Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0286 Red Hat JBoss Enterprise Application Platform 7.3.5 security update 27 January 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Red Hat JBoss Enterprise Application Platform 7.3.5 Publisher: Red Hat Operating System: Red Hat Impact/Access: Denial of Service -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Unauthorised Access -- Remote/Unauthenticated Reduced Security -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-27822 CVE-2020-27782 CVE-2020-25689 CVE-2020-25640 CVE-2020-25633 CVE-2020-13956 Reference: ESB-2021.0107 ESB-2020.3539 ESB-2020.3500 Original Bulletin: https://access.redhat.com/errata/RHSA-2021:0246 https://access.redhat.com/errata/RHSA-2021:0247 https://access.redhat.com/errata/RHSA-2021:0248 https://access.redhat.com/errata/RHSA-2021:0250 Comment: This bulletin contains four (4) Red Hat security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat JBoss Enterprise Application Platform 7.3.5 security update Advisory ID: RHSA-2021:0246-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2021:0246 Issue date: 2021-01-25 CVE Names: CVE-2020-13956 CVE-2020-25633 CVE-2020-25640 CVE-2020-25689 CVE-2020-27782 CVE-2020-27822 ===================================================================== 1. Summary: An update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss EAP 7.3 for RHEL 6 Server - noarch 3. Description: Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.3.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.5 Release Notes for information about the most significant bug fixes and enhancements included in this release. Security Fix(es): * wildfly: Potential Memory leak in Wildfly when using OpenTracing (CVE-2020-27822) * undertow: special character in query results in server errors (CVE-2020-27782) * wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller (CVE-2020-25689) * httpclient: apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956) * wildfly: resource adapter logs plaintext JMS password at warning level on connection error (CVE-2020-25640) * resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling (CVE-2020-25633) For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section. 4. Solution: Before applying this update, ensure all previously released errata relevant to your system have been applied. For details about how to apply this update, see: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1879042 - CVE-2020-25633 resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling 1881637 - CVE-2020-25640 wildfly: resource adapter logs plaintext JMS password at warning level on connection error 1886587 - CVE-2020-13956 apache-httpclient: incorrect handling of malformed authority component in request URIs 1893070 - CVE-2020-25689 wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller 1901304 - CVE-2020-27782 undertow: special character in query results in server errors 1904060 - CVE-2020-27822 wildfly: Potential Memory leak in Wildfly when using OpenTracing 6. JIRA issues fixed (https://issues.jboss.org/): JBEAP-19788 - [GSS](7.3.z) Upgrade wildfly-http-client from 1.0.22.Final-redhat-00001 to 1.0.24.Final-redhat-00001 JBEAP-19790 - [GSS](7.3.z) Upgrade jboss-ejb-client from 4.0.33.SP1-redhat-00001 to 4.0.37.Final-redhat-00001 JBEAP-19816 - [GSS](7.3.z) UNDERTOW-1745 - Undertow access-log does not work for HTTP/2 POST request on HTTP Upgrade based connection JBEAP-20240 - (7.3.z) Upgrade Narayana from 5.9.9.Final to 5.9.10.Final JBEAP-20268 - (7.3.z) Upgrade generic jms from 2.0.6 to 2.0.8 JBEAP-20269 - Tracker bug for the EAP 7.3.5 release for RHEL-6 JBEAP-20286 - [GSS](7.3.z) Upgrade Hibernate ORM from 5.3.18.Final-redhat-00002 to 5.3.20.Final-redhat-00001 JBEAP-20288 - [GSS] (7.3.z) Upgrade undertow from 2.0.32.SP1-redhat to 2.0.33.SP2-redhat JBEAP-20333 - (7.3.z) Upgrade JSF based on Mojarra 2.3.9.SP12-redhat-00001 to 2.3.9.SP13-redhat-00001 JBEAP-20373 - (7.3.z) Upgrade Apache HTTP Client to 4.5.13 JBEAP-20376 - (7.3.z) Upgrade WildFly Elytron from 1.10.9.Final-redhat-00001 to 1.10.10.Final-redhat JBEAP-20399 - (7.3.z) Upgrade RESTEasy from 3.11.2.Final.redhat-00001 to 3.11.3.Final.redhat-00001 JBEAP-20403 - [GSS](7.3.z) Upgrade XNIO from 3.7.11.Final to 3.7.12.Final JBEAP-20405 - [GSS](7.3.z) Upgrade Artemis from 2.9.0.redhat-00016 to 2.9.0.redhat-00017 JBEAP-20438 - [GSS](7.3.z) Upgrade JBoss Remoting from 5.0.19.Final-redhat-00001 to 5.0.20.Final-redhat-00001 JBEAP-20480 - [GSS](7.3.z) Upgrade HAL from 3.2.11.Final-redhat-00001 to 3.2.12.Final JBEAP-20502 - (7.3.z) Upgrade JBoss Modules from 1.10.0.Final to 1.11.0.Final JBEAP-20521 - (7.3.z) Upgrade wildfly-discovery-client to 1.2.1.Final JBEAP-20591 - (7.3.z) Upgrade opentracing-interceptors from 0.0.4.redhat-00004 to 0.0.4.1.redhat-00002 7. Package List: Red Hat JBoss EAP 7.3 for RHEL 6 Server: Source: eap7-activemq-artemis-2.9.0-7.redhat_00017.1.el6eap.src.rpm eap7-glassfish-jsf-2.3.9-12.SP13_redhat_00001.1.el6eap.src.rpm eap7-hal-console-3.2.12-1.Final_redhat_00001.1.el6eap.src.rpm eap7-hibernate-5.3.20-1.Final_redhat_00001.1.el6eap.src.rpm eap7-httpcomponents-client-4.5.13-1.redhat_00001.1.el6eap.src.rpm eap7-jboss-ejb-client-4.0.37-1.Final_redhat_00001.1.el6eap.src.rpm eap7-jboss-genericjms-2.0.8-1.Final_redhat_00001.1.el6eap.src.rpm eap7-jboss-modules-1.11.0-1.Final_redhat_00001.1.el6eap.src.rpm eap7-jboss-remoting-5.0.20-1.Final_redhat_00001.1.el6eap.src.rpm eap7-jboss-server-migration-1.7.2-4.Final_redhat_00005.1.el6eap.src.rpm eap7-jboss-xnio-base-3.7.12-1.Final_redhat_00001.1.el6eap.src.rpm eap7-narayana-5.9.10-1.Final_redhat_00001.1.el6eap.src.rpm eap7-opentracing-interceptors-0.0.4.1-2.redhat_00002.1.el6eap.src.rpm eap7-resteasy-3.11.3-1.Final_redhat_00001.1.el6eap.src.rpm eap7-undertow-2.0.33-1.SP2_redhat_00001.1.el6eap.src.rpm eap7-wildfly-7.3.5-2.GA_redhat_00001.1.el6eap.src.rpm eap7-wildfly-discovery-1.2.1-1.Final_redhat_00001.1.el6eap.src.rpm eap7-wildfly-elytron-1.10.10-1.Final_redhat_00001.1.el6eap.src.rpm eap7-wildfly-http-client-1.0.24-1.Final_redhat_00001.1.el6eap.src.rpm noarch: eap7-activemq-artemis-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm eap7-activemq-artemis-cli-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm eap7-activemq-artemis-commons-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm eap7-activemq-artemis-core-client-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm eap7-activemq-artemis-dto-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm eap7-activemq-artemis-hornetq-protocol-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm eap7-activemq-artemis-hqclient-protocol-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm eap7-activemq-artemis-jdbc-store-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm eap7-activemq-artemis-jms-client-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm eap7-activemq-artemis-jms-server-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm eap7-activemq-artemis-journal-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm eap7-activemq-artemis-ra-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm eap7-activemq-artemis-selector-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm eap7-activemq-artemis-server-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm eap7-activemq-artemis-service-extensions-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm eap7-activemq-artemis-tools-2.9.0-7.redhat_00017.1.el6eap.noarch.rpm eap7-glassfish-jsf-2.3.9-12.SP13_redhat_00001.1.el6eap.noarch.rpm eap7-hal-console-3.2.12-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-hibernate-5.3.20-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-hibernate-core-5.3.20-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-hibernate-entitymanager-5.3.20-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-hibernate-envers-5.3.20-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-hibernate-java8-5.3.20-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-httpcomponents-client-4.5.13-1.redhat_00001.1.el6eap.noarch.rpm eap7-jboss-ejb-client-4.0.37-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-jboss-genericjms-2.0.8-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-jboss-modules-1.11.0-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-jboss-remoting-5.0.20-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-jboss-server-migration-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-cli-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-core-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap6.4-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap6.4-to-eap7.3-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap7.0-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap7.1-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap7.2-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap7.2-to-eap7.3-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-eap7.3-server-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly10.0-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly10.1-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly11.0-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly12.0-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly13.0-server-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly14.0-server-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly15.0-server-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly16.0-server-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly17.0-server-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly18.0-server-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly8.2-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-server-migration-wildfly9.0-1.7.2-4.Final_redhat_00005.1.el6eap.noarch.rpm eap7-jboss-xnio-base-3.7.12-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-narayana-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-narayana-compensations-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-narayana-jbosstxbridge-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-narayana-jbossxts-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-narayana-jts-idlj-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-narayana-jts-integration-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-narayana-restat-api-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-narayana-restat-bridge-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-narayana-restat-integration-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-narayana-restat-util-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-narayana-txframework-5.9.10-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-opentracing-interceptors-0.0.4.1-2.redhat_00002.1.el6eap.noarch.rpm eap7-resteasy-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-atom-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-cdi-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-client-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-client-microprofile-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-crypto-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-jackson-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-jackson2-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-jaxb-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-jaxrs-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-jettison-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-jose-jwt-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-jsapi-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-json-binding-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-json-p-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-multipart-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-rxjava2-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-spring-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-validator-provider-11-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-resteasy-yaml-provider-3.11.3-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-undertow-2.0.33-1.SP2_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-7.3.5-2.GA_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-discovery-client-1.2.1-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-elytron-1.10.10-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-elytron-tool-1.10.10-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-http-client-common-1.0.24-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-http-ejb-client-1.0.24-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-http-naming-client-1.0.24-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-http-transaction-client-1.0.24-1.Final_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-javadocs-7.3.5-2.GA_redhat_00001.1.el6eap.noarch.rpm eap7-wildfly-modules-7.3.5-2.GA_redhat_00001.1.el6eap.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 8. References: https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/ https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/ 9. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYA71QdzjgjWX9erEAQj0ow//Vo2rA/MX6px74GHR/1CIGqnz5jjf1Twu 6YOGIejWEPU/igNs9O7Wpm8n9u4hPUlNTz2/lRq8Vifh9ZG6vZm76zS9kXGi25w1 LWpehWvmc1uzpqERP7q67keN2kQhTZoEAJdOC4Qm67aIDUb0btpzLUUK0LhtShtX SgFwSB+9Ai6G7YiEzrEbWMGdHxqBW2Oy0Es9ypzT3o7ftJ2OGlrn6s6r0h+FAVxW 22gMQ8S2t3Q/rsvOs8y0D+5yF5K1rIcCUmTwpdED6H0PC4AlUfz6m7709FZf8Svn Vv/Y7yuNLf881e+gxg/tSwpWfQLN8P/x99GqKE4jOBMZO7m4QolYSr7sPpmZGOug ueO1frP2Rh96iKkpKcXTbjftNCOZkAyI00RDmd64AP+NPRjPn25J9f3nQ1wrg3y5 iWnltR0P0pj2JZMWtHTus8FtL4LPP5wodswHFcp94I5ITx3GVmRhKwwTIyfQthZL hSw614eKelQB6WqEKyblmyv+StIRl9JaOEoU/p3+k9q41Lui/cq3rpPQ/He5TrPR kEQde0xuo3KrTngtjrgCwRfXYme+nnh0ZD5dJtIEN6MaBf6G8e32TB9W4o1bEw6l rrGInWZ93pqJVy17QC7FaXHnuIjljdX97V6k6WkrGA8Q0Wv4Coexo47MawZyXrRd E8zC1WAJlLk= =Zzv9 - -----END PGP SIGNATURE----- - -------------------------------------------------------------------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat JBoss Enterprise Application Platform 7.3.5 security update Advisory ID: RHSA-2021:0247-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2021:0247 Issue date: 2021-01-25 CVE Names: CVE-2020-13956 CVE-2020-25633 CVE-2020-25640 CVE-2020-25689 CVE-2020-27782 CVE-2020-27822 ===================================================================== 1. Summary: An update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss EAP 7.3 for RHEL 7 Server - noarch 3. Description: Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.3.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.5 Release Notes for information about the most significant bug fixes and enhancements included in this release. Security Fix(es): * wildfly: Potential Memory leak in Wildfly when using OpenTracing (CVE-2020-27822) * undertow: special character in query results in server errors (CVE-2020-27782) * wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller (CVE-2020-25689) * httpclient: apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956) * wildfly: resource adapter logs plaintext JMS password at warning level on connection error (CVE-2020-25640) * resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling (CVE-2020-25633) For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section. 4. Solution: Before applying this update, ensure all previously released errata relevant to your system have been applied. For details about how to apply this update, see: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1879042 - CVE-2020-25633 resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling 1881637 - CVE-2020-25640 wildfly: resource adapter logs plaintext JMS password at warning level on connection error 1886587 - CVE-2020-13956 apache-httpclient: incorrect handling of malformed authority component in request URIs 1893070 - CVE-2020-25689 wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller 1901304 - CVE-2020-27782 undertow: special character in query results in server errors 1904060 - CVE-2020-27822 wildfly: Potential Memory leak in Wildfly when using OpenTracing 6. JIRA issues fixed (https://issues.jboss.org/): JBEAP-19788 - [GSS](7.3.z) Upgrade wildfly-http-client from 1.0.22.Final-redhat-00001 to 1.0.24.Final-redhat-00001 JBEAP-19790 - [GSS](7.3.z) Upgrade jboss-ejb-client from 4.0.33.SP1-redhat-00001 to 4.0.37.Final-redhat-00001 JBEAP-19816 - [GSS](7.3.z) UNDERTOW-1745 - Undertow access-log does not work for HTTP/2 POST request on HTTP Upgrade based connection JBEAP-20240 - (7.3.z) Upgrade Narayana from 5.9.9.Final to 5.9.10.Final JBEAP-20268 - (7.3.z) Upgrade generic jms from 2.0.6 to 2.0.8 JBEAP-20270 - Tracker bug for the EAP 7.3.5 release for RHEL-7 JBEAP-20286 - [GSS](7.3.z) Upgrade Hibernate ORM from 5.3.18.Final-redhat-00002 to 5.3.20.Final-redhat-00001 JBEAP-20288 - [GSS] (7.3.z) Upgrade undertow from 2.0.32.SP1-redhat to 2.0.33.SP2-redhat JBEAP-20333 - (7.3.z) Upgrade JSF based on Mojarra 2.3.9.SP12-redhat-00001 to 2.3.9.SP13-redhat-00001 JBEAP-20373 - (7.3.z) Upgrade Apache HTTP Client to 4.5.13 JBEAP-20376 - (7.3.z) Upgrade WildFly Elytron from 1.10.9.Final-redhat-00001 to 1.10.10.Final-redhat JBEAP-20399 - (7.3.z) Upgrade RESTEasy from 3.11.2.Final.redhat-00001 to 3.11.3.Final.redhat-00001 JBEAP-20403 - [GSS](7.3.z) Upgrade XNIO from 3.7.11.Final to 3.7.12.Final JBEAP-20405 - [GSS](7.3.z) Upgrade Artemis from 2.9.0.redhat-00016 to 2.9.0.redhat-00017 JBEAP-20438 - [GSS](7.3.z) Upgrade JBoss Remoting from 5.0.19.Final-redhat-00001 to 5.0.20.Final-redhat-00001 JBEAP-20480 - [GSS](7.3.z) Upgrade HAL from 3.2.11.Final-redhat-00001 to 3.2.12.Final JBEAP-20502 - (7.3.z) Upgrade JBoss Modules from 1.10.0.Final to 1.11.0.Final JBEAP-20521 - (7.3.z) Upgrade wildfly-discovery-client to 1.2.1.Final JBEAP-20591 - (7.3.z) Upgrade opentracing-interceptors from 0.0.4.redhat-00004 to 0.0.4.1.redhat-00002 7. Package List: Red Hat JBoss EAP 7.3 for RHEL 7 Server: Source: eap7-activemq-artemis-2.9.0-7.redhat_00017.1.el7eap.src.rpm eap7-glassfish-jsf-2.3.9-12.SP13_redhat_00001.1.el7eap.src.rpm eap7-hal-console-3.2.12-1.Final_redhat_00001.1.el7eap.src.rpm eap7-hibernate-5.3.20-1.Final_redhat_00001.1.el7eap.src.rpm eap7-httpcomponents-client-4.5.13-1.redhat_00001.1.el7eap.src.rpm eap7-jboss-ejb-client-4.0.37-1.Final_redhat_00001.1.el7eap.src.rpm eap7-jboss-genericjms-2.0.8-1.Final_redhat_00001.1.el7eap.src.rpm eap7-jboss-modules-1.11.0-1.Final_redhat_00001.1.el7eap.src.rpm eap7-jboss-remoting-5.0.20-1.Final_redhat_00001.1.el7eap.src.rpm eap7-jboss-server-migration-1.7.2-4.Final_redhat_00005.1.el7eap.src.rpm eap7-jboss-xnio-base-3.7.12-1.Final_redhat_00001.1.el7eap.src.rpm eap7-narayana-5.9.10-1.Final_redhat_00001.1.el7eap.src.rpm eap7-opentracing-interceptors-0.0.4.1-2.redhat_00002.1.el7eap.src.rpm eap7-resteasy-3.11.3-1.Final_redhat_00001.1.el7eap.src.rpm eap7-undertow-2.0.33-1.SP2_redhat_00001.1.el7eap.src.rpm eap7-wildfly-7.3.5-2.GA_redhat_00001.1.el7eap.src.rpm eap7-wildfly-discovery-1.2.1-1.Final_redhat_00001.1.el7eap.src.rpm eap7-wildfly-elytron-1.10.10-1.Final_redhat_00001.1.el7eap.src.rpm eap7-wildfly-http-client-1.0.24-1.Final_redhat_00001.1.el7eap.src.rpm noarch: eap7-activemq-artemis-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm eap7-activemq-artemis-cli-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm eap7-activemq-artemis-commons-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm eap7-activemq-artemis-core-client-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm eap7-activemq-artemis-dto-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm eap7-activemq-artemis-hornetq-protocol-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm eap7-activemq-artemis-hqclient-protocol-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm eap7-activemq-artemis-jdbc-store-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm eap7-activemq-artemis-jms-client-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm eap7-activemq-artemis-jms-server-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm eap7-activemq-artemis-journal-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm eap7-activemq-artemis-ra-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm eap7-activemq-artemis-selector-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm eap7-activemq-artemis-server-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm eap7-activemq-artemis-service-extensions-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm eap7-activemq-artemis-tools-2.9.0-7.redhat_00017.1.el7eap.noarch.rpm eap7-glassfish-jsf-2.3.9-12.SP13_redhat_00001.1.el7eap.noarch.rpm eap7-hal-console-3.2.12-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-hibernate-5.3.20-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-hibernate-core-5.3.20-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-hibernate-entitymanager-5.3.20-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-hibernate-envers-5.3.20-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-hibernate-java8-5.3.20-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-httpcomponents-client-4.5.13-1.redhat_00001.1.el7eap.noarch.rpm eap7-jboss-ejb-client-4.0.37-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-jboss-genericjms-2.0.8-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-jboss-modules-1.11.0-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-jboss-remoting-5.0.20-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-jboss-server-migration-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-cli-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-core-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-eap6.4-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-eap6.4-to-eap7.3-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-eap7.0-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-eap7.1-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-eap7.2-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-eap7.2-to-eap7.3-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-eap7.3-server-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly10.0-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly10.1-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly11.0-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly12.0-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly13.0-server-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly14.0-server-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly15.0-server-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly16.0-server-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly17.0-server-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly18.0-server-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly8.2-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-server-migration-wildfly9.0-1.7.2-4.Final_redhat_00005.1.el7eap.noarch.rpm eap7-jboss-xnio-base-3.7.12-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-narayana-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-narayana-compensations-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-narayana-jbosstxbridge-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-narayana-jbossxts-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-narayana-jts-idlj-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-narayana-jts-integration-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-narayana-restat-api-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-narayana-restat-bridge-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-narayana-restat-integration-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-narayana-restat-util-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-narayana-txframework-5.9.10-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-opentracing-interceptors-0.0.4.1-2.redhat_00002.1.el7eap.noarch.rpm eap7-resteasy-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-atom-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-cdi-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-client-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-client-microprofile-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-crypto-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-jackson-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-jackson2-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-jaxb-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-jaxrs-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-jettison-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-jose-jwt-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-jsapi-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-json-binding-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-json-p-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-multipart-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-rxjava2-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-spring-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-validator-provider-11-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-resteasy-yaml-provider-3.11.3-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-undertow-2.0.33-1.SP2_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-7.3.5-2.GA_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-discovery-client-1.2.1-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-elytron-1.10.10-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-elytron-tool-1.10.10-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-http-client-common-1.0.24-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-http-ejb-client-1.0.24-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-http-naming-client-1.0.24-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-http-transaction-client-1.0.24-1.Final_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-java-jdk11-7.3.5-2.GA_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-java-jdk8-7.3.5-2.GA_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-javadocs-7.3.5-2.GA_redhat_00001.1.el7eap.noarch.rpm eap7-wildfly-modules-7.3.5-2.GA_redhat_00001.1.el7eap.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 8. References: https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/ https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/ 9. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYA71XNzjgjWX9erEAQjtrQ/+JTm3ji7jpU9DI2c1A+fO/hok7WtgDy+r AEZ/4Knj+C7xtmbfNJ4hgjR+8gAib5Xfi/3igOX+in74dM4MnOIrhUL51zgviaKr 6xT6UwXgkIJXSB8EouixepcBa0Zv0w1lgyX8BiWnstd4X+K6Jg68rPbOigJs1q4Z PIAO9C5KBbLrmbXQV6Vw/oa8+NwTNEycrZI7KSiwdQ4GE2jjaLTbF41l5+Ls5NGj 4Gzos7rfGHUgpQTxkAV25C8uMrywlNDlbYLX3jzo+dTsMZjiIbNYATrai6zpy2u2 o02An3kvcWvRrEX/yUhf1ZcxRRwcrg3MURPyI16Bg0vsNAscLPa66JPtdpqNHtzQ iv+qDU9CA6mDndEQDx6EPnAPDOXBOC2ARhdkG+AQOqJT2QymP5H/g8uCIyQ5ry1p 0bNTzHX11VkTcFNRqx/DjTGunmWvY21yLCQbV7KmUhXcZKkLdYtPDR7mCQTb3Z2+ JeoMHn27K+O2OD9WfkYkwvxvu0+z5hol32KSk+GQYM23Gceq3yFfbZbncijGBAna rulX4pztJtEHIGpHgt1vbA+cmVJ7XEOAIDNfTCCdQcBzCedt/yT+GdISZRRy4QXP rf4Xaro5bbDUtt+cYLHo0omjmXwZvnnH1p9jkP/vwBo5F7fsYn//b2jmQXg/91lO hjOdJcryOpw= =9GSR - -----END PGP SIGNATURE----- - -------------------------------------------------------------------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat JBoss Enterprise Application Platform 7.3.5 security update Advisory ID: RHSA-2021:0248-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2021:0248 Issue date: 2021-01-25 CVE Names: CVE-2020-13956 CVE-2020-25633 CVE-2020-25640 CVE-2020-25689 CVE-2020-27782 CVE-2020-27822 ===================================================================== 1. Summary: An update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss EAP 7.3 for BaseOS-8 - noarch 3. Description: Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.3.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.5 Release Notes for information about the most significant bug fixes and enhancements included in this release. Security Fix(es): * wildfly: Potential Memory leak in Wildfly when using OpenTracing (CVE-2020-27822) * undertow: special character in query results in server errors (CVE-2020-27782) * wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller (CVE-2020-25689) * httpclient: apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956) * wildfly: resource adapter logs plaintext JMS password at warning level on connection error (CVE-2020-25640) * resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling (CVE-2020-25633) For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section. 4. Solution: Before applying this update, ensure all previously released errata relevant to your system have been applied. For details about how to apply this update, see: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1879042 - CVE-2020-25633 resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling 1881637 - CVE-2020-25640 wildfly: resource adapter logs plaintext JMS password at warning level on connection error 1886587 - CVE-2020-13956 apache-httpclient: incorrect handling of malformed authority component in request URIs 1893070 - CVE-2020-25689 wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller 1901304 - CVE-2020-27782 undertow: special character in query results in server errors 1904060 - CVE-2020-27822 wildfly: Potential Memory leak in Wildfly when using OpenTracing 6. JIRA issues fixed (https://issues.jboss.org/): JBEAP-19788 - [GSS](7.3.z) Upgrade wildfly-http-client from 1.0.22.Final-redhat-00001 to 1.0.24.Final-redhat-00001 JBEAP-19790 - [GSS](7.3.z) Upgrade jboss-ejb-client from 4.0.33.SP1-redhat-00001 to 4.0.37.Final-redhat-00001 JBEAP-19816 - [GSS](7.3.z) UNDERTOW-1745 - Undertow access-log does not work for HTTP/2 POST request on HTTP Upgrade based connection JBEAP-20240 - (7.3.z) Upgrade Narayana from 5.9.9.Final to 5.9.10.Final JBEAP-20268 - (7.3.z) Upgrade generic jms from 2.0.6 to 2.0.8 JBEAP-20271 - Tracker bug for the EAP 7.3.5 release for RHEL-8 JBEAP-20286 - [GSS](7.3.z) Upgrade Hibernate ORM from 5.3.18.Final-redhat-00002 to 5.3.20.Final-redhat-00001 JBEAP-20288 - [GSS] (7.3.z) Upgrade undertow from 2.0.32.SP1-redhat to 2.0.33.SP2-redhat JBEAP-20333 - (7.3.z) Upgrade JSF based on Mojarra 2.3.9.SP12-redhat-00001 to 2.3.9.SP13-redhat-00001 JBEAP-20373 - (7.3.z) Upgrade Apache HTTP Client to 4.5.13 JBEAP-20376 - (7.3.z) Upgrade WildFly Elytron from 1.10.9.Final-redhat-00001 to 1.10.10.Final-redhat JBEAP-20399 - (7.3.z) Upgrade RESTEasy from 3.11.2.Final.redhat-00001 to 3.11.3.Final.redhat-00001 JBEAP-20403 - [GSS](7.3.z) Upgrade XNIO from 3.7.11.Final to 3.7.12.Final JBEAP-20405 - [GSS](7.3.z) Upgrade Artemis from 2.9.0.redhat-00016 to 2.9.0.redhat-00017 JBEAP-20438 - [GSS](7.3.z) Upgrade JBoss Remoting from 5.0.19.Final-redhat-00001 to 5.0.20.Final-redhat-00001 JBEAP-20480 - [GSS](7.3.z) Upgrade HAL from 3.2.11.Final-redhat-00001 to 3.2.12.Final JBEAP-20502 - (7.3.z) Upgrade JBoss Modules from 1.10.0.Final to 1.11.0.Final JBEAP-20521 - (7.3.z) Upgrade wildfly-discovery-client to 1.2.1.Final JBEAP-20591 - (7.3.z) Upgrade opentracing-interceptors from 0.0.4.redhat-00004 to 0.0.4.1.redhat-00002 7. Package List: Red Hat JBoss EAP 7.3 for BaseOS-8: Source: eap7-activemq-artemis-2.9.0-7.redhat_00017.1.el8eap.src.rpm eap7-glassfish-jsf-2.3.9-12.SP13_redhat_00001.1.el8eap.src.rpm eap7-hal-console-3.2.12-1.Final_redhat_00001.1.el8eap.src.rpm eap7-hibernate-5.3.20-1.Final_redhat_00001.1.el8eap.src.rpm eap7-httpcomponents-client-4.5.13-1.redhat_00001.1.el8eap.src.rpm eap7-jboss-ejb-client-4.0.37-1.Final_redhat_00001.1.el8eap.src.rpm eap7-jboss-genericjms-2.0.8-1.Final_redhat_00001.1.el8eap.src.rpm eap7-jboss-modules-1.11.0-1.Final_redhat_00001.1.el8eap.src.rpm eap7-jboss-remoting-5.0.20-1.Final_redhat_00001.1.el8eap.src.rpm eap7-jboss-server-migration-1.7.2-4.Final_redhat_00005.1.el8eap.src.rpm eap7-jboss-xnio-base-3.7.12-1.Final_redhat_00001.1.el8eap.src.rpm eap7-narayana-5.9.10-1.Final_redhat_00001.1.el8eap.src.rpm eap7-opentracing-interceptors-0.0.4.1-2.redhat_00002.1.el8eap.src.rpm eap7-resteasy-3.11.3-1.Final_redhat_00001.1.el8eap.src.rpm eap7-undertow-2.0.33-1.SP2_redhat_00001.1.el8eap.src.rpm eap7-wildfly-7.3.5-2.GA_redhat_00001.1.el8eap.src.rpm eap7-wildfly-discovery-1.2.1-1.Final_redhat_00001.1.el8eap.src.rpm eap7-wildfly-elytron-1.10.10-1.Final_redhat_00001.1.el8eap.src.rpm eap7-wildfly-http-client-1.0.24-1.Final_redhat_00001.1.el8eap.src.rpm noarch: eap7-activemq-artemis-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm eap7-activemq-artemis-cli-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm eap7-activemq-artemis-commons-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm eap7-activemq-artemis-core-client-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm eap7-activemq-artemis-dto-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm eap7-activemq-artemis-hornetq-protocol-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm eap7-activemq-artemis-hqclient-protocol-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm eap7-activemq-artemis-jdbc-store-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm eap7-activemq-artemis-jms-client-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm eap7-activemq-artemis-jms-server-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm eap7-activemq-artemis-journal-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm eap7-activemq-artemis-ra-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm eap7-activemq-artemis-selector-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm eap7-activemq-artemis-server-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm eap7-activemq-artemis-service-extensions-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm eap7-activemq-artemis-tools-2.9.0-7.redhat_00017.1.el8eap.noarch.rpm eap7-glassfish-jsf-2.3.9-12.SP13_redhat_00001.1.el8eap.noarch.rpm eap7-hal-console-3.2.12-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-hibernate-5.3.20-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-hibernate-core-5.3.20-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-hibernate-entitymanager-5.3.20-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-hibernate-envers-5.3.20-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-hibernate-java8-5.3.20-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-httpcomponents-client-4.5.13-1.redhat_00001.1.el8eap.noarch.rpm eap7-jboss-ejb-client-4.0.37-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-jboss-genericjms-2.0.8-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-jboss-modules-1.11.0-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-jboss-remoting-5.0.20-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-jboss-server-migration-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-cli-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-core-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-eap6.4-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-eap6.4-to-eap7.3-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-eap7.0-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-eap7.1-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-eap7.2-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-eap7.2-to-eap7.3-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-eap7.3-server-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-wildfly10.0-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-wildfly10.1-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-wildfly11.0-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-wildfly12.0-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-wildfly13.0-server-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-wildfly14.0-server-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-wildfly15.0-server-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-wildfly16.0-server-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-wildfly17.0-server-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-wildfly18.0-server-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-wildfly8.2-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-server-migration-wildfly9.0-1.7.2-4.Final_redhat_00005.1.el8eap.noarch.rpm eap7-jboss-xnio-base-3.7.12-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-compensations-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-jbosstxbridge-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-jbossxts-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-jts-idlj-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-jts-integration-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-restat-api-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-restat-bridge-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-restat-integration-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-restat-util-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-narayana-txframework-5.9.10-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-opentracing-interceptors-0.0.4.1-2.redhat_00002.1.el8eap.noarch.rpm eap7-resteasy-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-atom-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-cdi-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-client-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-client-microprofile-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-crypto-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-jackson-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-jackson2-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-jaxb-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-jaxrs-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-jettison-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-jose-jwt-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-jsapi-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-json-binding-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-json-p-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-multipart-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-rxjava2-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-spring-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-validator-provider-11-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-resteasy-yaml-provider-3.11.3-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-undertow-2.0.33-1.SP2_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-7.3.5-2.GA_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-discovery-client-1.2.1-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-elytron-1.10.10-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-elytron-tool-1.10.10-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-http-client-common-1.0.24-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-http-ejb-client-1.0.24-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-http-naming-client-1.0.24-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-http-transaction-client-1.0.24-1.Final_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-javadocs-7.3.5-2.GA_redhat_00001.1.el8eap.noarch.rpm eap7-wildfly-modules-7.3.5-2.GA_redhat_00001.1.el8eap.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 8. References: https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/ https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/ 9. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYA71JtzjgjWX9erEAQjyvhAAgknBp66by9L1+/LEAip1GMc/Q+QPOt8j Kn81qayqeBUh1ldHkLjroFjHV9dhq2U44//xbFr8hSCbvj/tRtjtcLXvWpH+HUAb qBbFP15+yxLiO3GHWrmLQqbKVw5L33sQuIvadKZeftVqvMGxDipFzNrznFY4iqI2 PJUpUJKwj2D4dBfHebrCQiAoITCz9sBzc5KC4dXbg0Bfa947FaoF6XmoY5Y1K2UG 7L8307P3IHztB+UJbmRBND6oyeSEtMpW0gUWNKSumHD9Rvy/IumLK9NobiBDKP74 kG8iVriTcmSKWSslWo1mUvHIoh3E9FMXWRkl9Qhd5YvtRjBrYBk8LDi/6ocRQt7u aNxW885x8oX7Iw0LRd/9HAs62ozBKRv8sXRoN2U53KbmQyyBfNXocG1KYOyFC5fR 1SJcOs178ER4J5dlymk0qXGv13RmA12aiObCUuQoptPTXGgoiEgCxo2SiIiJo+nY QooV/X0u2X7NdbM3dHUn4ikQmjCujFLEkcHsc14XuYK47j9Sj6IZFUJGpNDNChZH 5QroAtvzwYdWJgdpRlABpvTp6uIfy8jixoAwt2B93r8xGQLmNpRln3jh+7rpAoFi sZCuvenM3VHAWmoMkktsxZ9ydHtJtuuVNP2hQ8tvVOhyWcG0A/MqHFu6nZ85440b LrdlAyU5J9w= =l4Z1 - -----END PGP SIGNATURE----- - -------------------------------------------------------------------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat JBoss Enterprise Application Platform 7.3.5 security update Advisory ID: RHSA-2021:0250-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2021:0250 Issue date: 2021-01-25 CVE Names: CVE-2020-13956 CVE-2020-25633 CVE-2020-25640 CVE-2020-25689 CVE-2020-27782 CVE-2020-27822 ===================================================================== 1. Summary: An update is now available for Red Hat JBoss Enterprise Application Platform 7.3. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 7.3.5 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.3.4, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.3.5 Release Notes for information about the most significant bug fixes and enhancements included in this release. Security Fix(es): * wildfly: Potential Memory leak in Wildfly when using OpenTracing (CVE-2020-27822) * undertow: special character in query results in server errors (CVE-2020-27782) * wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller (CVE-2020-25689) * httpclient: apache-httpclient: incorrect handling of malformed authority component in request URIs (CVE-2020-13956) * wildfly: resource adapter logs plaintext JMS password at warning level on connection error (CVE-2020-25640) * resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling (CVE-2020-25633) For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section. 3. Solution: Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications. The References section of this erratum contain a download link (you must log in to download the update). The JBoss server process must be restarted for the update to take effect. 4. Bugs fixed (https://bugzilla.redhat.com/): 1879042 - CVE-2020-25633 resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling 1881637 - CVE-2020-25640 wildfly: resource adapter logs plaintext JMS password at warning level on connection error 1886587 - CVE-2020-13956 apache-httpclient: incorrect handling of malformed authority component in request URIs 1893070 - CVE-2020-25689 wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller 1901304 - CVE-2020-27782 undertow: special character in query results in server errors 1904060 - CVE-2020-27822 wildfly: Potential Memory leak in Wildfly when using OpenTracing 5. JIRA issues fixed (https://issues.jboss.org/): JBEAP-19788 - [GSS](7.3.z) Upgrade wildfly-http-client from 1.0.22.Final-redhat-00001 to 1.0.24.Final-redhat-00001 JBEAP-19790 - [GSS](7.3.z) Upgrade jboss-ejb-client from 4.0.33.SP1-redhat-00001 to 4.0.37.Final-redhat-00001 JBEAP-19816 - [GSS](7.3.z) UNDERTOW-1745 - Undertow access-log does not work for HTTP/2 POST request on HTTP Upgrade based connection JBEAP-20240 - (7.3.z) Upgrade Narayana from 5.9.9.Final to 5.9.10.Final JBEAP-20268 - (7.3.z) Upgrade generic jms from 2.0.6 to 2.0.8 JBEAP-20286 - [GSS](7.3.z) Upgrade Hibernate ORM from 5.3.18.Final-redhat-00002 to 5.3.20.Final-redhat-00001 JBEAP-20288 - [GSS] (7.3.z) Upgrade undertow from 2.0.32.SP1-redhat to 2.0.33.SP2-redhat JBEAP-20333 - (7.3.z) Upgrade JSF based on Mojarra 2.3.9.SP12-redhat-00001 to 2.3.9.SP13-redhat-00001 JBEAP-20373 - (7.3.z) Upgrade Apache HTTP Client to 4.5.13 JBEAP-20376 - (7.3.z) Upgrade WildFly Elytron from 1.10.9.Final-redhat-00001 to 1.10.10.Final-redhat JBEAP-20399 - (7.3.z) