat_4.1.ep6.el7.src.rpm

noarch:
jboss-as-controller-7.5.22-3.Final_redhat_4.1.ep6.el7.noarch.rpm
jboss-as-server-7.5.22-3.Final_redhat_4.1.ep6.el7.noarch.rpm
jboss-as-weld-7.5.22-3.Final_redhat_4.1.ep6.el7.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-14885
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/6.4/

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=OO4J
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 6.4 security update
Advisory ID: RHSA-2020:2168-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2020:2168
Issue date: 2020-05-14
CVE Names: CVE-2019-14885
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 6.4.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Enterprise Application Platform is a platform for Java
applications based on the JBoss Application Server.

This asynchronous patch is an update for JBoss Enterprise Application
Platform 6.4. All users of Red Hat JBoss Enterprise Application Platform
6.4 are advised to upgrade to these updated packages.

Security Fix(es):

* jboss-cli: JBoss EAP: Vault system property security attribute value is
revealed on CLI ‘reload’ command (CVE-2019-14885)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, see the CVE page(s) listed in the
References section.

3. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications. The JBoss
server process must be restarted for the update to take effect.

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (https://bugzilla.redhat.com/):

1770615 – CVE-2019-14885 JBoss EAP: Vault system property security attribute value is revealed on CLI ‘reload’ command

5. References:

https://access.redhat.com/security/cve/CVE-2019-14885
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/6.4/

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=SmE/
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

AutorToni Vugdelija
Cert idNCERT-REF-2020-05-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa apt

Otkriveni su sigurnosni nedostaci u programskom paketu apt za operacijski sustav Debian. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje napada uskraćivanjem...

Close