Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.1672 Moderate: Red Hat JBoss Enterprise Application Platform 6.4.22 security update 14 May 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Red Hat JBoss Enterprise Application Platform 6.4.22 Publisher: Red Hat Operating System: Red Hat Enterprise Linux Server 5 Red Hat Enterprise Linux Server 6 Red Hat Enterprise Linux Server 7 Impact/Access: Modify Arbitrary Files -- Remote/Unauthenticated Cross-site Scripting -- Existing Account Provide Misleading Information -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2018-1000632 CVE-2018-10934 CVE-2018-8034 Reference: ASB-2019.0022 ESB-2019.0671 ESB-2019.0552 ESB-2019.0528 Original Bulletin: https://access.redhat.com/errata/RHSA-2019:1159 https://access.redhat.com/errata/RHSA-2019:1160 https://access.redhat.com/errata/RHSA-2019:1161 https://access.redhat.com/errata/RHSA-2019:1162 Comment: This bulletin contains four (4) Red Hat security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 6.4.22 security update Advisory ID: RHSA-2019:1159-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2019:1159 Issue date: 2019-05-13 CVE Names: CVE-2018-8034 CVE-2018-10934 CVE-2018-1000632 ===================================================================== 1. Summary: An update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server - noarch 3. Description: Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.22 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.21, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es): * admin-cli: wildfly-core: Cross-site scripting (XSS) in JBoss Management Console (CVE-2018-10934) * dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents (CVE-2018-1000632) * jbossweb: tomcat: host name verification missing in WebSocket client (CVE-2018-8034) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat Enterprise Linux 5 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1607580 - CVE-2018-8034 tomcat: host name verification missing in WebSocket client 1613428 - [GSS](6.4.z) Upgrade Ironjacamar from 1.0.42 to 1.0.43 1615673 - CVE-2018-10934 wildfly-core: Cross-site scripting (XSS) in JBoss Management Console 1620529 - CVE-2018-1000632 dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents 1630924 - [GSS](6.4.z) Upgrade Apache CXF from 2.7.18.SP6 to 2.7.18.SP7 1630928 - [GSS](6.4.z) Upgrade JBoss Web from 7.5.29 to 7.5.30 1631773 - [GSS](6.4.z) Upgrade HornetQ from 2.3.25.SP28 to 2.3.25.SP29 1643557 - [GSS](6.4.z) Upgrade HAL from 2.5.17 to 2.5.19 1675264 - [GSS](6.4.z) Upgrade RESTEasy from 2.3.22 to 2.3.23 1691431 - [GSS](6.4.z) Upgrade JBoss Remote Naming from 1.0.13 to 1.0.15 6. Package List: Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server: Source: apache-cxf-2.7.18-8.SP7_redhat_1.1.ep6.el5.src.rpm dom4j-eap6-1.6.1-22.redhat_9.1.ep6.el5.src.rpm hornetq-2.3.25-28.SP29_redhat_1.1.ep6.el5.src.rpm ironjacamar-eap6-1.0.43-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-appclient-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-cli-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-client-all-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-clustering-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-cmp-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-configadmin-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-connector-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-console-2.5.19-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-controller-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-controller-client-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-core-security-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-deployment-repository-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-deployment-scanner-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-domain-http-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-domain-management-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-ee-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-ee-deployment-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-ejb3-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-embedded-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-host-controller-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-jacorb-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-jaxr-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-jaxrs-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-jdr-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-jmx-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-jpa-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-jsf-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-jsr77-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-logging-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-mail-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-management-client-content-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-messaging-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-modcluster-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-naming-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-network-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-osgi-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-osgi-configadmin-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-osgi-service-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-picketlink-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-platform-mbean-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-pojo-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-process-controller-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-protocol-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-remoting-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-sar-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-security-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-server-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-system-jmx-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-threads-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-transactions-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-version-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-web-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-webservices-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-weld-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-xts-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-hal-2.5.19-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-remote-naming-1.0.15-1.Final_redhat_1.1.ep6.el5.src.rpm jbossas-appclient-7.5.22-2.Final_redhat_1.1.ep6.el5.src.rpm jbossas-bundles-7.5.22-2.Final_redhat_1.1.ep6.el5.src.rpm jbossas-core-7.5.22-2.Final_redhat_1.1.ep6.el5.src.rpm jbossas-domain-7.5.22-2.Final_redhat_1.1.ep6.el5.src.rpm jbossas-javadocs-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jbossas-modules-eap-7.5.22-1.Final_redhat_1.1.ep6.el5.src.rpm jbossas-product-eap-7.5.22-2.Final_redhat_1.1.ep6.el5.src.rpm jbossas-standalone-7.5.22-2.Final_redhat_1.1.ep6.el5.src.rpm jbossas-welcome-content-eap-7.5.22-2.Final_redhat_1.1.ep6.el5.src.rpm jbossweb-7.5.30-1.Final_redhat_1.1.ep6.el5.src.rpm resteasy-2.3.23-1.Final_redhat_1.1.ep6.el5.src.rpm noarch: apache-cxf-2.7.18-8.SP7_redhat_1.1.ep6.el5.noarch.rpm dom4j-eap6-1.6.1-22.redhat_9.1.ep6.el5.noarch.rpm hornetq-2.3.25-28.SP29_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-common-api-eap6-1.0.43-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-common-impl-eap6-1.0.43-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-common-spi-eap6-1.0.43-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-core-api-eap6-1.0.43-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-core-impl-eap6-1.0.43-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-deployers-common-eap6-1.0.43-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-eap6-1.0.43-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-jdbc-eap6-1.0.43-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-spec-api-eap6-1.0.43-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-validator-eap6-1.0.43-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-appclient-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-cli-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-client-all-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-clustering-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-cmp-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-configadmin-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-connector-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-console-2.5.19-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-controller-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-controller-client-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-core-security-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-deployment-repository-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-deployment-scanner-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-domain-http-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-domain-management-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-ee-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-ee-deployment-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-ejb3-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-embedded-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-host-controller-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-jacorb-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-jaxr-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-jaxrs-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-jdr-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-jmx-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-jpa-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-jsf-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-jsr77-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-logging-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-mail-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-management-client-content-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-messaging-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-modcluster-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-naming-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-network-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-osgi-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-osgi-configadmin-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-osgi-service-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-picketlink-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-platform-mbean-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-pojo-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-process-controller-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-protocol-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-remoting-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-sar-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-security-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-server-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-system-jmx-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-threads-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-transactions-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-version-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-web-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-webservices-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-weld-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-xts-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-hal-2.5.19-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-remote-naming-1.0.15-1.Final_redhat_1.1.ep6.el5.noarch.rpm jbossas-appclient-7.5.22-2.Final_redhat_1.1.ep6.el5.noarch.rpm jbossas-bundles-7.5.22-2.Final_redhat_1.1.ep6.el5.noarch.rpm jbossas-core-7.5.22-2.Final_redhat_1.1.ep6.el5.noarch.rpm jbossas-domain-7.5.22-2.Final_redhat_1.1.ep6.el5.noarch.rpm jbossas-javadocs-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jbossas-modules-eap-7.5.22-1.Final_redhat_1.1.ep6.el5.noarch.rpm jbossas-product-eap-7.5.22-2.Final_redhat_1.1.ep6.el5.noarch.rpm jbossas-standalone-7.5.22-2.Final_redhat_1.1.ep6.el5.noarch.rpm jbossas-welcome-content-eap-7.5.22-2.Final_redhat_1.1.ep6.el5.noarch.rpm jbossweb-7.5.30-1.Final_redhat_1.1.ep6.el5.noarch.rpm resteasy-2.3.23-1.Final_redhat_1.1.ep6.el5.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-8034 https://access.redhat.com/security/cve/CVE-2018-10934 https://access.redhat.com/security/cve/CVE-2018-1000632 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXNmk+NzjgjWX9erEAQjD3w/8DUt3F2B1TN12IqvqLeIunRe6N+OdB+p6 Wx2SyDfRRbsm2DRPem8i1JC/tqm8ncbcSdwYEY1MTwrSaqNbz+PDLkkgBlpPahUk 4Xnd5BehezsC1NInaU3L4WuVY9OztnVOI9KdpX2il9vdv2CCC1ak+9jv3xmZPVon veeOJvNfRz+4avK1jA6rYb6iH5A+uBJ/1HEpzHLtrPPFRnauh+5oURpE0r3u0n8n LAgk+pwpG3RQzB3/2FWGCzecjUve9UqQ/dk2ubpoIZu7ZyIaafQL0d7PaDAoLt8b XFkLJmbE5um2BY67BnNL+PzpU9aBcSPDu9Pd8MV9Kx2VIzIjJjav1izOu7x4gaxb xh7ub2tK29XTUFqt4rSZ+rJa9uKM6crIq3cq6g5i+sPxFpt01I4E3d/SB8jYxCDN vzr/OW/L/gQoErvL2Hc6YME+SFyqtAtBrgr1QCKb3GRJZeTeV/HTjMaCoSzerW0+ VHe+exI8Cwj71b7PdF7A00W8TrA3r0KYvynk3RUCqOARjrHYLR/y9eFephz0/7sm 01vqh/TogbdFHs/pBZx61owStRvWwSxouy3s6ya5hYo6TrrH2vlYe4l7lbCM+PZz cPRUXWGMfFU6KHmKKsblu6Cz5qwin9+MJTbRJwerBz+AyHxUnjxHMn+AKMJFGN77 2ovpjWONwQI= =cHZf - -----END PGP SIGNATURE----- - ------------------------------------------------------------------------------ - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 6.4.22 security update Advisory ID: RHSA-2019:1160-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2019:1160 Issue date: 2019-05-13 CVE Names: CVE-2018-8034 CVE-2018-10934 CVE-2018-1000632 ===================================================================== 1. Summary: An update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server - noarch 3. Description: Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.22 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.21, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es): * admin-cli: wildfly-core: Cross-site scripting (XSS) in JBoss Management Console (CVE-2018-10934) * dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents (CVE-2018-1000632) * jbossweb: tomcat: host name verification missing in WebSocket client (CVE-2018-8034) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat Enterprise Linux 6 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1607580 - CVE-2018-8034 tomcat: host name verification missing in WebSocket client 1613428 - [GSS](6.4.z) Upgrade Ironjacamar from 1.0.42 to 1.0.43 1615673 - CVE-2018-10934 wildfly-core: Cross-site scripting (XSS) in JBoss Management Console 1620529 - CVE-2018-1000632 dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents 1630924 - [GSS](6.4.z) Upgrade Apache CXF from 2.7.18.SP6 to 2.7.18.SP7 1630928 - [GSS](6.4.z) Upgrade JBoss Web from 7.5.29 to 7.5.30 1631773 - [GSS](6.4.z) Upgrade HornetQ from 2.3.25.SP28 to 2.3.25.SP29 1643557 - [GSS](6.4.z) Upgrade HAL from 2.5.17 to 2.5.19 1675264 - [GSS](6.4.z) Upgrade RESTEasy from 2.3.22 to 2.3.23 1691431 - [GSS](6.4.z) Upgrade JBoss Remote Naming from 1.0.13 to 1.0.15 6. Package List: Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server: Source: apache-cxf-2.7.18-8.SP7_redhat_1.1.ep6.el6.src.rpm dom4j-eap6-1.6.1-22.redhat_9.1.ep6.el6.src.rpm hornetq-2.3.25-28.SP29_redhat_1.1.ep6.el6.src.rpm ironjacamar-eap6-1.0.43-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-appclient-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-cli-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-client-all-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-clustering-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-cmp-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-configadmin-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-connector-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-console-2.5.19-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-controller-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-controller-client-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-core-security-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-deployment-repository-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-deployment-scanner-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-domain-http-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-domain-management-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-ee-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-ee-deployment-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-ejb3-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-embedded-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-host-controller-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-jacorb-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-jaxr-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-jaxrs-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-jdr-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-jmx-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-jpa-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-jsf-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-jsr77-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-logging-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-mail-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-management-client-content-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-messaging-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-modcluster-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-naming-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-network-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-osgi-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-osgi-configadmin-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-osgi-service-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-picketlink-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-platform-mbean-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-pojo-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-process-controller-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-protocol-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-remoting-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-sar-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-security-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-server-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-system-jmx-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-threads-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-transactions-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-version-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-web-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-webservices-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-weld-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-xts-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-hal-2.5.19-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-remote-naming-1.0.15-1.Final_redhat_1.1.ep6.el6.src.rpm jbossas-appclient-7.5.22-2.Final_redhat_1.1.ep6.el6.src.rpm jbossas-bundles-7.5.22-2.Final_redhat_1.1.ep6.el6.src.rpm jbossas-core-7.5.22-2.Final_redhat_1.1.ep6.el6.src.rpm jbossas-domain-7.5.22-2.Final_redhat_1.1.ep6.el6.src.rpm jbossas-javadocs-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jbossas-modules-eap-7.5.22-1.Final_redhat_1.1.ep6.el6.src.rpm jbossas-product-eap-7.5.22-2.Final_redhat_1.1.ep6.el6.src.rpm jbossas-standalone-7.5.22-2.Final_redhat_1.1.ep6.el6.src.rpm jbossas-welcome-content-eap-7.5.22-2.Final_redhat_1.1.ep6.el6.src.rpm jbossweb-7.5.30-1.Final_redhat_1.1.ep6.el6.src.rpm resteasy-2.3.23-1.Final_redhat_1.1.ep6.el6.src.rpm noarch: apache-cxf-2.7.18-8.SP7_redhat_1.1.ep6.el6.noarch.rpm dom4j-eap6-1.6.1-22.redhat_9.1.ep6.el6.noarch.rpm hornetq-2.3.25-28.SP29_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-common-api-eap6-1.0.43-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-common-impl-eap6-1.0.43-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-common-spi-eap6-1.0.43-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-core-api-eap6-1.0.43-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-core-impl-eap6-1.0.43-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-deployers-common-eap6-1.0.43-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-eap6-1.0.43-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-jdbc-eap6-1.0.43-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-spec-api-eap6-1.0.43-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-validator-eap6-1.0.43-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-appclient-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-cli-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-client-all-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-clustering-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-cmp-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-configadmin-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-connector-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-console-2.5.19-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-controller-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-controller