You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa Red Hat JBoss Enterprise Application Platform 6.4

Sigurnosni nedostatak programskog paketa Red Hat JBoss Enterprise Application Platform 6.4

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LRH

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat JBoss Enterprise Application Platform 6.4 security update
Advisory ID: RHSA-2020:3730-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3730
Issue date: 2020-09-14
CVE Names: CVE-2020-14384
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 6.4.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server – noarch
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server – noarch
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server – noarch

3. Description:

Red Hat JBoss Enterprise Application Platform is a platform for Java
applications based on the JBoss Application Server.

This release of Red Hat JBoss Enterprise Application Platform 6.4.23
includes bug fixes and enhancements, which are documented in the Release
Notes document listed in the References section.

Security Fix(es):

* jbossweb: Incomplete fix of CVE-2020-13935 for WebSocket in JBossWeb
could lead to DoS (CVE-2020-14384)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, see the CVE page(s) listed in the
References section.

All users of Red Hat JBoss Enterprise Application Platform 6.4 are advised
to upgrade to these updated packages.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1875176 – CVE-2020-14384 jbossweb: Incomplete fix of CVE-2020-13935 for WebSocket in JBossWeb could lead to DoS

6. Package List:

Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server:

Source:
jbossweb-7.5.31-3.Final_redhat_3.1.ep6.el5.src.rpm

noarch:
jbossweb-7.5.31-3.Final_redhat_3.1.ep6.el5.noarch.rpm

Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server:

Source:
jbossweb-7.5.31-3.Final_redhat_3.1.ep6.el6.src.rpm

noarch:
jbossweb-7.5.31-3.Final_redhat_3.1.ep6.el6.noarch.rpm

Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server:

Source:
jbossweb-7.5.31-3.Final_redhat_3.1.ep6.el7.src.rpm

noarch:
jbossweb-7.5.31-3.Final_redhat_3.1.ep6.el7.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2020-14384
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4
https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1

iQIVAwUBX19RttzjgjWX9erEAQgEvA/9Ekhb1Pn21VZWKDt1c3UBaJHY2Yl3m/SS
8gI8KrMrOQUdIKUCiwpVRgPa/aFDirVEepkedIVQFXxw2y798t3Krph2aH5ypZyQ
Kg4fDIrSmkXFZ24aNtj3/vLWNcSqiLjDlAWLULWhPG37uDNCJkQQEw18gXASn10p
ytKmPI6UuBUh80Wib5BH7ALxui2N5nDmCwmnvDApkB6WPDzAuK1o6F3glqKLGhus
kv0tgxRrzPY7iX83loRbdnnGjQTzucKLWBCug83F180x46z/wdFIqyx6YPlllI1g
+C/UYefJT57ZhjcnVNhuKsOxjOTEU2vnxxLMg1DULWi87XzSuw0ZVE8RojwSkIXC
4ZjKwJib94faHx41BAZaRVQezycj5NyVNv2znDC8h84JLxt8VPutR2T3/cqajvqx
UMfxAzcLUJ+LF0fjA2R8VnJNdI+//dGMsNPnb0yqGzm5EhIYzwqMwCNwnBSrXMIk
8T7e1wNqDJKIS1xWHM1z0qcy4F3QdWIJaCW8SR6ujwjOhJHXJRYvgn1JysQic1je
sUhyq7oy654CBecF7sfTZ81pCe4a2UwtL6AAJ+TQqEtMfjkPDUQgRHn38QxNWfJ8
lrgg80uqTmO1Vf4y9NTOmIcBt2anwWDamE0HjUX5mp9e41KGpsl/PtEESuMXbE82
M5wx+yB3iSw=
=DrWQ
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat JBoss Enterprise Application Platform 6.4 security update
Advisory ID: RHSA-2020:3731-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3731
Issue date: 2020-09-14
CVE Names: CVE-2020-14384
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 6.4.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Enterprise Application Platform is a platform for Java
applications based on the JBoss Application Server.

This asynchronous patch is an update for JBoss Enterprise Application
Platform 6.4. All users of Red Hat JBoss Enterprise Application Platform
6.4 are advised to upgrade to these updated packages.

Security Fix(es):

* jbossweb: tomcat: multiple requests with invalid payload length in a
WebSocket frame could lead to DoS (CVE-2020-13935)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, see the CVE page(s) listed in the
References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

1875176 – CVE-2020-14384 jbossweb: Incomplete fix of CVE-2020-13935 for WebSocket in JBossWeb could lead to DoS
1875869 – Tracker bug for the EAP 6.4.23 text only security update

5. References:

https://access.redhat.com/security/cve/CVE-2020-14384
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/6.4/

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=Nqss
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

AutorBruno Varga
Cert idNCERT-REF-2020-09-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa ansible

Otkriven je sigurnosni nedostatak u programskom paketu ansible za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izazivanje DoS stanja...

Close