Operating System:

[RedHat]

Published:

01 October 2019

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3672
               Red Hat JBoss Enterprise Application Platform
                              1 October 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           JBoss EAP
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 6
                   Red Hat Enterprise Linux WS/Desktop 6
                   Red Hat Enterprise Linux Server 7
                   Red Hat Enterprise Linux WS/Desktop 7
                   Red Hat Enterprise Linux Server 8
                   Red Hat Enterprise Linux WS/Desktop 8
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-14379 CVE-2019-12814 CVE-2019-12384
                   CVE-2019-12086 CVE-2019-10212 CVE-2019-10202
                   CVE-2019-10184  

Reference:         ASB-2019.0201
                   ASB-2019.0199

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2019:2935
   https://access.redhat.com/errata/RHSA-2019:2936
   https://access.redhat.com/errata/RHSA-2019:2937
   https://access.redhat.com/errata/RHSA-2019:2938

Comment: This bulletin contains four (4) Red Hat security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 7.2.4 on RHEL 6 Security update
Advisory ID:       RHSA-2019:2935-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:2935
Issue date:        2019-09-30
CVE Names:         CVE-2019-10184 CVE-2019-10202 CVE-2019-10212 
                   CVE-2019-12086 CVE-2019-12384 CVE-2019-12814 
                   CVE-2019-14379 
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 7.2 for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss EAP 7.2 for RHEL 6 Server - noarch

3. Description:

This release of Red Hat JBoss Enterprise Application Platform 7.2.4 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.3,
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise
Application Platform 7.2.4 Release Notes for information about the most
significant bug fixes and enhancements included in this release.

Security Fix(es):

* jackson-databind: default typing mishandling leading to remote code
execution (CVE-2019-14379)

* jackson-databind: failure to block the logback-core class from
polymorphic deserialization leading to remote code execution
(CVE-2019-12384)

* jackson-databind: polymorphic typing issue allows attacker to read
arbitrary local files on the server via crafted JSON message
(CVE-2019-12814)

* undertow: DEBUG log for io.undertow.request.security if enabled leaks
credentials to log files (CVE-2019-10212)

* codehaus: incomplete fix for unsafe deserialization in jackson-databind
vulnerabilities (CVE-2019-10202)

* jackson-databind: polymorphic typing issue allows attacker to read
arbitrary local files on the server (CVE-2019-12086)

* undertow: Information leak in requests for directories without trailing
slashes (CVE-2019-10184)

4. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

For details about how to apply this update, which includes the changes
described in this advisory, see:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1713068 - CVE-2019-10184 undertow: Information leak in requests for directories without trailing slashes
1713468 - CVE-2019-12086 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
1725795 - CVE-2019-12814 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
1725807 - CVE-2019-12384 jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
1731271 - CVE-2019-10202 codehaus: incomplete fix for unsafe deserialization in jackson-databind vulnerabilities
1731984 - CVE-2019-10212 undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files
1737517 - CVE-2019-14379 jackson-databind: default typing mishandling leading to remote code execution

6. JIRA issues fixed (https://issues.jboss.org/):

JBEAP-16455 - [GSS](7.2.z) Upgrade Infinispan from 9.3.6 to 9.3.7
JBEAP-16779 - [GSS](7.2.z) Upgrade Hibernate ORM from 5.3.10 to 5.3.11
JBEAP-17045 - [GSS](7.2.z) Upgrade JSF based on Mojarra 2.3.5.SP3-redhat-00001 to 2.3.5.SP3-redhat-00002
JBEAP-17062 - [GSS](7.2.z) Upgrade Artemis from 2.7.0.redhat-00057 to 2.9.0.redhat-00005
JBEAP-17073 - [GSS](7.2.z) Upgrade jboss-ejb-client from 4.0.20 to 4.0.23
JBEAP-17109 - (7.2.z) Upgrade XNIO from 3.6.6.Final-redhat-00001 to 3.7.3.Final-redhat-00001
JBEAP-17112 - [GSS](7.2.z) Upgrade JBoss Remoting from 5.0.12 to 5.0.14.SP1
JBEAP-17142 - Tracker bug for the EAP 7.2.4 release for RHEL-6
JBEAP-17162 - [GSS](7.2.z) Upgrade jgroups from 4.0.19 to 4.0.20
JBEAP-17178 - (7.2.z) Upgrade IronJacamar from 1.4.16.Final to 1.4.17.Final
JBEAP-17182 - (7.2.z) Upgrade PicketLink from 2.5.5.SP12-redhat-00006 to 2.5.5.SP12-redhat-00007
JBEAP-17183 - (7.2.z) Upgrade PicketLink bindings from 2.5.5.SP12-redhat-00006 to 2.5.5.SP12-redhat-00007
JBEAP-17223 - [GSS](7.2.z) Upgrade WildFly Core from 6.0.15 to 6.0.16
JBEAP-17238 - [GSS](7.2.z) Upgrade HAL from 3.0.13 to 3.0.16
JBEAP-17250 - [GSS](7.2.z) Upgrade JBoss MSC from 1.4.5 to 1.4.8
JBEAP-17271 - [GSS](7.2.z) Upgrade jboss-logmanager from 2.1.7.Final-redhat-00001 to 2.1.14.Final-redhat-00001
JBEAP-17273 - [GSS](7.2.z) Upgrade jboss-logging from 3.3.2.Final-redhat-00001 to 3.3.3.Final-redhat-00001
JBEAP-17274 - [GSS](7.2.z) Upgrade Wildfly Elytron from 1.6.3.Final-redhat-00001 to 1.6.4.Final-redhat-00001
JBEAP-17276 - [GSS](7.2.z) Upgrade wildfly-transaction-client from 1.1.4.Final-redhat-00001 to 1.1.6.Final-redhat-00001
JBEAP-17277 - [GSS](7.2.z) Upgrade Undertow from 2.0.22 to 2.0.25.SP1
JBEAP-17278 - [GSS](7.2.z) Upgrade JBoss Marshalling from 2.0.7 to 2.0.9
JBEAP-17294 - [GSS](7.2.z) Upgrade weld from 3.0.6.Final-redhat-00001 to 3.0.6.Final-redhat-00002
JBEAP-17311 - [GSS](7.2.z) Upgrade jboss-jaxrs-api_2.1_spec from 1.0.1.Final-redhat-00001 to 1.0.3.Final-redhat-00001
JBEAP-17320 - [GSS](7.2.z) Upgrade PicketBox from 5.0.3.Final-redhat-3 to 5.0.3.Final-redhat-00004
JBEAP-17321 - [GSS](7.2.z) Upgrade Narayana from 5.9.3.Final to 5.9.6.Final
JBEAP-17334 - (7.2.z) Upgrade Elytron-Tool from 1.4.2 to 1.4.3.Final
JBEAP-17527 - [GSS](7.2.z) Upgrade Hibernate ORM from 5.3.11 to 5.3.11.SP1

7. Package List:

Red Hat JBoss EAP 7.2 for RHEL 6 Server:

Source:
eap7-activemq-artemis-2.9.0-1.redhat_00005.1.el6eap.src.rpm
eap7-codehaus-jackson-1.9.13-9.redhat_00006.1.el6eap.src.rpm
eap7-glassfish-jsf-2.3.5-4.SP3_redhat_00002.1.el6eap.src.rpm
eap7-hal-console-3.0.16-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-hibernate-5.3.11-2.SP1_redhat_00001.1.el6eap.src.rpm
eap7-infinispan-9.3.7-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-ironjacamar-1.4.17-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jackson-annotations-2.9.9-1.redhat_00001.1.el6eap.src.rpm
eap7-jackson-core-2.9.9-1.redhat_00001.1.el6eap.src.rpm
eap7-jackson-databind-2.9.9.3-1.redhat_00001.1.el6eap.src.rpm
eap7-jackson-jaxrs-providers-2.9.9-2.redhat_00001.1.el6eap.src.rpm
eap7-jackson-modules-base-2.9.9-1.redhat_00001.1.el6eap.src.rpm
eap7-jackson-modules-java8-2.9.9-1.redhat_00001.1.el6eap.src.rpm
eap7-jboss-ejb-client-4.0.23-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jboss-jaxrs-api_2.1_spec-1.0.3-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jboss-logging-3.3.3-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jboss-logmanager-2.1.14-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jboss-marshalling-2.0.9-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jboss-msc-1.4.8-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jboss-remoting-5.0.14-1.SP1_redhat_00001.1.el6eap.src.rpm
eap7-jboss-server-migration-1.3.1-4.Final_redhat_00004.1.el6eap.src.rpm
eap7-jboss-xnio-base-3.7.3-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jgroups-4.0.20-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-narayana-5.9.6-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-netty-4.1.34-2.Final_redhat_00002.1.el6eap.src.rpm
eap7-picketbox-5.0.3-5.Final_redhat_00004.1.el6eap.src.rpm
eap7-picketlink-bindings-2.5.5-20.SP12_redhat_00007.1.el6eap.src.rpm
eap7-picketlink-federation-2.5.5-20.SP12_redhat_00007.1.el6eap.src.rpm
eap7-undertow-2.0.25-1.SP1_redhat_00001.1.el6eap.src.rpm
eap7-weld-core-3.0.6-2.Final_redhat_00002.1.el6eap.src.rpm
eap7-wildfly-7.2.4-1.GA_redhat_00002.1.el6eap.src.rpm
eap7-wildfly-elytron-1.6.4-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-wildfly-elytron-tool-1.4.3-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-wildfly-transaction-client-1.1.6-2.Final_redhat_00001.1.el6eap.src.rpm

noarch:
eap7-activemq-artemis-2.9.0-1.redhat_00005.1.el6eap.noarch.rpm
eap7-activemq-artemis-cli-2.9.0-1.redhat_00005.1.el6eap.noarch.rpm
eap7-activemq-artemis-commons-2.9.0-1.redhat_00005.1.el6eap.noarch.rpm
eap7-activemq-artemis-core-client-2.9.0-1.redhat_00005.1.el6eap.noarch.rpm
eap7-activemq-artemis-dto-2.9.0-1.redhat_00005.1.el6eap.noarch.rpm
eap7-activemq-artemis-hornetq-protocol-2.9.0-1.redhat_00005.1.el6eap.noarch.rpm
eap7-activemq-artemis-hqclient-protocol-2.9.0-1.redhat_00005.1.el6eap.noarch.rpm
eap7-activemq-artemis-jdbc-store-2.9.0-1.redhat_00005.1.el6eap.noarch.rpm
eap7-activemq-artemis-jms-client-2.9.0-1.redhat_00005.1.el6eap.noarch.rpm
eap7-activemq-artemis-jms-server-2.9.0-1.redhat_00005.1.el6eap.noarch.rpm
eap7-activemq-artemis-journal-2.9.0-1.redhat_00005.1.el6eap.noarch.rpm
eap7-activemq-artemis-ra-2.9.0-1.redhat_00005.1.el6eap.noarch.rpm
eap7-activemq-artemis-selector-2.9.0-1.redhat_00005.1.el6eap.noarch.rpm
eap7-activemq-artemis-server-2.9.0-1.redhat_00005.1.el6eap.noarch.rpm
eap7-activemq-artemis-service-extensions-2.9.0-1.redhat_00005.1.el6eap.noarch.rpm
eap7-activemq-artemis-tools-2.9.0-1.redhat_00005.1.el6eap.noarch.rpm
eap7-codehaus-jackson-1.9.13-9.redhat_00006.1.el6eap.noarch.rpm
eap7-codehaus-jackson-core-asl-1.9.13-9.redhat_00006.1.el6eap.noarch.rpm
eap7-codehaus-jackson-jaxrs-1.9.13-9.redhat_00006.1.el6eap.noarch.rpm
eap7-codehaus-jackson-mapper-asl-1.9.13-9.redhat_00006.1.el6eap.noarch.rpm
eap7-codehaus-jackson-xc-1.9.13-9.redhat_00006.1.el6eap.noarch.rpm
eap7-glassfish-jsf-2.3.5-4.SP3_redhat_00002.1.el6eap.noarch.rpm
eap7-hal-console-3.0.16-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-5.3.11-2.SP1_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-core-5.3.11-2.SP1_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-entitymanager-5.3.11-2.SP1_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-envers-5.3.11-2.SP1_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-java8-5.3.11-2.SP1_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-9.3.7-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-cachestore-jdbc-9.3.7-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-cachestore-remote-9.3.7-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-client-hotrod-9.3.7-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-commons-9.3.7-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-core-9.3.7-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-hibernate-cache-commons-9.3.7-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-hibernate-cache-spi-9.3.7-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-infinispan-hibernate-cache-v53-9.3.7-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-1.4.17-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-common-api-1.4.17-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-common-impl-1.4.17-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-common-spi-1.4.17-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-core-api-1.4.17-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-core-impl-1.4.17-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-deployers-common-1.4.17-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-jdbc-1.4.17-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-validator-1.4.17-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jackson-annotations-2.9.9-1.redhat_00001.1.el6eap.noarch.rpm
eap7-jackson-core-2.9.9-1.redhat_00001.1.el6eap.noarch.rpm
eap7-jackson-databind-2.9.9.3-1.redhat_00001.1.el6eap.noarch.rpm
eap7-jackson-datatype-jdk8-2.9.9-1.redhat_00001.1.el6eap.noarch.rpm
eap7-jackson-datatype-jsr310-2.9.9-1.redhat_00001.1.el6eap.noarch.rpm
eap7-jackson-jaxrs-base-2.9.9-2.redhat_00001.1.el6eap.noarch.rpm
eap7-jackson-jaxrs-json-provider-2.9.9-2.redhat_00001.1.el6eap.noarch.rpm
eap7-jackson-module-jaxb-annotations-2.9.9-1.redhat_00001.1.el6eap.noarch.rpm
eap7-jackson-modules-base-2.9.9-1.redhat_00001.1.el6eap.noarch.rpm
eap7-jackson-modules-java8-2.9.9-1.redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-ejb-client-4.0.23-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-jaxrs-api_2.1_spec-1.0.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-logging-3.3.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-logmanager-2.1.14-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-marshalling-2.0.9-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-marshalling-river-2.0.9-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-msc-1.4.8-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-remoting-5.0.14-1.SP1_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-server-migration-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-cli-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-core-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.0-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.0-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.1-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.1-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.0-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.0-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.1-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.1-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly11.0-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly11.0-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly12.0-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly12.0-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly13.0-server-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly14.0-server-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly8.2-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly8.2-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly9.0-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly9.0-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-jboss-xnio-base-3.7.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jgroups-4.0.20-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-5.9.6-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-compensations-5.9.6-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-jbosstxbridge-5.9.6-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-jbossxts-5.9.6-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-jts-idlj-5.9.6-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-jts-integration-5.9.6-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-restat-api-5.9.6-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-restat-bridge-5.9.6-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-restat-integration-5.9.6-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-restat-util-5.9.6-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-narayana-txframework-5.9.6-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-netty-4.1.34-2.Final_redhat_00002.1.el6eap.noarch.rpm
eap7-netty-all-4.1.34-2.Final_redhat_00002.1.el6eap.noarch.rpm
eap7-picketbox-5.0.3-5.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-picketbox-infinispan-5.0.3-5.Final_redhat_00004.1.el6eap.noarch.rpm
eap7-picketlink-api-2.5.5-20.SP12_redhat_00007.1.el6eap.noarch.rpm
eap7-picketlink-bindings-2.5.5-20.SP12_redhat_00007.1.el6eap.noarch.rpm
eap7-picketlink-common-2.5.5-20.SP12_redhat_00007.1.el6eap.noarch.rpm
eap7-picketlink-config-2.5.5-20.SP12_redhat_00007.1.el6eap.noarch.rpm
eap7-picketlink-federation-2.5.5-20.SP12_redhat_00007.1.el6eap.noarch.rpm
eap7-picketlink-idm-api-2.5.5-20.SP12_redhat_00007.1.el6eap.noarch.rpm
eap7-picketlink-idm-impl-2.5.5-20.SP12_redhat_00007.1.el6eap.noarch.rpm
eap7-picketlink-idm-simple-schema-2.5.5-20.SP12_redhat_00007.1.el6eap.noarch.rpm
eap7-picketlink-impl-2.5.5-20.SP12_redhat_00007.1.el6eap.noarch.rpm
eap7-picketlink-wildfly8-2.5.5-20.SP12_redhat_00007.1.el6eap.noarch.rpm
eap7-undertow-2.0.25-1.SP1_redhat_00001.1.el6eap.noarch.rpm
eap7-weld-core-3.0.6-2.Final_redhat_00002.1.el6eap.noarch.rpm
eap7-weld-core-impl-3.0.6-2.Final_redhat_00002.1.el6eap.noarch.rpm
eap7-weld-core-jsf-3.0.6-2.Final_redhat_00002.1.el6eap.noarch.rpm
eap7-weld-ejb-3.0.6-2.Final_redhat_00002.1.el6eap.noarch.rpm
eap7-weld-jta-3.0.6-2.Final_redhat_00002.1.el6eap.noarch.rpm
eap7-weld-probe-core-3.0.6-2.Final_redhat_00002.1.el6eap.noarch.rpm
eap7-weld-web-3.0.6-2.Final_redhat_00002.1.el6eap.noarch.rpm
eap7-wildfly-7.2.4-1.GA_redhat_00002.1.el6eap.noarch.rpm
eap7-wildfly-elytron-1.6.4-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-elytron-tool-1.4.3-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-javadocs-7.2.4-1.GA_redhat_00002.1.el6eap.noarch.rpm
eap7-wildfly-modules-7.2.4-1.GA_redhat_00002.1.el6eap.noarch.rpm
eap7-wildfly-transaction-client-1.1.6-2.Final_redhat_00001.1.el6eap.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

