-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0286
    Red Hat JBoss Enterprise Application Platform 7.3.5 security update
                              27 January 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat JBoss Enterprise Application Platform 7.3.5
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Denial of Service        -- Remote/Unauthenticated
                   Access Confidential Data -- Remote/Unauthenticated
                   Unauthorised Access      -- Remote/Unauthenticated
                   Reduced Security         -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-27822 CVE-2020-27782 CVE-2020-25689
                   CVE-2020-25640 CVE-2020-25633 CVE-2020-13956

Reference:         ESB-2021.0107
                   ESB-2020.3539
                   ESB-2020.3500

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2021:0246
   https://access.redhat.com/errata/RHSA-2021:0247
   https://access.redhat.com/errata/RHSA-2021:0248
   https://access.redhat.com/errata/RHSA-2021:0250

Comment: This bulletin contains four (4) Red Hat security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 7.3.5 security update
Advisory ID:       RHSA-2021:0246-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0246
Issue date:        2021-01-25
CVE Names:         CVE-2020-13956 CVE-2020-25633 CVE-2020-25640 
                   CVE-2020-25689 CVE-2020-27782 CVE-2020-27822 
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 7.3 for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss EAP 7.3 for RHEL 6 Server - noarch

3. Description:

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on the WildFly application runtime.

This release of Red Hat JBoss Enterprise Application Platform 7.3.5 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.4,
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise
Application Platform 7.3.5 Release Notes for information about the most
significant bug fixes and enhancements included in this release.

Security Fix(es):

* wildfly: Potential Memory leak in Wildfly when using OpenTracing
(CVE-2020-27822)

* undertow: special character in query results in server errors
(CVE-2020-27782)

* wildfly-core: memory leak in WildFly host-controller in domain mode while
not able to reconnect to domain-controller (CVE-2020-25689)

* httpclient: apache-httpclient: incorrect handling of malformed authority
component in request URIs (CVE-2020-13956)

* wildfly: resource adapter logs plaintext JMS password at warning level on
connection error (CVE-2020-25640)

* resteasy-client: potential sensitive information leakage in JAX-RS
RESTEasy Client's WebApplicationException handling (CVE-2020-25633)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, see the CVE page(s) listed in the
References section.

4. Solution:

Before applying this update, ensure all previously released errata relevant
to your system have been applied.

For details about how to apply this update, see:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1879042 - CVE-2020-25633 resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling
1881637 - CVE-2020-25640 wildfly: resource adapter logs plaintext JMS password at warning level on connection error
1886587 - CVE-2020-13956 apache-httpclient: incorrect handling of malformed authority component in request URIs
1893070 - CVE-2020-25689 wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller
1901304 - CVE-2020-27782 undertow: special character in query results in server errors
1904060 - CVE-2020-27822 wildfly: Potential Memory leak in Wildfly when using OpenTracing

6. JIRA issues fixed (https://issues.jboss.org/):

JBEAP-19788 - [GSS](7.3.z) Upgrade wildfly-http-client from 1.0.22.Final-redhat-00001 to 1.0.24.Final-redhat-00001
JBEAP-19790 - [GSS](7.3.z) Upgrade jboss-ejb-client from 4.0.33.SP1-redhat-00001 to 4.0.37.Final-redhat-00001
JBEAP-19816 - [GSS](7.3.z) UNDERTOW-1745 - Undertow access-log does not work for HTTP/2 POST request on HTTP Upgrade based connection
JBEAP-20240 - (7.3.z) Upgrade Narayana from 5.9.9.Final to 5.9.10.Final
JBEAP-20268 - (7.3.z) Upgrade generic jms from 2.0.6 to 2.0.8
JBEAP-20269 - Tracker bug for the EAP 7.3.5 release for RHEL-6
JBEAP-20286 - [GSS](7.3.z) Upgrade Hibernate ORM from 5.3.18.Final-redhat-00002 to 5.3.20.Final-redhat-00001
JBEAP-20288 - [GSS] (7.3.z) Upgrade undertow from 2.0.32.SP1-redhat to 2.0.33.SP2-redhat
JBEAP-20333 - (7.3.z) Upgrade JSF based on Mojarra 2.3.9.SP12-redhat-00001 to 2.3.9.SP13-redhat-00001
JBEAP-20373 - (7.3.z) Upgrade Apache HTTP Client to 4.5.13
JBEAP-20376 - (7.3.z) Upgrade WildFly Elytron from 1.10.9.Final-redhat-00001 to 1.10.10.Final-redhat
JBEAP-20399 - (7.3.z) Upgrade RESTEasy from 3.11.2.Final.redhat-00001 to 3.11.3.Final.redhat-00001
JBEAP-20403 - [GSS](7.3.z) Upgrade XNIO from 3.7.11.Final to 3.7.12.Final
JBEAP-20405 - [GSS](7.3.z) Upgrade Artemis from 2.9.0.redhat-00016 to 2.9.0.redhat-00017
JBEAP-20438 - [GSS](7.3.z) Upgrade JBoss Remoting from 5.0.19.Final-redhat-00001 to 5.0.20.Final-redhat-00001
JBEAP-20480 - [GSS](7.3.z) Upgrade HAL from 3.2.11.Final-redhat-00001 to 3.2.12.Final
JBEAP-20502 - (7.3.z) Upgrade JBoss Modules from 1.10.0.Final to 1.11.0.Final
JBEAP-20521 - (7.3.z) Upgrade wildfly-discovery-client to 1.2.1.Final
JBEAP-20591 - (7.3.z) Upgrade opentracing-interceptors from 0.0.4.redhat-00004 to 0.0.4.1.redhat-00002