-client-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-core-security-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-deployment-repository-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-deployment-scanner-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-domain-http-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-domain-management-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-ee-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-ee-deployment-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-ejb3-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-embedded-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-host-controller-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-jacorb-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-jaxr-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-jaxrs-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-jdr-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-jmx-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-jpa-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-jsf-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-jsr77-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-logging-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-mail-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-management-client-content-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-messaging-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-modcluster-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-naming-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-network-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-osgi-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-osgi-configadmin-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-osgi-service-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-picketlink-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-platform-mbean-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-pojo-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-process-controller-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-protocol-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-remoting-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-sar-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-security-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-server-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-system-jmx-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-threads-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-transactions-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-version-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-web-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-webservices-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-weld-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-xts-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-hal-2.5.19-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-remote-naming-1.0.15-1.Final_redhat_1.1.ep6.el6.noarch.rpm jbossas-appclient-7.5.22-2.Final_redhat_1.1.ep6.el6.noarch.rpm jbossas-bundles-7.5.22-2.Final_redhat_1.1.ep6.el6.noarch.rpm jbossas-core-7.5.22-2.Final_redhat_1.1.ep6.el6.noarch.rpm jbossas-domain-7.5.22-2.Final_redhat_1.1.ep6.el6.noarch.rpm jbossas-javadocs-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jbossas-modules-eap-7.5.22-1.Final_redhat_1.1.ep6.el6.noarch.rpm jbossas-product-eap-7.5.22-2.Final_redhat_1.1.ep6.el6.noarch.rpm jbossas-standalone-7.5.22-2.Final_redhat_1.1.ep6.el6.noarch.rpm jbossas-welcome-content-eap-7.5.22-2.Final_redhat_1.1.ep6.el6.noarch.rpm jbossweb-7.5.30-1.Final_redhat_1.1.ep6.el6.noarch.rpm resteasy-2.3.23-1.Final_redhat_1.1.ep6.el6.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-8034 https://access.redhat.com/security/cve/CVE-2018-10934 https://access.redhat.com/security/cve/CVE-2018-1000632 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXNmlE9zjgjWX9erEAQh2hA//WufFPgxlJy2hW535Vz9SOpiF+C5ixMvB Q6I9qDmhBLIRWTswo/HGIT+584YO1Oxm5fVNAVVfpeblVSpYNb8eglc/f41pRk6w 1oYpRgkUEPS0p0xe4q7PxKBdMEim3EnNzyBFiBhdS2M3h9/bjeKdssui3OWYAGv3 b2UrSziOlHQD2n6BQXE6DeTYFVWMl+S/TPouvtdUSwp+tNGzOfRwza7p5ZxNjoyh ckB7devVS+vZ4JT8FNjYJXQtgiy3JQKCCZ//HhqLICkIkeceqIGUnfc2aUL5heoI q31kT2pku9oJmzkzvXBit5oS83oiztvwQxGYp0DKafxUBxeF9X1UqMJD/9MlgQrR 1imEHVXJDqwe8AJZYm/+ywC2LynkaPt3WEQtKjUhFh5VS2c8tcS8bVywJvf+WUwA NIOaKTcQefNF9XHLy3jsozjzv0rzyfbqCua1azIa62MnCxWxL4f0HG/OxfZvZB4B 5hD/xDn/VEbNyLYjcACdmK7criIzHmW4FJqg6qoRu4xSK+zTIx0ZBHmi1cctW1KR 3ZlTg8PiAaQPixYVIibCSiMPQ1EhpvAEIUc5nNgXThKVPa8I+FKTWnilvebwIKw5 PhFXw8PH/n+R5wwgaxsc9TEB+y4sCdA6f0LtYU20Wvosf+OcqGUfcklO0TPY9mUk nfB/tw0VmEk= =4Z+T - -----END PGP SIGNATURE----- - ------------------------------------------------------------------------------ - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 6.4.22 security update Advisory ID: RHSA-2019:1161-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2019:1161 Issue date: 2019-05-13 CVE Names: CVE-2018-8034 CVE-2018-10934 CVE-2018-1000632 ===================================================================== 1. Summary: An update is now available for Red Hat JBoss Enterprise Application Platform 6.4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server - noarch 3. Description: Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.22 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.21, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es): * admin-cli: wildfly-core: Cross-site scripting (XSS) in JBoss Management Console (CVE-2018-10934) * dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents (CVE-2018-1000632) * jbossweb: tomcat: host name verification missing in WebSocket client (CVE-2018-8034) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat Enterprise Linux 7 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1607580 - CVE-2018-8034 tomcat: host name verification missing in WebSocket client 1613428 - [GSS](6.4.z) Upgrade Ironjacamar from 1.0.42 to 1.0.43 1615673 - CVE-2018-10934 wildfly-core: Cross-site scripting (XSS) in JBoss Management Console 1620529 - CVE-2018-1000632 dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents 1630924 - [GSS](6.4.z) Upgrade Apache CXF from 2.7.18.SP6 to 2.7.18.SP7 1630928 - [GSS](6.4.z) Upgrade JBoss Web from 7.5.29 to 7.5.30 1631773 - [GSS](6.4.z) Upgrade HornetQ from 2.3.25.SP28 to 2.3.25.SP29 1643557 - [GSS](6.4.z) Upgrade HAL from 2.5.17 to 2.5.19 1675264 - [GSS](6.4.z) Upgrade RESTEasy from 2.3.22 to 2.3.23 1691431 - [GSS](6.4.z) Upgrade JBoss Remote Naming from 1.0.13 to 1.0.15 6. Package List: Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server: Source: apache-cxf-2.7.18-8.SP7_redhat_1.1.ep6.el7.src.rpm dom4j-eap6-1.6.1-22.redhat_9.1.ep6.el7.src.rpm hornetq-2.3.25-28.SP29_redhat_1.1.ep6.el7.src.rpm ironjacamar-eap6-1.0.43-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-appclient-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-cli-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-client-all-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-clustering-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-cmp-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-configadmin-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-connector-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-console-2.5.19-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-controller-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-controller-client-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-core-security-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-deployment-repository-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-deployment-scanner-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-domain-http-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-domain-management-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-ee-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-ee-deployment-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-ejb3-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-embedded-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-host-controller-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-jacorb-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-jaxr-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-jaxrs-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-jdr-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-jmx-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-jpa-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-jsf-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-jsr77-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-logging-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-mail-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-management-client-content-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-messaging-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-modcluster-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-naming-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-network-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-osgi-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-osgi-configadmin-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-osgi-service-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-picketlink-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-platform-mbean-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-pojo-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-process-controller-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-protocol-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-remoting-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-sar-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-security-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-server-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-system-jmx-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-threads-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-transactions-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-version-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-web-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-webservices-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-weld-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-xts-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-hal-2.5.19-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-remote-naming-1.0.15-1.Final_redhat_1.1.ep6.el7.src.rpm jbossas-appclient-7.5.22-2.Final_redhat_1.1.ep6.el7.src.rpm jbossas-bundles-7.5.22-2.Final_redhat_1.1.ep6.el7.src.rpm jbossas-core-7.5.22-2.Final_redhat_1.1.ep6.el7.src.rpm