8. References:

https://access.redhat.com/security/cve/CVE-2019-10184
https://access.redhat.com/security/cve/CVE-2019-10202
https://access.redhat.com/security/cve/CVE-2019-10212
https://access.redhat.com/security/cve/CVE-2019-12086
https://access.redhat.com/security/cve/CVE-2019-12384
https://access.redhat.com/security/cve/CVE-2019-12814
https://access.redhat.com/security/cve/CVE-2019-14379
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/

9. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBXZKIxtzjgjWX9erEAQg2Ag//UseqctL0JhJwZc+NQAf7ACXqhBl/whCO
XCPhMV6FWyzWDUwyMHXRo3HwLaC2KrVP//T8HcLS3Mza4CDeodC6jXqrXJI64L/D
QMjG4w+fzJH+D8cRt+Mtgr0B+DvCXYPtJAWqEzCeqr2ccwOugX7sqoaK60ZXf7tl
JsUi43Ebi/ITR55u6++9xNLSYVGY1GFhupViaf21pN70BGWGDrzCc7WRZMFkXqFh
ipWcVqPKFbt66934lx6/k6hxUvXYLsG02uM0saO3TZS/VRRwC97NI3iLvP9Mg/jI
Z78265vK16Ep93B1HPnDJ50mMpPOrcWWm69XXfCepzHFE5J2P27kveskbZbvF/Dv
K7puK4KHCr/u+tlSXuxP/FrvNCYBGeh0DM3RZNJN0yZaOJY3K7PAC4NDsWHGzybc
F5Z4zUDWAujPEoolk1bD7wwVvbytavtexE+bvkFGk2pCMTr08iod3PlDeQFe3cem
jN3mWU039g3J4Cm80LfuGmCX2OKpdyKfx9K8O2hnPjjwePoIa07MA7CDnyn5R82p
a+9CF5mcyrZwY7L0iJukHU4ms+Nf13hakq63RTd3d8Sw8qwcMVwg+ApKFvjqdjwm
7aPvRNseYL7Spn6YUVvzDQuyHHcqtG1BKHtt4hEgcLwcT8zoBuFTsUYl9m8w4pX5
yFXq60WBpFk=
=UTdp
- -----END PGP SIGNATURE-----

=================================================================================

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 7.2.4 on RHEL 7 security update
Advisory ID:       RHSA-2019:2936-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:2936
Issue date:        2019-09-30
CVE Names:         CVE-2019-10184 CVE-2019-10202 CVE-2019-10212 
                   CVE-2019-12086 CVE-2019-12384 CVE-2019-12814 
                   CVE-2019-14379 
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 7.2 for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss EAP 7.2 for RHEL 7 Server - noarch

3. Description:

This release of Red Hat JBoss Enterprise Application Platform 7.2.4 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.3,
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise
Application Platform 7.2.4 Release Notes for information about the most
significant bug fixes and enhancements included in this release.

Security Fix(es):

* jackson-databind: default typing mishandling leading to remote code
execution (CVE-2019-14379)

* jackson-databind: failure to block the logback-core class from
polymorphic deserialization leading to remote code execution
(CVE-2019-12384)

* jackson-databind: polymorphic typing issue allows attacker to read
arbitrary local files on the server via crafted JSON message
(CVE-2019-12814)

* undertow: DEBUG log for io.undertow.request.security if enabled leaks
credentials to log files (CVE-2019-10212)

* codehaus: incomplete fix for unsafe deserialization in jackson-databind
vulnerabilities (CVE-2019-10202)

* jackson-databind: polymorphic typing issue allows attacker to read
arbitrary local files on the server (CVE-2019-12086)

* undertow: Information leak in requests for directories without trailing
slashes (CVE-2019-10184)

4. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

For details about how to apply this update, which includes the changes
described in this advisory, see:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1713068 - CVE-2019-10184 undertow: Information leak in requests for directories without trailing slashes
1713468 - CVE-2019-12086 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
1725795 - CVE-2019-12814 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
1725807 - CVE-2019-12384 jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
1731271 - CVE-2019-10202 codehaus: incomplete fix for unsafe deserialization in jackson-databind vulnerabilities
1731984 - CVE-2019-10212 undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files
1737517 - CVE-2019-14379 jackson-databind: default typing mishandling leading to remote code execution

6. JIRA issues fixed (https://issues.jboss.org/):

JBEAP-16455 - [GSS](7.2.z) Upgrade Infinispan from 9.3.6 to 9.3.7
JBEAP-16779 - [GSS](7.2.z) Upgrade Hibernate ORM from 5.3.10 to 5.3.11
JBEAP-17045 - [GSS](7.2.z) Upgrade JSF based on Mojarra 2.3.5.SP3-redhat-00001 to 2.3.5.SP3-redhat-00002
JBEAP-17062 - [GSS](7.2.z) Upgrade Artemis from 2.7.0.redhat-00057 to 2.9.0.redhat-00005
JBEAP-17073 - [GSS](7.2.z) Upgrade jboss-ejb-client from 4.0.20 to 4.0.23
JBEAP-17109 - (7.2.z) Upgrade XNIO from 3.6.6.Final-redhat-00001 to 3.7.3.Final-redhat-00001
JBEAP-17112 - [GSS](7.2.z) Upgrade JBoss Remoting from 5.0.12 to 5.0.14.SP1
JBEAP-17143 - Tracker bug for the EAP 7.2.4 release for RHEL-7
JBEAP-17162 - [GSS](7.2.z) Upgrade jgroups from 4.0.19 to 4.0.20
JBEAP-17178 - (7.2.z) Upgrade IronJacamar from 1.4.16.Final to 1.4.17.Final
JBEAP-17182 - (7.2.z) Upgrade PicketLink from 2.5.5.SP12-redhat-00006 to 2.5.5.SP12-redhat-00007
JBEAP-17183 - (7.2.z) Upgrade PicketLink bindings from 2.5.5.SP12-redhat-00006 to 2.5.5.SP12-redhat-00007
JBEAP-17223 - [GSS](7.2.z) Upgrade WildFly Core from 6.0.15 to 6.0.16
JBEAP-17238 - [GSS](7.2.z) Upgrade HAL from 3.0.13 to 3.0.16
JBEAP-17250 - [GSS](7.2.z) Upgrade JBoss MSC from 1.4.5 to 1.4.8
JBEAP-17271 - [GSS](7.2.z) Upgrade jboss-logmanager from 2.1.7.Final-redhat-00001 to 2.1.14.Final-redhat-00001
JBEAP-17273 - [GSS](7.2.z) Upgrade jboss-logging from 3.3.2.Final-redhat-00001 to 3.3.3.Final-redhat-00001
JBEAP-17274 - [GSS](7.2.z) Upgrade Wildfly Elytron from 1.6.3.Final-redhat-00001 to 1.6.4.Final-redhat-00001
JBEAP-17276 - [GSS](7.2.z) Upgrade wildfly-transaction-client from 1.1.4.Final-redhat-00001 to 1.1.6.Final-redhat-00001
JBEAP-17277 - [GSS](7.2.z) Upgrade Undertow from 2.0.22 to 2.0.25.SP1
JBEAP-17278 - [GSS](7.2.z) Upgrade JBoss Marshalling from 2.0.7 to 2.0.9
JBEAP-17294 - [GSS](7.2.z) Upgrade weld from 3.0.6.Final-redhat-00001 to 3.0.6.Final-redhat-00002
JBEAP-17311 - [GSS](7.2.z) Upgrade jboss-jaxrs-api_2.1_spec from 1.0.1.Final-redhat-00001 to 1.0.3.Final-redhat-00001
JBEAP-17320 - [GSS](7.2.z) Upgrade PicketBox from 5.0.3.Final-redhat-3 to 5.0.3.Final-redhat-00004
JBEAP-17321 - [GSS](7.2.z) Upgrade Narayana from 5.9.3.Final to 5.9.6.Final
JBEAP-17334 - (7.2.z) Upgrade Elytron-Tool from 1.4.2 to 1.4.3.Final
JBEAP-17527 - [GSS](7.2.z) Upgrade Hibernate ORM from 5.3.11 to 5.3.11.SP1

7. Package List:

Red Hat JBoss EAP 7.2 for RHEL 7 Server:

Source:
eap7-activemq-artemis-2.9.0-1.redhat_00005.1.el7eap.src.rpm
eap7-codehaus-jackson-1.9.13-9.redhat_00006.1.el7eap.src.rpm
eap7-glassfish-jsf-2.3.5-4.SP3_redhat_00002.1.el7eap.src.rpm
eap7-hal-console-3.0.16-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-hibernate-5.3.11-2.SP1_redhat_00001.1.el7eap.src.rpm
eap7-infinispan-9.3.7-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-ironjacamar-1.4.17-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-jackson-annotations-2.9.9-1.redhat_00001.1.el7eap.src.rpm
eap7-jackson-core-2.9.9-1.redhat_00001.1.el7eap.src.rpm
eap7-jackson-databind-2.9.9.3-1.redhat_00001.1.el7eap.src.rpm
eap7-jackson-jaxrs-providers-2.9.9-2.redhat_00001.1.el7eap.src.rpm
eap7-jackson-modules-base-2.9.9-1.redhat_00001.1.el7eap.src.rpm
eap7-jackson-modules-java8-2.9.9-1.redhat_00001.1.el7eap.src.rpm
eap7-jboss-ejb-client-4.0.23-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-jboss-jaxrs-api_2.1_spec-1.0.3-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-jboss-logging-3.3.3-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-jboss-logmanager-2.1.14-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-jboss-marshalling-2.0.9-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-jboss-msc-1.4.8-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-jboss-remoting-5.0.14-1.SP1_redhat_00001.1.el7eap.src.rpm
eap7-jboss-server-migration-1.3.1-4.Final_redhat_00004.1.el7eap.src.rpm
eap7-jboss-xnio-base-3.7.3-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-jgroups-4.0.20-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-narayana-5.9.6-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-netty-4.1.34-2.Final_redhat_00002.1.el7eap.src.rpm
eap7-picketbox-5.0.3-5.Final_redhat_00004.1.el7eap.src.rpm
eap7-picketlink-bindings-2.5.5-20.SP12_redhat_00007.1.el7eap.src.rpm
eap7-picketlink-federation-2.5.5-20.SP12_redhat_00007.1.el7eap.src.rpm
eap7-undertow-2.0.25-1.SP1_redhat_00001.1.el7eap.src.rpm
eap7-weld-core-3.0.6-2.Final_redhat_00002.1.el7eap.src.rpm
eap7-wildfly-7.2.4-1.GA_redhat_00002.1.el7eap.src.rpm
eap7-wildfly-elytron-1.6.4-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-wildfly-elytron-tool-1.4.3-1.Final_redhat_00001.1.el7eap.src.rpm
eap7-wildfly-transaction-client-1.1.6-2.Final_redhat_00001.1.el7eap.src.rpm

noarch:
eap7-activemq-artemis-2.9.0-1.redhat_00005.1.el7eap.noarch.rpm
eap7-activemq-artemis-cli-2.9.0-1.redhat_00005.1.el7eap.noarch.rpm
eap7-activemq-artemis-commons-2.9.0-1.redhat_00005.1.el7eap.noarch.rpm
eap7-activemq-artemis-core-client-2.9.0-1.redhat_00005.1.el7eap.noarch.rpm
eap7-activemq-artemis-dto-2.9.0-1.redhat_00005.1.el7eap.noarch.rpm
eap7-activemq-artemis-hornetq-protocol-2.9.0-1.redhat_00005.1.el7eap.noarch.rpm
eap7-activemq-artemis-hqclient-protocol-2.9.0-1.redhat_00005.1.el7eap.noarch.rpm
eap7-activemq-artemis-jdbc-store-2.9.0-1.redhat_00005.1.el7eap.noarch.rpm
eap7-activemq-artemis-jms-client-2.9.0-1.redhat_00005.1.el7eap.noarch.rpm
eap7-activemq-artemis-jms-server-2.9.0-1.redhat_00005.1.el7eap.noarch.rpm
eap7-activemq-artemis-journal-2.9.0-1.redhat_00005.1.el7eap.noarch.rpm
eap7-activemq-artemis-ra-2.9.0-1.redhat_00005.1.el7eap.noarch.rpm
eap7-activemq-artemis-selector-2.9.0-1.redhat_00005.1.el7eap.noarch.rpm
eap7-activemq-artemis-server-2.9.0-1.redhat_00005.1.el7eap.noarch.rpm
eap7-activemq-artemis-service-extensions-2.9.0-1.redhat_00005.1.el7eap.noarch.rpm
eap7-activemq-artemis-tools-2.9.0-1.redhat_00005.1.el7eap.noarch.rpm
eap7-codehaus-jackson-1.9.13-9.redhat_00006.1.el7eap.noarch.rpm
eap7-codehaus-jackson-core-asl-1.9.13-9.redhat_00006.1.el7eap.noarch.rpm
eap7-codehaus-jackson-jaxrs-1.9.13-9.redhat_00006.1.el7eap.noarch.rpm
eap7-codehaus-jackson-mapper-asl-1.9.13-9.redhat_00006.1.el7eap.noarch.rpm
eap7-codehaus-jackson-xc-1.9.13-9.redhat_00006.1.el7eap.noarch.rpm
eap7-glassfish-jsf-2.3.5-4.SP3_redhat_00002.1.el7eap.noarch.rpm
eap7-hal-console-3.0.16-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-5.3.11-2.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-core-5.3.11-2.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-entitymanager-5.3.11-2.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-envers-5.3.11-2.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-hibernate-java8-5.3.11-2.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-9.3.7-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-cachestore-jdbc-9.3.7-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-cachestore-remote-9.3.7-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-client-hotrod-9.3.7-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-commons-9.3.7-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-core-9.3.7-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-hibernate-cache-commons-9.3.7-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-hibernate-cache-spi-9.3.7-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-infinispan-hibernate-cache-v53-9.3.7-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-1.4.17-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-common-api-1.4.17-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-common-impl-1.4.17-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-common-spi-1.4.17-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-core-api-1.4.17-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-core-impl-1.4.17-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-deployers-common-1.4.17-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-jdbc-1.4.17-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-ironjacamar-validator-1.4.17-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jackson-annotations-2.9.9-1.redhat_00001.1.el7eap.noarch.rpm
eap7-jackson-core-2.9.9-1.redhat_00001.1.el7eap.noarch.rpm
eap7-jackson-databind-2.9.9.3-1.redhat_00001.1.el7eap.noarch.rpm
eap7-jackson-datatype-jdk8-2.9.9-1.redhat_00001.1.el7eap.noarch.rpm
eap7-jackson-datatype-jsr310-2.9.9-1.redhat_00001.1.el7eap.noarch.rpm
eap7-jackson-jaxrs-base-2.9.9-2.redhat_00001.1.el7eap.noarch.rpm
eap7-jackson-jaxrs-json-provider-2.9.9-2.redhat_00001.1.el7eap.noarch.rpm
eap7-jackson-module-jaxb-annotations-2.9.9-1.redhat_00001.1.el7eap.noarch.rpm
eap7-jackson-modules-base-2.9.9-1.redhat_00001.1.el7eap.noarch.rpm
eap7-jackson-modules-java8-2.9.9-1.redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-ejb-client-4.0.23-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-jaxrs-api_2.1_spec-1.0.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-logging-3.3.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-logmanager-2.1.14-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-marshalling-2.0.9-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-marshalling-river-2.0.9-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-msc-1.4.8-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-remoting-5.0.14-1.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-jboss-server-migration-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-cli-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-core-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap7.0-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap7.0-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap7.1-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap7.1-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.0-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.0-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.1-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.1-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly11.0-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly11.0-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly12.0-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly12.0-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly13.0-server-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly14.0-server-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly8.2-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly8.2-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly9.0-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-server-migration-wildfly9.0-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-jboss-xnio-base-3.7.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-jgroups-4.0.20-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-5.9.6-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-compensations-5.9.6-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-jbosstxbridge-5.9.6-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-jbossxts-5.9.6-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-jts-idlj-5.9.6-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-jts-integration-5.9.6-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-restat-api-5.9.6-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-restat-bridge-5.9.6-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-restat-integration-5.9.6-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-restat-util-5.9.6-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-narayana-txframework-5.9.6-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-netty-4.1.34-2.Final_redhat_00002.1.el7eap.noarch.rpm
eap7-netty-all-4.1.34-2.Final_redhat_00002.1.el7eap.noarch.rpm
eap7-picketbox-5.0.3-5.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-picketbox-infinispan-5.0.3-5.Final_redhat_00004.1.el7eap.noarch.rpm
eap7-picketlink-api-2.5.5-20.SP12_redhat_00007.1.el7eap.noarch.rpm
eap7-picketlink-bindings-2.5.5-20.SP12_redhat_00007.1.el7eap.noarch.rpm
eap7-picketlink-common-2.5.5-20.SP12_redhat_00007.1.el7eap.noarch.rpm
eap7-picketlink-config-2.5.5-20.SP12_redhat_00007.1.el7eap.noarch.rpm
eap7-picketlink-federation-2.5.5-20.SP12_redhat_00007.1.el7eap.noarch.rpm
eap7-picketlink-idm-api-2.5.5-20.SP12_redhat_00007.1.el7eap.noarch.rpm
eap7-picketlink-idm-impl-2.5.5-20.SP12_redhat_00007.1.el7eap.noarch.rpm
eap7-picketlink-idm-simple-schema-2.5.5-20.SP12_redhat_00007.1.el7eap.noarch.rpm
eap7-picketlink-impl-2.5.5-20.SP12_redhat_00007.1.el7eap.noarch.rpm
eap7-picketlink-wildfly8-2.5.5-20.SP12_redhat_00007.1.el7eap.noarch.rpm
eap7-undertow-2.0.25-1.SP1_redhat_00001.1.el7eap.noarch.rpm
eap7-weld-core-3.0.6-2.Final_redhat_00002.1.el7eap.noarch.rpm
eap7-weld-core-impl-3.0.6-2.Final_redhat_00002.1.el7eap.noarch.rpm
eap7-weld-core-jsf-3.0.6-2.Final_redhat_00002.1.el7eap.noarch.rpm
eap7-weld-ejb-3.0.6-2.Final_redhat_00002.1.el7eap.noarch.rpm
eap7-weld-jta-3.0.6-2.Final_redhat_00002.1.el7eap.noarch.rpm
eap7-weld-probe-core-3.0.6-2.Final_redhat_00002.1.el7eap.noarch.rpm
eap7-weld-web-3.0.6-2.Final_redhat_00002.1.el7eap.noarch.rpm
eap7-wildfly-7.2.4-1.GA_redhat_00002.1.el7eap.noarch.rpm
eap7-wildfly-elytron-1.6.4-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-elytron-tool-1.4.3-1.Final_redhat_00001.1.el7eap.noarch.rpm
eap7-wildfly-java-jdk11-7.2.4-1.GA_redhat_00002.1.el7eap.noarch.rpm
eap7-wildfly-java-jdk8-7.2.4-1.GA_redhat_00002.1.el7eap.noarch.rpm
eap7-wildfly-javadocs-7.2.4-1.GA_redhat_00002.1.el7eap.noarch.rpm
eap7-wildfly-modules-7.2.4-1.GA_redhat_00002.1.el7eap.noarch.rpm
eap7-wildfly-transaction-client-1.1.6-2.Final_redhat_00001.1.el7eap.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

8. References:

https://access.redhat.com/security/cve/CVE-2019-10184
https://access.redhat.com/security/cve/CVE-2019-10202
https://access.redhat.com/security/cve/CVE-2019-10212
https://access.redhat.com/security/cve/CVE-2019-12086
https://access.redhat.com/security/cve/CVE-2019-12384
https://access.redhat.com/security/cve/CVE-2019-12814
https://access.redhat.com/security/cve/CVE-2019-14379
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/

9. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=3Qzh
- -----END PGP SIGNATURE-----

=================================================================================

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 7.2.4 on RHEL 8 security update
Advisory ID:       RHSA-2019:2937-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:2937
Issue date:        2019-09-30
CVE Names:         CVE-2019-10184 CVE-2019-10202 CVE-2019-10212 
                   CVE-2019-12086 CVE-2019-12384 CVE-2019-12814 
                   CVE-2019-14379 
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 7.2 for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss EAP 7.2 for RHEL 8 - noarch

3. Description:

This release of Red Hat JBoss Enterprise Application Platform 7.2.4 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.3,
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise
Application Platform 7.2.4 Release Notes for information about the most
significant bug fixes and enhancements included in this release.

Security Fix(es):

* jackson-databind: default typing mishandling leading to remote code
execution (CVE-2019-14379)

* jackson-databind: failure to block the logback-core class from
polymorphic deserialization leading to remote code execution
(CVE-2019-12384)

* jackson-databind: polymorphic typing issue allows attacker to read
arbitrary local files on the server via crafted JSON message
(CVE-2019-12814)

* undertow: DEBUG log for io.undertow.request.security if enabled leaks
credentials to log files (CVE-2019-10212)

* codehaus: incomplete fix for unsafe deserialization in jackson-databind
vulnerabilities (CVE-2019-10202)

* jackson-databind: polymorphic typing issue allows attacker to read
arbitrary local files on the server (CVE-2019-12086)

* undertow: Information leak in requests for directories without trailing
slashes (CVE-2019-10184)

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details about how to apply this update, see:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1713068 - CVE-2019-10184 undertow: Information leak in requests for directories without trailing slashes
1713468 - CVE-2019-12086 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
1725795 - CVE-2019-12814 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
1725807 - CVE-2019-12384 jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
1731271 - CVE-2019-10202 codehaus: incomplete fix for unsafe deserialization in jackson-databind vulnerabilities
1731984 - CVE-2019-10212 undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files
1737517 - CVE-2019-14379 jackson-databind: default typing mishandling leading to remote code execution

6. JIRA issues fixed (https://issues.jboss.org/):

JBEAP-16455 - [GSS](7.2.z) Upgrade Infinispan from 9.3.6 to 9.3.7
JBEAP-16779 - [GSS](7.2.z) Upgrade Hibernate ORM from 5.3.10 to 5.3.11
JBEAP-17045 - [GSS](7.2.z) Upgrade JSF based on Mojarra 2.3.5.SP3-redhat-00001 to 2.3.5.SP3-redhat-00002
JBEAP-17062 - [GSS](7.2.z) Upgrade Artemis from 2.7.0.redhat-00057 to 2.9.0.redhat-00005
JBEAP-17073 - [GSS](7.2.z) Upgrade jboss-ejb-client from 4.0.20 to 4.0.23
JBEAP-17109 - (7.2.z) Upgrade XNIO from 3.6.6.Final-redhat-00001 to 3.7.3.Final-redhat-00001
JBEAP-17112 - [GSS](7.2.z) Upgrade JBoss Remoting from 5.0.12 to 5.0.14.SP1
JBEAP-17144 - Tracker bug for the EAP 7.2.4 release for RHEL-8
JBEAP-17162 - [GSS](7.2.z) Upgrade jgroups from 4.0.19 to 4.0.20
JBEAP-17178 - (7.2.z) Upgrade IronJacamar from 1.4.16.Final to 1.4.17.Final
JBEAP-17182 - (7.2.z) Upgrade PicketLink from 2.5.5.SP12-redhat-00006 to 2.5.5.SP12-redhat-00007
JBEAP-17183 - (7.2.z) Upgrade PicketLink bindings from 2.5.5.SP12-redhat-00006 to 2.5.5.SP12-redhat-00007
JBEAP-17223 - [GSS](7.2.z) Upgrade WildFly Core from 6.0.15 to 6.0.16
JBEAP-17238 - [GSS](7.2.z) Upgrade HAL from 3.0.13 to 3.0.16
JBEAP-17250 - [GSS](7.2.z) Upgrade JBoss MSC from 1.4.5 to 1.4.8
JBEAP-17271 - [GSS](7.2.z) Upgrade jboss-logmanager from 2.1.7.Final-redhat-00001 to 2.1.14.Final-redhat-00001
JBEAP-17273 - [GSS](7.2.z) Upgrade jboss-logging from 3.3.2.Final-redhat-00001 to 3.3.3.Final-redhat-00001
JBEAP-17274 - [GSS](7.2.z) Upgrade Wildfly Elytron from 1.6.3.Final-redhat-00001 to 1.6.4.Final-redhat-00001
JBEAP-17276 - [GSS](7.2.z) Upgrade wildfly-transaction-client from 1.1.4.Final-redhat-00001 to 1.1.6.Final-redhat-00001
JBEAP-17277 - [GSS](7.2.z) Upgrade Undertow from 2.0.22 to 2.0.25.SP1
JBEAP-17278 - [GSS](7.2.z) Upgrade JBoss Marshalling from 2.0.7 to 2.0.9
JBEAP-17294 - [GSS](7.2.z) Upgrade weld from 3.0.6.Final-redhat-00001 to 3.0.6.Final-redhat-00002
JBEAP-17311 - [GSS](7.2.z) Upgrade jboss-jaxrs-api_2.1_spec from 1.0.1.Final-redhat-00001 to 1.0.3.Final-redhat-00001
JBEAP-17320 - [GSS](7.2.z) Upgrade PicketBox from 5.0.3.Final-redhat-3 to 5.0.3.Final-redhat-00004
JBEAP-17321 - [GSS](7.2.z) Upgrade Narayana from 5.9.3.Final to 5.9.6.Final
JBEAP-17334 - (7.2.z) Upgrade Elytron-Tool from 1.4.2 to 1.4.3.Final
JBEAP-17527 - [GSS](7.2.z) Upgrade Hibernate ORM from 5.3.11 to 5.3.11.SP1

7. Package List:

Red Hat JBoss EAP 7.2 for RHEL 8:

Source:
eap7-activemq-artemis-2.9.0-1.redhat_00005.1.el8eap.src.rpm
eap7-codehaus-jackson-1.9.13-9.redhat_00006.1.el8eap.src.rpm
eap7-glassfish-jsf-2.3.5-4.SP3_redhat_00002.1.el8eap.src.rpm
eap7-hal-console-3.0.16-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-hibernate-5.3.11-2.SP1_redhat_00001.1.el8eap.src.rpm
eap7-infinispan-9.3.7-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-ironjacamar-1.4.17-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jackson-annotations-2.9.9-1.redhat_00001.1.el8eap.src.rpm
eap7-jackson-core-2.9.9-1.redhat_00001.1.el8eap.src.rpm
eap7-jackson-databind-2.9.9.3-1.redhat_00001.1.el8eap.src.rpm
eap7-jackson-jaxrs-providers-2.9.9-2.redhat_00001.1.el8eap.src.rpm
eap7-jackson-modules-base-2.9.9-1.redhat_00001.1.el8eap.src.rpm
eap7-jackson-modules-java8-2.9.9-1.redhat_00001.1.el8eap.src.rpm
eap7-jboss-ejb-client-4.0.23-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jboss-jaxrs-api_2.1_spec-1.0.3-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jboss-logging-3.3.3-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jboss-logmanager-2.1.14-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jboss-marshalling-2.0.9-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jboss-msc-1.4.8-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jboss-remoting-5.0.14-1.SP1_redhat_00001.1.el8eap.src.rpm
eap7-jboss-server-migration-1.3.1-4.Final_redhat_00004.1.el8eap.src.rpm
eap7-jboss-xnio-base-3.7.3-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-jgroups-4.0.20-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-narayana-5.9.6-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-netty-4.1.34-2.Final_redhat_00002.1.el8eap.src.rpm
eap7-picketbox-5.0.3-5.Final_redhat_00004.1.el8eap.src.rpm
eap7-picketlink-bindings-2.5.5-20.SP12_redhat_00007.1.el8eap.src.rpm
eap7-picketlink-federation-2.5.5-20.SP12_redhat_00007.1.el8eap.src.rpm
eap7-undertow-2.0.25-1.SP1_redhat_00001.1.el8eap.src.rpm
eap7-weld-core-3.0.6-2.Final_redhat_00002.1.el8eap.src.rpm
eap7-wildfly-7.2.4-1.GA_redhat_00002.1.el8eap.src.rpm
eap7-wildfly-elytron-1.6.4-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-wildfly-elytron-tool-1.4.3-1.Final_redhat_00001.1.el8eap.src.rpm
eap7-wildfly-transaction-client-1.1.6-2.Final_redhat_00001.1.el8eap.src.rpm

noarch:
eap7-activemq-artemis-2.9.0-1.redhat_00005.1.el8eap.noarch.rpm
eap7-activemq-artemis-cli-2.9.0-1.redhat_00005.1.el8eap.noarch.rpm
eap7-activemq-artemis-commons-2.9.0-1.redhat_00005.1.el8eap.noarch.rpm
eap7-activemq-artemis-core-client-2.9.0-1.redhat_00005.1.el8eap.noarch.rpm
eap7-activemq-artemis-dto-2.9.0-1.redhat_00005.1.el8eap.noarch.rpm
eap7-activemq-artemis-hornetq-protocol-2.9.0-1.redhat_00005.1.el8eap.noarch.rpm
eap7-activemq-artemis-hqclient-protocol-2.9.0-1.redhat_00005.1.el8eap.noarch.rpm
eap7-activemq-artemis-jdbc-store-2.9.0-1.redhat_00005.1.el8eap.noarch.rpm
eap7-activemq-artemis-jms-client-2.9.0-1.redhat_00005.1.el8eap.noarch.rpm
eap7-activemq-artemis-jms-server-2.9.0-1.redhat_00005.1.el8eap.noarch.rpm
eap7-activemq-artemis-journal-2.9.0-1.redhat_00005.1.el8eap.noarch.rpm
eap7-activemq-artemis-ra-2.9.0-1.redhat_00005.1.el8eap.noarch.rpm
eap7-activemq-artemis-selector-2.9.0-1.redhat_00005.1.el8eap.noarch.rpm
eap7-activemq-artemis-server-2.9.0-1.redhat_00005.1.el8eap.noarch.rpm
eap7-activemq-artemis-service-extensions-2.9.0-1.redhat_00005.1.el8eap.noarch.rpm
eap7-activemq-artemis-tools-2.9.0-1.redhat_00005.1.el8eap.noarch.rpm
eap7-codehaus-jackson-1.9.13-9.redhat_00006.1.el8eap.noarch.rpm
eap7-codehaus-jackson-core-asl-1.9.13-9.redhat_00006.1.el8eap.noarch.rpm
eap7-codehaus-jackson-jaxrs-1.9.13-9.redhat_00006.1.el8eap.noarch.rpm
eap7-codehaus-jackson-mapper-asl-1.9.13-9.redhat_00006.1.el8eap.noarch.rpm
eap7-codehaus-jackson-xc-1.9.13-9.redhat_00006.1.el8eap.noarch.rpm
eap7-glassfish-jsf-2.3.5-4.SP3_redhat_00002.1.el8eap.noarch.rpm
eap7-hal-console-3.0.16-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-5.3.11-2.SP1_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-core-5.3.11-2.SP1_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-entitymanager-5.3.11-2.SP1_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-envers-5.3.11-2.SP1_redhat_00001.1.el8eap.noarch.rpm
eap7-hibernate-java8-5.3.11-2.SP1_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-9.3.7-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-cachestore-jdbc-9.3.7-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-cachestore-remote-9.3.7-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-client-hotrod-9.3.7-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-commons-9.3.7-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-core-9.3.7-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-hibernate-cache-commons-9.3.7-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-hibernate-cache-spi-9.3.7-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-infinispan-hibernate-cache-v53-9.3.7-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-1.4.17-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-common-api-1.4.17-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-common-impl-1.4.17-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-common-spi-1.4.17-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-core-api-1.4.17-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-core-impl-1.4.17-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-deployers-common-1.4.17-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-jdbc-1.4.17-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-ironjacamar-validator-1.4.17-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jackson-annotations-2.9.9-1.redhat_00001.1.el8eap.noarch.rpm
eap7-jackson-core-2.9.9-1.redhat_00001.1.el8eap.noarch.rpm
eap7-jackson-databind-2.9.9.3-1.redhat_00001.1.el8eap.noarch.rpm
eap7-jackson-datatype-jdk8-2.9.9-1.redhat_00001.1.el8eap.noarch.rpm
eap7-jackson-datatype-jsr310-2.9.9-1.redhat_00001.1.el8eap.noarch.rpm
eap7-jackson-jaxrs-base-2.9.9-2.redhat_00001.1.el8eap.noarch.rpm
eap7-jackson-jaxrs-json-provider-2.9.9-2.redhat_00001.1.el8eap.noarch.rpm
eap7-jackson-module-jaxb-annotations-2.9.9-1.redhat_00001.1.el8eap.noarch.rpm
eap7-jackson-modules-base-2.9.9-1.redhat_00001.1.el8eap.noarch.rpm
eap7-jackson-modules-java8-2.9.9-1.redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-ejb-client-4.0.23-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-jaxrs-api_2.1_spec-1.0.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-logging-3.3.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-logmanager-2.1.14-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-marshalling-2.0.9-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-marshalling-river-2.0.9-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-msc-1.4.8-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-remoting-5.0.14-1.SP1_redhat_00001.1.el8eap.noarch.rpm
eap7-jboss-server-migration-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-cli-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-core-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.0-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.0-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.1-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.1-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.0-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.0-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.1-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.1-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly11.0-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly11.0-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly12.0-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly12.0-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly13.0-server-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly14.0-server-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly8.2-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly8.2-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly9.0-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-server-migration-wildfly9.0-to-eap7.2-1.3.1-4.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-jboss-xnio-base-3.7.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-jgroups-4.0.20-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-5.9.6-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-compensations-5.9.6-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-jbosstxbridge-5.9.6-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-jbossxts-5.9.6-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-jts-idlj-5.9.6-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-jts-integration-5.9.6-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-restat-api-5.9.6-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-restat-bridge-5.9.6-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-restat-integration-5.9.6-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-restat-util-5.9.6-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-narayana-txframework-5.9.6-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-netty-4.1.34-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-netty-all-4.1.34-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-picketbox-5.0.3-5.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-picketbox-infinispan-5.0.3-5.Final_redhat_00004.1.el8eap.noarch.rpm
eap7-picketlink-api-2.5.5-20.SP12_redhat_00007.1.el8eap.noarch.rpm
eap7-picketlink-bindings-2.5.5-20.SP12_redhat_00007.1.el8eap.noarch.rpm
eap7-picketlink-common-2.5.5-20.SP12_redhat_00007.1.el8eap.noarch.rpm
eap7-picketlink-config-2.5.5-20.SP12_redhat_00007.1.el8eap.noarch.rpm
eap7-picketlink-federation-2.5.5-20.SP12_redhat_00007.1.el8eap.noarch.rpm
eap7-picketlink-idm-api-2.5.5-20.SP12_redhat_00007.1.el8eap.noarch.rpm
eap7-picketlink-idm-impl-2.5.5-20.SP12_redhat_00007.1.el8eap.noarch.rpm
eap7-picketlink-idm-simple-schema-2.5.5-20.SP12_redhat_00007.1.el8eap.noarch.rpm
eap7-picketlink-impl-2.5.5-20.SP12_redhat_00007.1.el8eap.noarch.rpm
eap7-picketlink-wildfly8-2.5.5-20.SP12_redhat_00007.1.el8eap.noarch.rpm
eap7-undertow-2.0.25-1.SP1_redhat_00001.1.el8eap.noarch.rpm
eap7-weld-core-3.0.6-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-weld-core-impl-3.0.6-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-weld-core-jsf-3.0.6-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-weld-ejb-3.0.6-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-weld-jta-3.0.6-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-weld-probe-core-3.0.6-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-weld-web-3.0.6-2.Final_redhat_00002.1.el8eap.noarch.rpm
eap7-wildfly-7.2.4-1.GA_redhat_00002.1.el8eap.noarch.rpm
eap7-wildfly-elytron-1.6.4-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-elytron-tool-1.4.3-1.Final_redhat_00001.1.el8eap.noarch.rpm
eap7-wildfly-javadocs-7.2.4-1.GA_redhat_00002.1.el8eap.noarch.rpm
eap7-wildfly-modules-7.2.4-1.GA_redhat_00002.1.el8eap.noarch.rpm
eap7-wildfly-transaction-client-1.1.6-2.Final_redhat_00001.1.el8eap.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

8. References:

https://access.redhat.com/security/cve/CVE-2019-10184
https://access.redhat.com/security/cve/CVE-2019-10202
https://access.redhat.com/security/cve/CVE-2019-10212
https://access.redhat.com/security/cve/CVE-2019-12086
https://access.redhat.com/security/cve/CVE-2019-12384
https://access.redhat.com/security/cve/CVE-2019-12814
https://access.redhat.com/security/cve/CVE-2019-14379
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/

9. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=tf1O
- -----END PGP SIGNATURE-----

=================================================================================

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 7.2.4 security update
Advisory ID:       RHSA-2019:2938-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2019:2938
Issue date:        2019-09-30
CVE Names:         CVE-2019-10184 CVE-2019-10202 CVE-2019-10212 
                   CVE-2019-12086 CVE-2019-12384 CVE-2019-12814 
                   CVE-2019-14379 
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 7.2 for Red Hat Enterprise Linux.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

This release of Red Hat JBoss Enterprise Application Platform 7.2.4 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.3,
and includes bug fixes and enhancements. Refer to the Red Hat JBoss
Enterprise Application Platform 7.2.4 Release Notes for information on the
most significant bug fixes and enhancements included in this release.

Security Fix(es):

* jackson-databind: default typing mishandling leading to remote code
execution (CVE-2019-14379)

* jackson-databind: failure to block the logback-core class from
polymorphic deserialization leading to remote code execution
(CVE-2019-12384)

* jackson-databind: polymorphic typing issue allows attacker to read
arbitrary local files on the server via crafted JSON message
(CVE-2019-12814)

* undertow: DEBUG log for io.undertow.request.security if enabled leaks
credentials to log files (CVE-2019-10212)

* codehaus: incomplete fix for unsafe deserialization in jackson-databind
vulnerabilities (CVE-2019-10202)

* jackson-databind: polymorphic typing issue allows attacker to read
arbitrary local files on the server (CVE-2019-12086)

* undertow: Information leak in requests for directories without trailing
slashes (CVE-2019-10184)

3. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

The References section of this erratum contains a download link (you must
log in to download the update).

The JBoss server process must be restarted for the update to take effect.

4. Bugs fixed (https://bugzilla.redhat.com/):

1713068 - CVE-2019-10184 undertow: Information leak in requests for directories without trailing slashes
1713468 - CVE-2019-12086 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server.
1725795 - CVE-2019-12814 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message.
1725807 - CVE-2019-12384 jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution
1731271 - CVE-2019-10202 codehaus: incomplete fix for unsafe deserialization in jackson-databind vulnerabilities
1731984 - CVE-2019-10212 undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files
1737517 - CVE-2019-14379 jackson-databind: default typing mishandling leading to remote code execution

5. JIRA issues fixed (https://issues.jboss.org/):

JBEAP-16455 - [GSS](7.2.z) Upgrade Infinispan from 9.3.6 to 9.3.7
JBEAP-16779 - [GSS](7.2.z) Upgrade Hibernate ORM from 5.3.10 to 5.3.11
JBEAP-17045 - [GSS](7.2.z) Upgrade JSF based on Mojarra 2.3.5.SP3-redhat-00001 to 2.3.5.SP3-redhat-00002
JBEAP-17062 - [GSS](7.2.z) Upgrade Artemis from 2.7.0.redhat-00057 to 2.9.0.redhat-00005
JBEAP-17073 - [GSS](7.2.z) Upgrade jboss-ejb-client from 4.0.20 to 4.0.23
JBEAP-17109 - (7.2.z) Upgrade XNIO from 3.6.6.Final-redhat-00001 to 3.7.3.Final-redhat-00001
JBEAP-17112 - [GSS](7.2.z) Upgrade JBoss Remoting from 5.0.12 to 5.0.14.SP1
JBEAP-17162 - [GSS](7.2.z) Upgrade jgroups from 4.0.19 to 4.0.20
JBEAP-17178 - (7.2.z) Upgrade IronJacamar from 1.4.16.Final to 1.4.17.Final
JBEAP-17182 - (7.2.z) Upgrade PicketLink from 2.5.5.SP12-redhat-00006 to 2.5.5.SP12-redhat-00007
JBEAP-17183 - (7.2.z) Upgrade PicketLink bindings from 2.5.5.SP12-redhat-00006 to 2.5.5.SP12-redhat-00007
JBEAP-17223 - [GSS](7.2.z) Upgrade WildFly Core from 6.0.15 to 6.0.16
JBEAP-17238 - [GSS](7.2.z) Upgrade HAL from 3.0.13 to 3.0.16
JBEAP-17250 - [GSS](7.2.z) Upgrade JBoss MSC from 1.4.5 to 1.4.8
JBEAP-17271 - [GSS](7.2.z) Upgrade jboss-logmanager from 2.1.7.Final-redhat-00001 to 2.1.14.Final-redhat-00001
JBEAP-17273 - [GSS](7.2.z) Upgrade jboss-logging from 3.3.2.Final-redhat-00001 to 3.3.3.Final-redhat-00001
JBEAP-17274 - [GSS](7.2.z) Upgrade Wildfly Elytron from 1.6.3.Final-redhat-00001 to 1.6.4.Final-redhat-00001
JBEAP-17276 - [GSS](7.2.z) Upgrade wildfly-transaction-client from 1.1.4.Final-redhat-00001 to 1.1.6.Final-redhat-00001
JBEAP-17277 - [GSS](7.2.z) Upgrade Undertow from 2.0.22 to 2.0.25.SP1
JBEAP-17278 - [GSS](7.2.z) Upgrade JBoss Marshalling from 2.0.7 to 2.0.9
JBEAP-17294 - [GSS](7.2.z) Upgrade weld from 3.0.6.Final-redhat-00001 to 3.0.6.Final-redhat-00002
JBEAP-17311 - [GSS](7.2.z) Upgrade jboss-jaxrs-api_2.1_spec from 1.0.1.Final-redhat-00001 to 1.0.3.Final-redhat-00001
JBEAP-17320 - [GSS](7.2.z) Upgrade PicketBox from 5.0.3.Final-redhat-3 to 5.0.3.Final-redhat-00004
JBEAP-17321 - [GSS](7.2.z) Upgrade Narayana from 5.9.3.Final to 5.9.6.Final
JBEAP-17334 - (7.2.z) Upgrade Elytron-Tool from 1.4.2 to 1.4.3.Final
JBEAP-17527 - [GSS](7.2.z) Upgrade Hibernate ORM from 5.3.11 to 5.3.11.SP1

6. References:

https://access.redhat.com/security/cve/CVE-2019-10184
https://access.redhat.com/security/cve/CVE-2019-10202
https://access.redhat.com/security/cve/CVE-2019-10212
https://access.redhat.com/security/cve/CVE-2019-12086
https://access.redhat.com/security/cve/CVE-2019-12384
https://access.redhat.com/security/cve/CVE-2019-12814
https://access.redhat.com/security/cve/CVE-2019-14379
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=7.2
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/

7. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2019 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=RyFs
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=YMHp
-----END PGP SIGNATURE-----