7. Package List:

Red Hat JBoss EAP 7.3 for RHEL 6 Server:

Source:
eap7-activemq-artemis-2.9.0-7.redhat_00017.1.el6eap.src.rpm
eap7-glassfish-jsf-2.3.9-12.SP13_redhat_00001.1.el6eap.src.rpm
eap7-hal-console-3.2.12-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-hibernate-5.3.20-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-httpcomponents-client-4.5.13-1.redhat_00001.1.el6eap.src.rpm
eap7-jboss-ejb-client-4.0.37-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jboss-genericjms-2.0.8-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jboss-modules-1.11.0-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jboss-remoting-5.0.20-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jboss-server-migration-1.7.2-4.Final_redhat_00005.1.el6eap.src.rpm
eap7-jboss-xnio-base-3.7.12-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-narayana-5.9.10-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-opentracing-interceptors-0.0.4.1-2.redhat_00002.1.el6eap.src.rpm
eap7-resteasy-3.11.3-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-undertow-2.0.33-1.SP2_redhat_00001.1.el6eap.src.rpm
eap7-wildfly-7.3.5-2.GA_redhat_00001.1.el6eap.src.rpm
eap7-wildfly-discovery-1.2.1-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-wildfly-elytron-1.10.10-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-wildfly-http-client-1.0.24-1.Final_redhat_00001.1.el6eap.src.rpm

noarch:
eap7-activemq-artemis-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm
eap7-activemq-artemis-cli-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm
eap7-activemq-artemis-commons-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm
eap7-activemq-artemis-core-client-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm
eap7-activemq-artemis-dto-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm
eap7-activemq-artemis-hornetq-protocol-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm
eap7-activemq-artemis-hqclient-protocol-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm
eap7-activemq-artemis-jdbc-store-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm
eap7-activemq-artemis-jms-client-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm
eap7-activemq-artemis-jms-server-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm
eap7-activemq-artemis-journal-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm
eap7-activemq-artemis-ra-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm
eap7-activemq-artemis-selector-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm
eap7-activemq-artemis-server-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm
eap7-activemq-artemis-service-extensions-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm
eap7-activemq-artemis-tools-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm
eap7-glassfish-jsf-2.3.9-12.SP13_redhat_00001.1.el6eap.noarch.rpm
eap7-hal-console-3.2.12-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-5.3.20-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-core-5.3.20-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-entitymanager-5.3.20-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-envers-5.3.20-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-java8-5.3.20-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-httpcomponents-client-4.5.13-1.redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-ejb-client-4.0.37-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-genericjms-2.0.8-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-modules-1.11.0-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-remoting-5.0.20-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-server-migration-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-cli-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-core-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-to-eap7.3-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.0-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.1-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-to-eap7.3-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.3-server-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.0-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.1-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly11.0-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly12.0-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly13.0-server-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly14.0-server-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly15.0-server-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly16.0-server-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly17.0-server-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly18.0-server-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly8.2-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly9.0-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-jboss-xnio-base-3.7.12-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-compensations-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-jbosstxbridge-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-jbossxts-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-jts-idlj-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-jts-integration-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-restat-api-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-restat-bridge-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-restat-integration-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-restat-util-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-txframework-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-opentracing-interceptors-0.0.4.1-2.redhat_00002.1.el6eap.noarch.rpm
eap7-resteasy-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-atom-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-cdi-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-client-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-client-microprofile-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-crypto-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-jackson-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-jackson2-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-jaxb-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-jaxrs-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-jettison-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-jose-jwt-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-jsapi-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-json-binding-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-json-p-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-multipart-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-rxjava2-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-spring-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-validator-provider-11-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-yaml-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-undertow-2.0.33-1.SP2_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-7.3.5-2.GA_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-discovery-client-1.2.1-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-elytron-1.10.10-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-elytron-tool-1.10.10-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-http-client-common-1.0.24-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-http-ejb-client-1.0.24-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-http-naming-client-1.0.24-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-http-transaction-client-1.0.24-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-javadocs-7.3.5-2.GA_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-modules-7.3.5-2.GA_redhat_00001.1.el6eap.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