jbossas-domain-7.5.22-2.Final_redhat_1.1.ep6.el7.src.rpm jbossas-javadocs-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jbossas-modules-eap-7.5.22-1.Final_redhat_1.1.ep6.el7.src.rpm jbossas-product-eap-7.5.22-2.Final_redhat_1.1.ep6.el7.src.rpm jbossas-standalone-7.5.22-2.Final_redhat_1.1.ep6.el7.src.rpm jbossas-welcome-content-eap-7.5.22-2.Final_redhat_1.1.ep6.el7.src.rpm jbossweb-7.5.30-1.Final_redhat_1.1.ep6.el7.src.rpm resteasy-2.3.23-1.Final_redhat_1.1.ep6.el7.src.rpm noarch: apache-cxf-2.7.18-8.SP7_redhat_1.1.ep6.el7.noarch.rpm dom4j-eap6-1.6.1-22.redhat_9.1.ep6.el7.noarch.rpm hornetq-2.3.25-28.SP29_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-common-api-eap6-1.0.43-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-common-impl-eap6-1.0.43-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-common-spi-eap6-1.0.43-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-core-api-eap6-1.0.43-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-core-impl-eap6-1.0.43-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-deployers-common-eap6-1.0.43-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-eap6-1.0.43-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-jdbc-eap6-1.0.43-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-spec-api-eap6-1.0.43-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-validator-eap6-1.0.43-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-appclient-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-cli-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-client-all-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-clustering-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-cmp-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-configadmin-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-connector-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-console-2.5.19-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-controller-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-controller-client-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-core-security-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-deployment-repository-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-deployment-scanner-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-domain-http-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-domain-management-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-ee-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-ee-deployment-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-ejb3-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-embedded-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-host-controller-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-jacorb-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-jaxr-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-jaxrs-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-jdr-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-jmx-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-jpa-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-jsf-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-jsr77-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-logging-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-mail-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-management-client-content-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-messaging-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-modcluster-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-naming-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-network-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-osgi-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-osgi-configadmin-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-osgi-service-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-picketlink-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-platform-mbean-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-pojo-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-process-controller-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-protocol-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-remoting-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-sar-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-security-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-server-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-system-jmx-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-threads-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-transactions-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-version-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-web-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-webservices-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-weld-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-xts-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-hal-2.5.19-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-remote-naming-1.0.15-1.Final_redhat_1.1.ep6.el7.noarch.rpm jbossas-appclient-7.5.22-2.Final_redhat_1.1.ep6.el7.noarch.rpm jbossas-bundles-7.5.22-2.Final_redhat_1.1.ep6.el7.noarch.rpm jbossas-core-7.5.22-2.Final_redhat_1.1.ep6.el7.noarch.rpm jbossas-domain-7.5.22-2.Final_redhat_1.1.ep6.el7.noarch.rpm jbossas-javadocs-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jbossas-modules-eap-7.5.22-1.Final_redhat_1.1.ep6.el7.noarch.rpm jbossas-product-eap-7.5.22-2.Final_redhat_1.1.ep6.el7.noarch.rpm jbossas-standalone-7.5.22-2.Final_redhat_1.1.ep6.el7.noarch.rpm jbossas-welcome-content-eap-7.5.22-2.Final_redhat_1.1.ep6.el7.noarch.rpm jbossweb-7.5.30-1.Final_redhat_1.1.ep6.el7.noarch.rpm resteasy-2.3.23-1.Final_redhat_1.1.ep6.el7.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2018-8034 https://access.redhat.com/security/cve/CVE-2018-10934 https://access.redhat.com/security/cve/CVE-2018-1000632 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXNmlBtzjgjWX9erEAQgS6A//fa+AkCSdddadfZvpaTDoaS92IhJoUcb9 N3e4K5yr1UI81YHEhpFVAagzBgwCwTEL3O5bWkiaseonrFI6eKZoSJzVOkQhPk/j Lk3GdShE1eZWJ2sKhhJS1JTLyYsNOl8WGw8Nbw+CG6o/TrRw/RNJMFo4JTkRacwT aNoQGhC+y7KGmIhpyDcph9pF5sXHSTqjioG5VGzavQ9APwyY5A/YfgjSJuiGXJaR 0L09XmGh9c+TDd4bitl3uM8zZihGvXmR4uS5dQcqrHlatd8BdFnVm7ROpwEtR7uU UvRV6yC6NdM/H3IYrmVJFQ05no3jyNnQRMwFaqv6wgA5zEc9KQrduJB2wzfpt6Qu Sn4S4mcZquHqrh6/PAeyeMg3Tfgbl+ETG8riCUkkHHoOcyyYuGSukvlVYmDNbTZR MCuVP+dP5XeVJOL/vVmfcQW35Njp9ohFP5+zH3Or9Cv6fMZPncfj9jk28xfv+fRM EqP2X1EwkF1HiD6HhUgRPimXVrHxdSNx/sUjmMJbjooNZwuUkRidpghvRwLrd7w4 K/9drEGlxAlDizT/aWtf5WC3IU1wSW+MGT3b1WTPRxZMMT5ZfejUHeOCJ3LL5Y26 o4AtDxzxY/gqa/6vftokKtzXImK3lCP7qAcYpmo+uAjQ/KI5lbylbV7ez+5H6ato VunHAjm2a+I= =F35p - -----END PGP SIGNATURE----- - ------------------------------------------------------------------------------ - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 6.4.22 security update Advisory ID: RHSA-2019:1162-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2019:1162 Issue date: 2019-05-13 CVE Names: CVE-2018-8034 CVE-2018-10934 CVE-2018-1000632 ===================================================================== 1. Summary: An update is now available for Red Hat JBoss Enterprise Application Platform 6.4. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.22 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.21, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es): * admin-cli: wildfly-core: Cross-site scripting (XSS) in JBoss Management Console (CVE-2018-10934) * dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents (CVE-2018-1000632) * jbossweb: tomcat: host name verification missing in WebSocket client (CVE-2018-8034) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. All users of Red Hat JBoss Enterprise Application Platform 6.4 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect. 3. Solution: Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications. The References section of this erratum contains a download link (you must log in to download the update). 4. Bugs fixed (https://bugzilla.redhat.com/): 1607580 - CVE-2018-8034 tomcat: host name verification missing in WebSocket client 1613428 - [GSS](6.4.z) Upgrade Ironjacamar from 1.0.42 to 1.0.43 1615673 - CVE-2018-10934 wildfly-core: Cross-site scripting (XSS) in JBoss Management Console 1620529 - CVE-2018-1000632 dom4j: XML Injection in Class: Element. Methods: addElement, addAttribute which can impact the integrity of XML documents 1630924 - [GSS](6.4.z) Upgrade Apache CXF from 2.7.18.SP6 to 2.7.18.SP7 1630928 - [GSS](6.4.z) Upgrade JBoss Web from 7.5.29 to 7.5.30 1631773 - [GSS](6.4.z) Upgrade HornetQ from 2.3.25.SP28 to 2.3.25.SP29 1643557 - [GSS](6.4.z) Upgrade HAL from 2.5.17 to 2.5.19 1675264 - [GSS](6.4.z) Upgrade RESTEasy from 2.3.22 to 2.3.23 1691431 - [GSS](6.4.z) Upgrade JBoss Remote Naming from 1.0.13 to 1.0.15 5. References: https://access.redhat.com/security/cve/CVE-2018-8034 https://access.redhat.com/security/cve/CVE-2018-10934 https://access.redhat.com/security/cve/CVE-2018-1000632 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/6.4/ https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4 6. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIUAwUBXNmodNzjgjWX9erEAQghcA/4w/76DtpL5247P+KOeYX7Z4qZXHTC5Cxw aTzBasOcZueXvmhCUMIAXOwCJq9lBi+LkB7NvbiYCnymjjF6zzx+w7HXz5OThYAs Op+a427WblPdmjgj4lu2waU16Hlt17RCfWi4F7s5gUgPO598ECsfVLDAOvXLogM4 RoZT34aEYN31xLbej0xXOKMY22JoJ9FWKIVLqNF+WmKD/dqeBn2i8H7oTeY0pZNV 8NaBuHs4zl6yA9YH9GIZBuMitT1pVlvjzvoRWxINSub0ZkN29O695+uQC4F1DOhA nDlHetCqznTl1zZL+lpTIGkVncBUYFjDRwiA1RTprFS5VVHivqhKh+eGfuZXKROr xdcDh7nZ86HjtO4immYIhfGKPcompOg8gHXfSg7LwwJYqeueRrbF8uP3tD3RNA2E YPj9NGBwEgb0emcgqkk60rXdhi+CMS/X+ic+BTztEKT7Dnt253RNzoVflgo7Hd0t 4TwPAVGpWf7TGRm+/vi3j47vhWSHd0R6kMkljSdnGHS29aUHquu7rpBxEI+0+5FZ llAPRt1VCmaOifM7sdY+Fv1lkaYKxJLD1gQqQ8hKni+HwJkUu0SsyvLIDI5XF3e3 lZtZ2DmMLhxcgMcQ1ZHn8jRiy5y1xkxkR3YwV9DIBbGz8JUbwHHbO1KKlz53piIp lfyVGrwz9g== =PZaR - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXNoR9WaOgq3Tt24GAQjI6xAAkNDB+Nc8ixYVdz67OzQ6RKpO9uAGxAAG rty5avknk0qC+M3wdqnvAfD6/KuMNVe9CphIp0XRkgfGVpXOVRVfNNMamT798jIx dNeQdz/YC+YJ2mTgZQaLFhg2v/ha1h26px+xJ4c/WYvy+L2j8ZenZAbO2U6obT4l YRgwMrlXw2agb/q+CKRd//lkTBaQFWLvcaomtnLv93zSz8oum7lKSU0CMvBSKQ4b yqSrTfKKojNzbdBDmd2k0vrLagXAPAlHP2KTgD8w0Yr55B549W/qPrYjuTRkx1io ofxSz2U97yXq//Tdr23Jhg7BKR9Rg+5nmKeUU3ncf1O6NmOV3JOBmWks3w9g/EDL w1jSFfWypNDmqK60Z6n2DSeuahAJETqX8NAqTf1WhdpbK+9/po5RWPsNQy4+1ybA FnURXnu0bTOXSzpcLbOrt8QkfxC9U9La/VO5aCZarC0GrkOuozA20qtioABZix2p mX62nebo5Lfon6klZQVcOkvRy8NLbJNxDVPfSkP+G3E2HB7wlmmqFAS91buHhszd Z8CVS7DgW/eaJK8R7+mrQpjSNt1uMR6LULmUk60eBRJT1jlcZoHArrWdm3fyqInC NgMvKk/aQTqwokGTwgUqvl57VOsB3RnuYJlzTTDqXnASiTsdlwL1dABpbDj2lgY/ xHfMyUlhWtA= =znBP -----END PGP SIGNATURE-----