-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.2266
  Red Hat JBoss Enterprise Application Platform multiple security updates
                                2 July 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat JBoss Enterprise Application Platform 6.4.23
Publisher:         Red Hat
Operating System:  Red Hat
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Confidential Data        -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-1938 CVE-2019-14885 

Reference:         ESB-2020.1744.2
                   ESB-2020.1350

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2020:2783
   https://access.redhat.com/errata/RHSA-2020:2779
   https://access.redhat.com/errata/RHSA-2020:2780
   https://access.redhat.com/errata/RHSA-2020:2781

Comment: This bulletin contains four (4) Red Hat security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 6.4.23 security update
Advisory ID:       RHSA-2020:2783-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:2783
Issue date:        2020-07-01
CVE Names:         CVE-2019-14885 CVE-2020-1938 
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 6.4.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Enterprise Application Platform is a platform for Java
applications based on the JBoss Application Server.

This release of Red Hat JBoss Enterprise Application Platform 6.4.23 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.22,
and includes bug fixes and enhancements, which are documented in the
Release Notes document listed in the References section.

Security Fix(es):

* jbossweb: tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
(CVE-2020-1938)

* JBoss EAP: Vault system property security attribute value is revealed on
CLI 'reload' command (CVE-2019-14885)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, see the CVE page(s) listed in the
References section.

All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat
Enterprise Linux 5 are advised to upgrade to these updated packages.

3. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

The References section of this erratum contains a download link (you must
log in to download the update).

You must restart the JBoss server process for the update to take effect.

4. Bugs fixed (https://bugzilla.redhat.com/):

1700855 - [GSS](6.4.z) Upgrade HornetQ from 2.3.25.SP29 to 2.3.25.SP31
1708467 - [GSS](6.4.z) Upgrade Remoting JMX from 1.1.3 to 1.1.4
1770615 - CVE-2019-14885 JBoss EAP: Vault system property security attribute value is revealed on CLI 'reload' command
1772542 - [GSS](6.4.z) Upgrade Mojarra from 1.2.15.b01-SP2 to 1.2.15.b01-SP2-redhat-2
1806398 - CVE-2020-1938 tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
1816579 - [GSS](6.4.z) Upgrade IronJacamar from 1.0.43.Final-redhat-1 to 1.0.44.Final-redhat-1
1816629 - [GSS](6.4.z) Upgrade Weld from 1.1.34 to 1.1.34.Final-redhat-2
1819214 - (6.4.z) Update JBOSGI Core Repository from 2.1.0.Final-redhat-2 to 2.1.0.Final-redhat-3

5. References:

https://access.redhat.com/security/cve/CVE-2019-14885
https://access.redhat.com/security/cve/CVE-2020-1938
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=P37D
- -----END PGP SIGNATURE-----

- -------------------------------------------------------------------------------

- ----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 6.4.23 security update
Advisory ID:       RHSA-2020:2779-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:2779
Issue date:        2020-07-01
CVE Names:         CVE-2019-14885 CVE-2020-1938 
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 6.4 for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server - noarch

3. Description:

Red Hat JBoss Enterprise Application Platform is a platform for Java
applications based on the JBoss Application Server.

This release of Red Hat JBoss Enterprise Application Platform 6.4.23 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.22,
and includes bug fixes and enhancements, which are documented in the
Release Notes document listed in the References section.

Security Fix(es):

* jbossweb: tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
(CVE-2020-1938)

* JBoss EAP: Vault system property security attribute value is revealed on
CLI 'reload' command (CVE-2019-14885)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, see the CVE page(s) listed in the
References section.

All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat
Enterprise Linux 5 are advised to upgrade to these updated packages.

4. Solution:

Before applying this update, ensure all previously released errata relevant
to your system have been applied.

For details about how to apply this update, see:

https://access.redhat.com/articles/11258

You must restart the JBoss server process for the update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1700855 - [GSS](6.4.z) Upgrade HornetQ from 2.3.25.SP29 to 2.3.25.SP31
1708467 - [GSS](6.4.z) Upgrade Remoting JMX from 1.1.3 to 1.1.4
1710433 - Tracker bug for the EAP 6.4.23 release for RHEL-6.
1770615 - CVE-2019-14885 JBoss EAP: Vault system property security attribute value is revealed on CLI 'reload' command
1772542 - [GSS](6.4.z) Upgrade Mojarra from 1.2.15.b01-SP2 to 1.2.15.b01-SP2-redhat-2
1806398 - CVE-2020-1938 tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
1816579 - [GSS](6.4.z) Upgrade IronJacamar from 1.0.43.Final-redhat-1 to 1.0.44.Final-redhat-1
1816629 - [GSS](6.4.z) Upgrade Weld from 1.1.34 to 1.1.34.Final-redhat-2
1819214 - (6.4.z) Update JBOSGI Core Repository from 2.1.0.Final-redhat-2 to 2.1.0.Final-redhat-3