8. References:

https://access.redhat.com/security/cve/CVE-2020-13956
https://access.redhat.com/security/cve/CVE-2020-25633
https://access.redhat.com/security/cve/CVE-2020-25640
https://access.redhat.com/security/cve/CVE-2020-25689
https://access.redhat.com/security/cve/CVE-2020-27782
https://access.redhat.com/security/cve/CVE-2020-27822
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/

9. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=Zzv9
- -----END PGP SIGNATURE-----


- --------------------------------------------------------------------------------


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 7.3.5 security update
Advisory ID:       RHSA-2021:0247-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0247
Issue date:        2021-01-25
CVE Names:         CVE-2020-13956 CVE-2020-25633 CVE-2020-25640 
                   CVE-2020-25689 CVE-2020-27782 CVE-2020-27822 
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 7.3 for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss EAP 7.3 for RHEL 7 Server - noarch

3. Description:

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on the WildFly application runtime.

This release of Red Hat JBoss Enterprise Application Platform 7.3.5 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.4,
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise
Application Platform 7.3.5 Release Notes for information about the most
significant bug fixes and enhancements included in this release.

Security Fix(es):

* wildfly: Potential Memory leak in Wildfly when using OpenTracing
(CVE-2020-27822)

* undertow: special character in query results in server errors
(CVE-2020-27782)

* wildfly-core: memory leak in WildFly host-controller in domain mode while
not able to reconnect to domain-controller (CVE-2020-25689)

* httpclient: apache-httpclient: incorrect handling of malformed authority
component in request URIs (CVE-2020-13956)

* wildfly: resource adapter logs plaintext JMS password at warning level on
connection error (CVE-2020-25640)

* resteasy-client: potential sensitive information leakage in JAX-RS
RESTEasy Client's WebApplicationException handling (CVE-2020-25633)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, see the CVE page(s) listed in the
References section.

4. Solution:

Before applying this update, ensure all previously released errata relevant
to your system have been applied.

For details about how to apply this update, see:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1879042 - CVE-2020-25633 resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling
1881637 - CVE-2020-25640 wildfly: resource adapter logs plaintext JMS password at warning level on connection error
1886587 - CVE-2020-13956 apache-httpclient: incorrect handling of malformed authority component in request URIs
1893070 - CVE-2020-25689 wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller
1901304 - CVE-2020-27782 undertow: special character in query results in server errors
1904060 - CVE-2020-27822 wildfly: Potential Memory leak in Wildfly when using OpenTracing

6. JIRA issues fixed (https://issues.jboss.org/):

JBEAP-19788 - [GSS](7.3.z) Upgrade wildfly-http-client from 1.0.22.Final-redhat-00001 to 1.0.24.Final-redhat-00001
JBEAP-19790 - [GSS](7.3.z) Upgrade jboss-ejb-client from 4.0.33.SP1-redhat-00001 to 4.0.37.Final-redhat-00001
JBEAP-19816 - [GSS](7.3.z) UNDERTOW-1745 - Undertow access-log does not work for HTTP/2 POST request on HTTP Upgrade based connection
JBEAP-20240 - (7.3.z) Upgrade Narayana from 5.9.9.Final to 5.9.10.Final
JBEAP-20268 - (7.3.z) Upgrade generic jms from 2.0.6 to 2.0.8
JBEAP-20270 - Tracker bug for the EAP 7.3.5 release for RHEL-7
JBEAP-20286 - [GSS](7.3.z) Upgrade Hibernate ORM from 5.3.18.Final-redhat-00002 to 5.3.20.Final-redhat-00001
JBEAP-20288 - [GSS] (7.3.z) Upgrade undertow from 2.0.32.SP1-redhat to 2.0.33.SP2-redhat
JBEAP-20333 - (7.3.z) Upgrade JSF based on Mojarra 2.3.9.SP12-redhat-00001 to 2.3.9.SP13-redhat-00001
JBEAP-20373 - (7.3.z) Upgrade Apache HTTP Client to 4.5.13
JBEAP-20376 - (7.3.z) Upgrade WildFly Elytron from 1.10.9.Final-redhat-00001 to 1.10.10.Final-redhat
JBEAP-20399 - (7.3.z) Upgrade RESTEasy from 3.11.2.Final.redhat-00001 to 3.11.3.Final.redhat-00001
JBEAP-20403 - [GSS](7.3.z) Upgrade XNIO from 3.7.11.Final to 3.7.12.Final
JBEAP-20405 - [GSS](7.3.z) Upgrade Artemis from 2.9.0.redhat-00016 to 2.9.0.redhat-00017
JBEAP-20438 - [GSS](7.3.z) Upgrade JBoss Remoting from 5.0.19.Final-redhat-00001 to 5.0.20.Final-redhat-00001
JBEAP-20480 - [GSS](7.3.z) Upgrade HAL from 3.2.11.Final-redhat-00001 to 3.2.12.Final
JBEAP-20502 - (7.3.z) Upgrade JBoss Modules from 1.10.0.Final to 1.11.0.Final
JBEAP-20521 - (7.3.z) Upgrade wildfly-discovery-client to 1.2.1.Final
JBEAP-20591 - (7.3.z) Upgrade opentracing-interceptors from 0.0.4.redhat-00004 to 0.0.4.1.redhat-00002

7. Package List:

Red Hat JBoss EAP 7.3 for RHEL 7 Server:

Source:
eap7-activemq-artemis-2.9.0-7.redhat_00017.1.el7eap.src.rpm
eap7-glassfish-jsf-2.3.9-12.SP13_redhat_00001.1.el7eap.src.rpm
eap7-hal-console-3.2.12-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-hibernate-5.3.20-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-httpcomponents-client-4.5.13-1.redhat_00001.1.el7eap.src.rpm
eap7-jboss-ejb-client-4.0.37-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-jboss-genericjms-2.0.8-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-jboss-modules-1.11.0-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-jboss-remoting-5.0.20-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-jboss-server-migration-1.7.2-4.Final_redhat_00005.1.el7eap.src.rpm
eap7-jboss-xnio-base-3.7.12-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-narayana-5.9.10-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-opentracing-interceptors-0.0.4.1-2.redhat_00002.1.el7eap.src.rpm
eap7-resteasy-3.11.3-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-undertow-2.0.33-1.SP2_redhat_00001.1.el7eap.src.rpm
eap7-wildfly-7.3.5-2.GA_redhat_00001.1.el7eap.src.rpm
eap7-wildfly-discovery-1.2.1-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-wildfly-elytron-1.10.10-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-wildfly-http-client-1.0.24-1.Final_redhat_00001.1.el7eap.src.rpm

noarch:
eap7-activemq-artemis-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm
eap7-activemq-artemis-cli-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm
eap7-activemq-artemis-commons-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm
eap7-activemq-artemis-core-client-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm
eap7-activemq-artemis-dto-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm
eap7-activemq-artemis-hornetq-protocol-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm
eap7-activemq-artemis-hqclient-protocol-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm
eap7-activemq-artemis-jdbc-store-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm
eap7-activemq-artemis-jms-client-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm
eap7-activemq-artemis-jms-server-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm
eap7-activemq-artemis-journal-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm
eap7-activemq-artemis-ra-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm
eap7-activemq-artemis-selector-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm
eap7-activemq-artemis-server-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm
eap7-activemq-artemis-service-extensions-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm
eap7-activemq-artemis-tools-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm
eap7-glassfish-jsf-2.3.9-12.SP13_redhat_00001.1.el7eap.noarch.rpm
eap7-hal-console-3.2.12-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-5.3.20-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-core-5.3.20-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-entitymanager-5.3.20-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-envers-5.3.20-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-java8-5.3.20-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-httpcomponents-client-4.5.13-1.redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-ejb-client-4.0.37-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-genericjms-2.0.8-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-modules-1.11.0-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-remoting-5.0.20-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-server-migration-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-cli-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-core-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-to-eap7.3-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap7.0-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap7.1-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-to-eap7.3-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap7.3-server-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.0-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.1-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly11.0-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly12.0-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly13.0-server-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly14.0-server-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly15.0-server-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly16.0-server-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly17.0-server-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly18.0-server-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly8.2-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly9.0-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm
eap7-jboss-xnio-base-3.7.12-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-compensations-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-jbosstxbridge-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-jbossxts-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-jts-idlj-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-jts-integration-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-restat-api-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-restat-bridge-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-restat-integration-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-restat-util-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-txframework-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-opentracing-interceptors-0.0.4.1-2.redhat_00002.1.el7eap.noarch.rpm
eap7-resteasy-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-atom-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-cdi-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-client-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-client-microprofile-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-crypto-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-jackson-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-jackson2-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-jaxb-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-jaxrs-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-jettison-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-jose-jwt-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-jsapi-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-json-binding-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-json-p-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-multipart-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-rxjava2-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-spring-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-validator-provider-11-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-resteasy-yaml-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-undertow-2.0.33-1.SP2_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-7.3.5-2.GA_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-discovery-client-1.2.1-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-elytron-1.10.10-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-elytron-tool-1.10.10-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-http-client-common-1.0.24-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-http-ejb-client-1.0.24-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-http-naming-client-1.0.24-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-http-transaction-client-1.0.24-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-java-jdk11-7.3.5-2.GA_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-java-jdk8-7.3.5-2.GA_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-javadocs-7.3.5-2.GA_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-modules-7.3.5-2.GA_redhat_00001.1.el7eap.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

8. References:

https://access.redhat.com/security/cve/CVE-2020-13956
https://access.redhat.com/security/cve/CVE-2020-25633
https://access.redhat.com/security/cve/CVE-2020-25640
https://access.redhat.com/security/cve/CVE-2020-25689
https://access.redhat.com/security/cve/CVE-2020-27782
https://access.redhat.com/security/cve/CVE-2020-27822
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/

9. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=9GSR
- -----END PGP SIGNATURE-----


- --------------------------------------------------------------------------------


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 7.3.5 security update
Advisory ID:       RHSA-2021:0248-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0248
Issue date:        2021-01-25
CVE Names:         CVE-2020-13956 CVE-2020-25633 CVE-2020-25640 
                   CVE-2020-25689 CVE-2020-27782 CVE-2020-27822 
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 7.3 for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss EAP 7.3 for BaseOS-8 - noarch

3. Description:

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on the WildFly application runtime.

This release of Red Hat JBoss Enterprise Application Platform 7.3.5 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.4,
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise
Application Platform 7.3.5 Release Notes for information about the most
significant bug fixes and enhancements included in this release.

Security Fix(es):

* wildfly: Potential Memory leak in Wildfly when using OpenTracing
(CVE-2020-27822)

* undertow: special character in query results in server errors
(CVE-2020-27782)

* wildfly-core: memory leak in WildFly host-controller in domain mode while
not able to reconnect to domain-controller (CVE-2020-25689)

* httpclient: apache-httpclient: incorrect handling of malformed authority
component in request URIs (CVE-2020-13956)

* wildfly: resource adapter logs plaintext JMS password at warning level on
connection error (CVE-2020-25640)

* resteasy-client: potential sensitive information leakage in JAX-RS
RESTEasy Client's WebApplicationException handling (CVE-2020-25633)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, see the CVE page(s) listed in the
References section.

4. Solution:

Before applying this update, ensure all previously released errata relevant
to your system have been applied.

For details about how to apply this update, see:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1879042 - CVE-2020-25633 resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling
1881637 - CVE-2020-25640 wildfly: resource adapter logs plaintext JMS password at warning level on connection error
1886587 - CVE-2020-13956 apache-httpclient: incorrect handling of malformed authority component in request URIs
1893070 - CVE-2020-25689 wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller
1901304 - CVE-2020-27782 undertow: special character in query results in server errors
1904060 - CVE-2020-27822 wildfly: Potential Memory leak in Wildfly when using OpenTracing

6. JIRA issues fixed (https://issues.jboss.org/):

JBEAP-19788 - [GSS](7.3.z) Upgrade wildfly-http-client from 1.0.22.Final-redhat-00001 to 1.0.24.Final-redhat-00001
JBEAP-19790 - [GSS](7.3.z) Upgrade jboss-ejb-client from 4.0.33.SP1-redhat-00001 to 4.0.37.Final-redhat-00001
JBEAP-19816 - [GSS](7.3.z) UNDERTOW-1745 - Undertow access-log does not work for HTTP/2 POST request on HTTP Upgrade based connection
JBEAP-20240 - (7.3.z) Upgrade Narayana from 5.9.9.Final to 5.9.10.Final
JBEAP-20268 - (7.3.z) Upgrade generic jms from 2.0.6 to 2.0.8
JBEAP-20271 - Tracker bug for the EAP 7.3.5 release for RHEL-8
JBEAP-20286 - [GSS](7.3.z) Upgrade Hibernate ORM from 5.3.18.Final-redhat-00002 to 5.3.20.Final-redhat-00001
JBEAP-20288 - [GSS] (7.3.z) Upgrade undertow from 2.0.32.SP1-redhat to 2.0.33.SP2-redhat
JBEAP-20333 - (7.3.z) Upgrade JSF based on Mojarra 2.3.9.SP12-redhat-00001 to 2.3.9.SP13-redhat-00001
JBEAP-20373 - (7.3.z) Upgrade Apache HTTP Client to 4.5.13
JBEAP-20376 - (7.3.z) Upgrade WildFly Elytron from 1.10.9.Final-redhat-00001 to 1.10.10.Final-redhat
JBEAP-20399 - (7.3.z) Upgrade RESTEasy from 3.11.2.Final.redhat-00001 to 3.11.3.Final.redhat-00001
JBEAP-20403 - [GSS](7.3.z) Upgrade XNIO from 3.7.11.Final to 3.7.12.Final
JBEAP-20405 - [GSS](7.3.z) Upgrade Artemis from 2.9.0.redhat-00016 to 2.9.0.redhat-00017
JBEAP-20438 - [GSS](7.3.z) Upgrade JBoss Remoting from 5.0.19.Final-redhat-00001 to 5.0.20.Final-redhat-00001
JBEAP-20480 - [GSS](7.3.z) Upgrade HAL from 3.2.11.Final-redhat-00001 to 3.2.12.Final
JBEAP-20502 - (7.3.z) Upgrade JBoss Modules from 1.10.0.Final to 1.11.0.Final
JBEAP-20521 - (7.3.z) Upgrade wildfly-discovery-client to 1.2.1.Final
JBEAP-20591 - (7.3.z) Upgrade opentracing-interceptors from 0.0.4.redhat-00004 to 0.0.4.1.redhat-00002

7. Package List:

Red Hat JBoss EAP 7.3 for BaseOS-8:

Source:
eap7-activemq-artemis-2.9.0-7.redhat_00017.1.el8eap.src.rpm
eap7-glassfish-jsf-2.3.9-12.SP13_redhat_00001.1.el8eap.src.rpm
eap7-hal-console-3.2.12-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-hibernate-5.3.20-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-httpcomponents-client-4.5.13-1.redhat_00001.1.el8eap.src.rpm
eap7-jboss-ejb-client-4.0.37-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jboss-genericjms-2.0.8-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jboss-modules-1.11.0-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jboss-remoting-5.0.20-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jboss-server-migration-1.7.2-4.Final_redhat_00005.1.el8eap.src.rpm
eap7-jboss-xnio-base-3.7.12-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-narayana-5.9.10-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-opentracing-interceptors-0.0.4.1-2.redhat_00002.1.el8eap.src.rpm
eap7-resteasy-3.11.3-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-undertow-2.0.33-1.SP2_redhat_00001.1.el8eap.src.rpm
eap7-wildfly-7.3.5-2.GA_redhat_00001.1.el8eap.src.rpm
eap7-wildfly-discovery-1.2.1-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-wildfly-elytron-1.10.10-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-wildfly-http-client-1.0.24-1.Final_redhat_00001.1.el8eap.src.rpm

noarch:
eap7-activemq-artemis-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm
eap7-activemq-artemis-cli-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm
eap7-activemq-artemis-commons-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm
eap7-activemq-artemis-core-client-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm
eap7-activemq-artemis-dto-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm
eap7-activemq-artemis-hornetq-protocol-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm
eap7-activemq-artemis-hqclient-protocol-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm
eap7-activemq-artemis-jdbc-store-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm
eap7-activemq-artemis-jms-client-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm
eap7-activemq-artemis-jms-server-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm
eap7-activemq-artemis-journal-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm
eap7-activemq-artemis-ra-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm
eap7-activemq-artemis-selector-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm
eap7-activemq-artemis-server-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm
eap7-activemq-artemis-service-extensions-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm
eap7-activemq-artemis-tools-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm
eap7-glassfish-jsf-2.3.9-12.SP13_redhat_00001.1.el8eap.noarch.rpm
eap7-hal-console-3.2.12-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-5.3.20-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-core-5.3.20-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-entitymanager-5.3.20-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-envers-5.3.20-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-java8-5.3.20-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-httpcomponents-client-4.5.13-1.redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-ejb-client-4.0.37-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-genericjms-2.0.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-modules-1.11.0-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-remoting-5.0.20-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-server-migration-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-cli-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-core-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-to-eap7.3-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.0-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.1-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-to-eap7.3-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.3-server-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.0-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.1-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly11.0-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly12.0-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly13.0-server-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly14.0-server-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly15.0-server-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly16.0-server-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly17.0-server-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly18.0-server-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly8.2-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly9.0-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm
eap7-jboss-xnio-base-3.7.12-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-compensations-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-jbosstxbridge-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-jbossxts-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-jts-idlj-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-jts-integration-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-restat-api-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-restat-bridge-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-restat-integration-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-restat-util-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-txframework-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-opentracing-interceptors-0.0.4.1-2.redhat_00002.1.el8eap.noarch.rpm
eap7-resteasy-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-atom-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-cdi-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-client-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-client-microprofile-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-crypto-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-jackson-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-jackson2-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-jaxb-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-jaxrs-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-jettison-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-jose-jwt-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-jsapi-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-json-binding-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-json-p-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-multipart-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-rxjava2-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-spring-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-validator-provider-11-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-resteasy-yaml-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-undertow-2.0.33-1.SP2_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-7.3.5-2.GA_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-discovery-client-1.2.1-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-elytron-1.10.10-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-elytron-tool-1.10.10-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-http-client-common-1.0.24-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-http-ejb-client-1.0.24-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-http-naming-client-1.0.24-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-http-transaction-client-1.0.24-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-javadocs-7.3.5-2.GA_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-modules-7.3.5-2.GA_redhat_00001.1.el8eap.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

8. References:

https://access.redhat.com/security/cve/CVE-2020-13956
https://access.redhat.com/security/cve/CVE-2020-25633
https://access.redhat.com/security/cve/CVE-2020-25640
https://access.redhat.com/security/cve/CVE-2020-25689
https://access.redhat.com/security/cve/CVE-2020-27782
https://access.redhat.com/security/cve/CVE-2020-27822
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/

9. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYA71JtzjgjWX9erEAQjyvhAAgknBp66by9L1+/LEAip1GMc/Q+QPOt8j
Kn81qayqeBUh1ldHkLjroFjHV9dhq2U44//xbFr8hSCbvj/tRtjtcLXvWpH+HUAb
qBbFP15+yxLiO3GHWrmLQqbKVw5L33sQuIvadKZeftVqvMGxDipFzNrznFY4iqI2
PJUpUJKwj2D4dBfHebrCQiAoITCz9sBzc5KC4dXbg0Bfa947FaoF6XmoY5Y1K2UG
7L8307P3IHztB+UJbmRBND6oyeSEtMpW0gUWNKSumHD9Rvy/IumLK9NobiBDKP74
kG8iVriTcmSKWSslWo1mUvHIoh3E9FMXWRkl9Qhd5YvtRjBrYBk8LDi/6ocRQt7u
aNxW885x8oX7Iw0LRd/9HAs62ozBKRv8sXRoN2U53KbmQyyBfNXocG1KYOyFC5fR
1SJcOs178ER4J5dlymk0qXGv13RmA12aiObCUuQoptPTXGgoiEgCxo2SiIiJo+nY
QooV/X0u2X7NdbM3dHUn4ikQmjCujFLEkcHsc14XuYK47j9Sj6IZFUJGpNDNChZH
5QroAtvzwYdWJgdpRlABpvTp6uIfy8jixoAwt2B93r8xGQLmNpRln3jh+7rpAoFi
sZCuvenM3VHAWmoMkktsxZ9ydHtJtuuVNP2hQ8tvVOhyWcG0A/MqHFu6nZ85440b
LrdlAyU5J9w=
=l4Z1
- -----END PGP SIGNATURE-----


- --------------------------------------------------------------------------------


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 7.3.5 security update
Advisory ID:       RHSA-2021:0250-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:0250
Issue date:        2021-01-25
CVE Names:         CVE-2020-13956 CVE-2020-25633 CVE-2020-25640 
                   CVE-2020-25689 CVE-2020-27782 CVE-2020-27822 
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 7.3.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on the WildFly application runtime.

This release of Red Hat JBoss Enterprise Application Platform 7.3.5 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.4,
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise
Application Platform 7.3.5 Release Notes for information about the most
significant bug fixes and enhancements included in this release.

Security Fix(es):

* wildfly: Potential Memory leak in Wildfly when using OpenTracing
(CVE-2020-27822)

* undertow: special character in query results in server errors
(CVE-2020-27782)

* wildfly-core: memory leak in WildFly host-controller in domain mode while
not able to reconnect to domain-controller (CVE-2020-25689)

* httpclient: apache-httpclient: incorrect handling of malformed authority
component in request URIs (CVE-2020-13956)

* wildfly: resource adapter logs plaintext JMS password at warning level on
connection error (CVE-2020-25640)

* resteasy-client: potential sensitive information leakage in JAX-RS
RESTEasy Client's WebApplicationException handling (CVE-2020-25633)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, see the CVE page(s) listed in the
References section.

3. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

The References section of this erratum contain a download link (you must
log in to download the update).

The JBoss server process must be restarted for the update to take effect.

4. Bugs fixed (https://bugzilla.redhat.com/):

1879042 - CVE-2020-25633 resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling
1881637 - CVE-2020-25640 wildfly: resource adapter logs plaintext JMS password at warning level on connection error
1886587 - CVE-2020-13956 apache-httpclient: incorrect handling of malformed authority component in request URIs
1893070 - CVE-2020-25689 wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller
1901304 - CVE-2020-27782 undertow: special character in query results in server errors
1904060 - CVE-2020-27822 wildfly: Potential Memory leak in Wildfly when using OpenTracing

5. JIRA issues fixed (https://issues.jboss.org/):

JBEAP-19788 - [GSS](7.3.z) Upgrade wildfly-http-client from 1.0.22.Final-redhat-00001 to 1.0.24.Final-redhat-00001
JBEAP-19790 - [GSS](7.3.z) Upgrade jboss-ejb-client from 4.0.33.SP1-redhat-00001 to 4.0.37.Final-redhat-00001
JBEAP-19816 - [GSS](7.3.z) UNDERTOW-1745 - Undertow access-log does not work for HTTP/2 POST request on HTTP Upgrade based connection
JBEAP-20240 - (7.3.z) Upgrade Narayana from 5.9.9.Final to 5.9.10.Final
JBEAP-20268 - (7.3.z) Upgrade generic jms from 2.0.6 to 2.0.8
JBEAP-20286 - [GSS](7.3.z) Upgrade Hibernate ORM from 5.3.18.Final-redhat-00002 to 5.3.20.Final-redhat-00001
JBEAP-20288 - [GSS] (7.3.z) Upgrade undertow from 2.0.32.SP1-redhat to 2.0.33.SP2-redhat
JBEAP-20333 - (7.3.z) Upgrade JSF based on Mojarra 2.3.9.SP12-redhat-00001 to 2.3.9.SP13-redhat-00001
JBEAP-20373 - (7.3.z) Upgrade Apache HTTP Client to 4.5.13
JBEAP-20376 - (7.3.z) Upgrade WildFly Elytron from 1.10.9.Final-redhat-00001 to 1.10.10.Final-redhat
JBEAP-20399 - (7.3.z) Upgrade RESTEasy from 3.11.2.Final.redhat-00001 to 3.11.3.Final.redhat-00001
JBEAP-20403 - [GSS](7.3.z) Upgrade XNIO from 3.7.11.Final to 3.7.12.Final
JBEAP-20405 - [GSS](7.3.z) Upgrade Artemis from 2.9.0.redhat-00016 to 2.9.0.redhat-00017
JBEAP-20438 - [GSS](7.3.z) Upgrade JBoss Remoting from 5.0.19.Final-redhat-00001 to 5.0.20.Final-redhat-00001
JBEAP-20480 - [GSS](7.3.z) Upgrade HAL from 3.2.11.Final-redhat-00001 to 3.2.12.Final
JBEAP-20502 - (7.3.z) Upgrade JBoss Modules from 1.10.0.Final to 1.11.0.Final
JBEAP-20521 - (7.3.z) Upgrade wildfly-discovery-client to 1.2.1.Final
JBEAP-20591 - (7.3.z) Upgrade opentracing-interceptors from 0.0.4.redhat-00004 to 0.0.4.1.redhat-00002

6. References:

https://access.redhat.com/security/cve/CVE-2020-13956
https://access.redhat.com/security/cve/CVE-2020-25633
https://access.redhat.com/security/cve/CVE-2020-25640
https://access.redhat.com/security/cve/CVE-2020-25689
https://access.redhat.com/security/cve/CVE-2020-27782
https://access.redhat.com/security/cve/CVE-2020-27822
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=7.3
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/

7. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=5Dnp
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=dpnR
-----END PGP SIGNATURE-----