6. Package List:

Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server:

Source:
glassfish-jsf12-eap6-1.2.15-11.b01_SP2_redhat_2.1.ep6.el6.src.rpm
hornetq-2.3.25-29.SP31_redhat_00001.1.ep6.el6.src.rpm
ironjacamar-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el6.src.rpm
jbosgi-repository-2.1.0-3.Final_redhat_3.1.ep6.el6.src.rpm
jboss-as-appclient-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-cli-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-client-all-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-clustering-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-cmp-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-configadmin-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-connector-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-controller-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-controller-client-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-core-security-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-deployment-repository-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-deployment-scanner-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-domain-http-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-domain-management-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-ee-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-ee-deployment-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-ejb3-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-embedded-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-host-controller-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-jacorb-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-jaxr-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-jaxrs-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-jdr-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-jmx-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-jpa-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-jsf-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-jsr77-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-logging-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-mail-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-management-client-content-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-messaging-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-modcluster-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-naming-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-network-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-osgi-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-osgi-configadmin-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-osgi-service-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-picketlink-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-platform-mbean-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-pojo-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-process-controller-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-protocol-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-remoting-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-sar-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-security-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-server-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-system-jmx-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-threads-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-transactions-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-version-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-web-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-webservices-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-weld-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-as-xts-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jboss-remoting3-jmx-1.1.4-2.Final_redhat_00001.1.ep6.el6.src.rpm
jbossas-appclient-7.5.23-4.Final_redhat_00002.1.ep6.el6.src.rpm
jbossas-bundles-7.5.23-4.Final_redhat_00002.1.ep6.el6.src.rpm
jbossas-core-7.5.23-4.Final_redhat_00002.1.ep6.el6.src.rpm
jbossas-domain-7.5.23-4.Final_redhat_00002.1.ep6.el6.src.rpm
jbossas-javadocs-7.5.23-2.Final_redhat_00002.1.ep6.el6.src.rpm
jbossas-modules-eap-7.5.23-3.Final_redhat_00002.1.ep6.el6.src.rpm
jbossas-product-eap-7.5.23-4.Final_redhat_00002.1.ep6.el6.src.rpm
jbossas-standalone-7.5.23-4.Final_redhat_00002.1.ep6.el6.src.rpm
jbossas-welcome-content-eap-7.5.23-4.Final_redhat_00002.1.ep6.el6.src.rpm
jbossweb-7.5.31-1.Final_redhat_1.1.ep6.el6.src.rpm
weld-core-1.1.34-2.Final_redhat_2.1.ep6.el6.src.rpm

noarch:
glassfish-jsf12-eap6-1.2.15-11.b01_SP2_redhat_2.1.ep6.el6.noarch.rpm
hornetq-2.3.25-29.SP31_redhat_00001.1.ep6.el6.noarch.rpm
ironjacamar-common-api-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el6.noarch.rpm
ironjacamar-common-impl-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el6.noarch.rpm
ironjacamar-common-spi-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el6.noarch.rpm
ironjacamar-core-api-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el6.noarch.rpm
ironjacamar-core-impl-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el6.noarch.rpm
ironjacamar-deployers-common-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el6.noarch.rpm
ironjacamar-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el6.noarch.rpm
ironjacamar-jdbc-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el6.noarch.rpm
ironjacamar-spec-api-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el6.noarch.rpm
ironjacamar-validator-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el6.noarch.rpm
jbosgi-repository-2.1.0-3.Final_redhat_3.1.ep6.el6.noarch.rpm
jboss-as-appclient-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-cli-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-client-all-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-clustering-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-cmp-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-configadmin-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-connector-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-controller-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-controller-client-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-core-security-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-deployment-repository-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-deployment-scanner-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-domain-http-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-domain-management-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-ee-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-ee-deployment-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-ejb3-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-embedded-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-host-controller-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-jacorb-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-jaxr-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-jaxrs-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-jdr-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-jmx-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-jpa-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-jsf-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-jsr77-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-logging-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-mail-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-management-client-content-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-messaging-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-modcluster-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-naming-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-network-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-osgi-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-osgi-configadmin-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-osgi-service-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-picketlink-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-platform-mbean-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-pojo-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-process-controller-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-protocol-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-remoting-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-sar-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-security-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-server-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-system-jmx-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-threads-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-transactions-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-version-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-web-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-webservices-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-weld-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-as-xts-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jboss-remoting3-jmx-1.1.4-2.Final_redhat_00001.1.ep6.el6.noarch.rpm
jbossas-appclient-7.5.23-4.Final_redhat_00002.1.ep6.el6.noarch.rpm
jbossas-bundles-7.5.23-4.Final_redhat_00002.1.ep6.el6.noarch.rpm
jbossas-core-7.5.23-4.Final_redhat_00002.1.ep6.el6.noarch.rpm
jbossas-domain-7.5.23-4.Final_redhat_00002.1.ep6.el6.noarch.rpm
jbossas-javadocs-7.5.23-2.Final_redhat_00002.1.ep6.el6.noarch.rpm
jbossas-modules-eap-7.5.23-3.Final_redhat_00002.1.ep6.el6.noarch.rpm
jbossas-product-eap-7.5.23-4.Final_redhat_00002.1.ep6.el6.noarch.rpm
jbossas-standalone-7.5.23-4.Final_redhat_00002.1.ep6.el6.noarch.rpm
jbossas-welcome-content-eap-7.5.23-4.Final_redhat_00002.1.ep6.el6.noarch.rpm
jbossweb-7.5.31-1.Final_redhat_1.1.ep6.el6.noarch.rpm
weld-core-1.1.34-2.Final_redhat_2.1.ep6.el6.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-14885
https://access.redhat.com/security/cve/CVE-2020-1938
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=z+kP
- -----END PGP SIGNATURE-----

- -------------------------------------------------------------------------------

- ----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 6.4.23 security update
Advisory ID:       RHSA-2020:2780-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:2780
Issue date:        2020-07-01
CVE Names:         CVE-2019-14885 CVE-2020-1938 
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 6.4
for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of
Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server - noarch

3. Description:

Red Hat JBoss Enterprise Application Platform is a platform for Java
applications based on the JBoss Application Server.

This release of Red Hat JBoss Enterprise Application Platform 6.4.23 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.22,
and includes bug fixes and enhancements, which are documented in the
Release Notes document linked to in the References.

Security Fix(es):

* jbossweb: tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
(CVE-2020-1938)

* JBoss EAP: Vault system property security attribute value is revealed on
CLI 'reload' command (CVE-2019-14885)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the
References section.

All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat
Enterprise Linux 5 are advised to upgrade to these updated packages. The
JBoss
server process must be restarted for the update to take effect.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1700855 - [GSS](6.4.z) Upgrade HornetQ from 2.3.25.SP29 to 2.3.25.SP31
1708467 - [GSS](6.4.z) Upgrade Remoting JMX from 1.1.3 to 1.1.4
1710434 - Tracker bug for the EAP 6.4.23 release for RHEL-7.
1770615 - CVE-2019-14885 JBoss EAP: Vault system property security attribute value is revealed on CLI 'reload' command
1772542 - [GSS](6.4.z) Upgrade Mojarra from 1.2.15.b01-SP2 to 1.2.15.b01-SP2-redhat-2
1806398 - CVE-2020-1938 tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
1816579 - [GSS](6.4.z) Upgrade IronJacamar from 1.0.43.Final-redhat-1 to 1.0.44.Final-redhat-1
1816629 - [GSS](6.4.z) Upgrade Weld from 1.1.34 to 1.1.34.Final-redhat-2
1819214 - (6.4.z) Update JBOSGI Core Repository from 2.1.0.Final-redhat-2 to 2.1.0.Final-redhat-3

6. Package List:

Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server:

Source:
glassfish-jsf12-eap6-1.2.15-11.b01_SP2_redhat_2.1.ep6.el7.src.rpm
hornetq-2.3.25-29.SP31_redhat_00001.1.ep6.el7.src.rpm
ironjacamar-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el7.src.rpm
jbosgi-repository-2.1.0-3.Final_redhat_3.1.ep6.el7.src.rpm
jboss-as-appclient-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-cli-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-client-all-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-clustering-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-cmp-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-configadmin-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-connector-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-controller-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-controller-client-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-core-security-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-deployment-repository-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-deployment-scanner-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-domain-http-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-domain-management-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-ee-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-ee-deployment-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-ejb3-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-embedded-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-host-controller-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-jacorb-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-jaxr-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-jaxrs-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-jdr-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-jmx-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-jpa-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-jsf-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-jsr77-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-logging-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-mail-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-management-client-content-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-messaging-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-modcluster-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-naming-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-network-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-osgi-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-osgi-configadmin-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-osgi-service-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-picketlink-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-platform-mbean-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-pojo-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-process-controller-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-protocol-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-remoting-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-sar-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-security-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-server-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-system-jmx-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-threads-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-transactions-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-version-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-web-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-webservices-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-weld-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-as-xts-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jboss-remoting3-jmx-1.1.4-2.Final_redhat_00001.1.ep6.el7.src.rpm
jbossas-appclient-7.5.23-4.Final_redhat_00002.1.ep6.el7.src.rpm
jbossas-bundles-7.5.23-4.Final_redhat_00002.1.ep6.el7.src.rpm
jbossas-core-7.5.23-4.Final_redhat_00002.1.ep6.el7.src.rpm
jbossas-domain-7.5.23-4.Final_redhat_00002.1.ep6.el7.src.rpm
jbossas-javadocs-7.5.23-2.Final_redhat_00002.1.ep6.el7.src.rpm
jbossas-modules-eap-7.5.23-3.Final_redhat_00002.1.ep6.el7.src.rpm
jbossas-product-eap-7.5.23-4.Final_redhat_00002.1.ep6.el7.src.rpm
jbossas-standalone-7.5.23-4.Final_redhat_00002.1.ep6.el7.src.rpm
jbossas-welcome-content-eap-7.5.23-4.Final_redhat_00002.1.ep6.el7.src.rpm
jbossweb-7.5.31-1.Final_redhat_1.1.ep6.el7.src.rpm
weld-core-1.1.34-2.Final_redhat_2.1.ep6.el7.src.rpm

noarch:
glassfish-jsf12-eap6-1.2.15-11.b01_SP2_redhat_2.1.ep6.el7.noarch.rpm
hornetq-2.3.25-29.SP31_redhat_00001.1.ep6.el7.noarch.rpm
ironjacamar-common-api-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el7.noarch.rpm
ironjacamar-common-impl-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el7.noarch.rpm
ironjacamar-common-spi-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el7.noarch.rpm
ironjacamar-core-api-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el7.noarch.rpm
ironjacamar-core-impl-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el7.noarch.rpm
ironjacamar-deployers-common-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el7.noarch.rpm
ironjacamar-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el7.noarch.rpm
ironjacamar-jdbc-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el7.noarch.rpm
ironjacamar-spec-api-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el7.noarch.rpm
ironjacamar-validator-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el7.noarch.rpm
jbosgi-repository-2.1.0-3.Final_redhat_3.1.ep6.el7.noarch.rpm
jboss-as-appclient-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-cli-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-client-all-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-clustering-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-cmp-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-configadmin-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-connector-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-controller-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-controller-client-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-core-security-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-deployment-repository-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-deployment-scanner-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-domain-http-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-domain-management-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-ee-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-ee-deployment-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-ejb3-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-embedded-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-host-controller-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-jacorb-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-jaxr-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-jaxrs-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-jdr-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-jmx-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-jpa-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-jsf-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-jsr77-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-logging-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-mail-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-management-client-content-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-messaging-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-modcluster-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-naming-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-network-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-osgi-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-osgi-configadmin-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-osgi-service-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-picketlink-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-platform-mbean-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-pojo-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-process-controller-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-protocol-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-remoting-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-sar-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-security-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-server-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-system-jmx-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-threads-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-transactions-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-version-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-web-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-webservices-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-weld-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-as-xts-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jboss-remoting3-jmx-1.1.4-2.Final_redhat_00001.1.ep6.el7.noarch.rpm
jbossas-appclient-7.5.23-4.Final_redhat_00002.1.ep6.el7.noarch.rpm
jbossas-bundles-7.5.23-4.Final_redhat_00002.1.ep6.el7.noarch.rpm
jbossas-core-7.5.23-4.Final_redhat_00002.1.ep6.el7.noarch.rpm
jbossas-domain-7.5.23-4.Final_redhat_00002.1.ep6.el7.noarch.rpm
jbossas-javadocs-7.5.23-2.Final_redhat_00002.1.ep6.el7.noarch.rpm
jbossas-modules-eap-7.5.23-3.Final_redhat_00002.1.ep6.el7.noarch.rpm
jbossas-product-eap-7.5.23-4.Final_redhat_00002.1.ep6.el7.noarch.rpm
jbossas-standalone-7.5.23-4.Final_redhat_00002.1.ep6.el7.noarch.rpm
jbossas-welcome-content-eap-7.5.23-4.Final_redhat_00002.1.ep6.el7.noarch.rpm
jbossweb-7.5.31-1.Final_redhat_1.1.ep6.el7.noarch.rpm
weld-core-1.1.34-2.Final_redhat_2.1.ep6.el7.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-14885
https://access.redhat.com/security/cve/CVE-2020-1938
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=xe+h
- -----END PGP SIGNATURE-----

- -------------------------------------------------------------------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Enterprise Application Platform 6.4.23 security update
Advisory ID:       RHSA-2020:2781-01
Product:           Red Hat JBoss Enterprise Application Platform
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:2781
Issue date:        2020-07-01
CVE Names:         CVE-2019-14885 CVE-2020-1938 
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform 6.4 for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server - noarch

3. Description:

Red Hat JBoss Enterprise Application Platform is a platform for Java
applications based on the JBoss Application Server.

This release of Red Hat JBoss Enterprise Application Platform 6.4.23 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.22,
and includes bug fixes and enhancements, which are documented in the
Release Notes document listed in the References section.

Security Fix(es):

* jbossweb: tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
(CVE-2020-1938)

* JBoss EAP: Vault system property security attribute value is revealed on
CLI 'reload' command (CVE-2019-14885)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, see the CVE page(s) listed in the
References section.

All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat
Enterprise Linux 5 are advised to upgrade to these updated packages.

4. Solution:

Before applying this update, ensure all previously released errata relevant
to your system have been applied.

For details about how to apply this update, see:

https://access.redhat.com/articles/11258

You must restart the JBoss server process for the update to take effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1700855 - [GSS](6.4.z) Upgrade HornetQ from 2.3.25.SP29 to 2.3.25.SP31
1708467 - [GSS](6.4.z) Upgrade Remoting JMX from 1.1.3 to 1.1.4
1710432 - Tracker bug for the EAP 6.4.23 release for RHEL-5.
1770615 - CVE-2019-14885 JBoss EAP: Vault system property security attribute value is revealed on CLI 'reload' command
1772542 - [GSS](6.4.z) Upgrade Mojarra from 1.2.15.b01-SP2 to 1.2.15.b01-SP2-redhat-2
1806398 - CVE-2020-1938 tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability
1816579 - [GSS](6.4.z) Upgrade IronJacamar from 1.0.43.Final-redhat-1 to 1.0.44.Final-redhat-1
1816629 - [GSS](6.4.z) Upgrade Weld from 1.1.34 to 1.1.34.Final-redhat-2
1819214 - (6.4.z) Update JBOSGI Core Repository from 2.1.0.Final-redhat-2 to 2.1.0.Final-redhat-3

6. Package List:

Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server:

Source:
glassfish-jsf12-eap6-1.2.15-11.b01_SP2_redhat_2.1.ep6.el5.src.rpm
hornetq-2.3.25-29.SP31_redhat_00001.1.ep6.el5.src.rpm
ironjacamar-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el5.src.rpm
jbosgi-repository-2.1.0-3.Final_redhat_3.1.ep6.el5.src.rpm
jboss-as-appclient-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-cli-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-client-all-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-clustering-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-cmp-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-configadmin-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-connector-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-controller-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-controller-client-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-core-security-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-deployment-repository-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-deployment-scanner-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-domain-http-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-domain-management-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-ee-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-ee-deployment-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-ejb3-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-embedded-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-host-controller-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-jacorb-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-jaxr-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-jaxrs-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-jdr-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-jmx-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-jpa-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-jsf-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-jsr77-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-logging-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-mail-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-management-client-content-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-messaging-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-modcluster-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-naming-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-network-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-osgi-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-osgi-configadmin-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-osgi-service-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-picketlink-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-platform-mbean-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-pojo-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-process-controller-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-protocol-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-remoting-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-sar-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-security-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-server-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-system-jmx-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-threads-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-transactions-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-version-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-web-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-webservices-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-weld-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-as-xts-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jboss-remoting3-jmx-1.1.4-2.Final_redhat_00001.1.ep6.el5.src.rpm
jbossas-appclient-7.5.23-4.Final_redhat_00002.1.ep6.el5.src.rpm
jbossas-bundles-7.5.23-4.Final_redhat_00002.1.ep6.el5.src.rpm
jbossas-core-7.5.23-4.Final_redhat_00002.1.ep6.el5.src.rpm
jbossas-domain-7.5.23-4.Final_redhat_00002.1.ep6.el5.src.rpm
jbossas-javadocs-7.5.23-2.Final_redhat_00002.1.ep6.el5.src.rpm
jbossas-modules-eap-7.5.23-3.Final_redhat_00002.1.ep6.el5.src.rpm
jbossas-product-eap-7.5.23-4.Final_redhat_00002.1.ep6.el5.src.rpm
jbossas-standalone-7.5.23-4.Final_redhat_00002.1.ep6.el5.src.rpm
jbossas-welcome-content-eap-7.5.23-4.Final_redhat_00002.1.ep6.el5.src.rpm
jbossweb-7.5.31-1.Final_redhat_1.1.ep6.el5.src.rpm
weld-core-1.1.34-2.Final_redhat_2.1.ep6.el5.src.rpm

noarch:
glassfish-jsf12-eap6-1.2.15-11.b01_SP2_redhat_2.1.ep6.el5.noarch.rpm
hornetq-2.3.25-29.SP31_redhat_00001.1.ep6.el5.noarch.rpm
ironjacamar-common-api-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el5.noarch.rpm
ironjacamar-common-impl-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el5.noarch.rpm
ironjacamar-common-spi-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el5.noarch.rpm
ironjacamar-core-api-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el5.noarch.rpm
ironjacamar-core-impl-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el5.noarch.rpm
ironjacamar-deployers-common-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el5.noarch.rpm
ironjacamar-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el5.noarch.rpm
ironjacamar-jdbc-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el5.noarch.rpm
ironjacamar-spec-api-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el5.noarch.rpm
ironjacamar-validator-eap6-1.0.44-1.Final_redhat_00001.1.ep6.el5.noarch.rpm
jbosgi-repository-2.1.0-3.Final_redhat_3.1.ep6.el5.noarch.rpm
jboss-as-appclient-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-cli-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-client-all-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-clustering-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-cmp-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-configadmin-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-connector-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-controller-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-controller-client-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-core-security-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-deployment-repository-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-deployment-scanner-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-domain-http-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-domain-management-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-ee-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-ee-deployment-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-ejb3-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-embedded-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-host-controller-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-jacorb-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-jaxr-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-jaxrs-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-jdr-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-jmx-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-jpa-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-jsf-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-jsr77-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-logging-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-mail-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-management-client-content-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-messaging-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-modcluster-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-naming-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-network-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-osgi-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-osgi-configadmin-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-osgi-service-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-picketlink-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-platform-mbean-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-pojo-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-process-controller-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-protocol-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-remoting-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-sar-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-security-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-server-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-system-jmx-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-threads-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-transactions-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-version-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-web-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-webservices-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-weld-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-as-xts-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jboss-remoting3-jmx-1.1.4-2.Final_redhat_00001.1.ep6.el5.noarch.rpm
jbossas-appclient-7.5.23-4.Final_redhat_00002.1.ep6.el5.noarch.rpm
jbossas-bundles-7.5.23-4.Final_redhat_00002.1.ep6.el5.noarch.rpm
jbossas-core-7.5.23-4.Final_redhat_00002.1.ep6.el5.noarch.rpm
jbossas-domain-7.5.23-4.Final_redhat_00002.1.ep6.el5.noarch.rpm
jbossas-javadocs-7.5.23-2.Final_redhat_00002.1.ep6.el5.noarch.rpm
jbossas-modules-eap-7.5.23-3.Final_redhat_00002.1.ep6.el5.noarch.rpm
jbossas-product-eap-7.5.23-4.Final_redhat_00002.1.ep6.el5.noarch.rpm
jbossas-standalone-7.5.23-4.Final_redhat_00002.1.ep6.el5.noarch.rpm
jbossas-welcome-content-eap-7.5.23-4.Final_redhat_00002.1.ep6.el5.noarch.rpm
jbossweb-7.5.31-1.Final_redhat_1.1.ep6.el5.noarch.rpm
weld-core-1.1.34-2.Final_redhat_2.1.ep6.el5.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-14885
https://access.redhat.com/security/cve/CVE-2020-1938
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=cMXd
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=HZxU
-----END PGP SIGNATURE-----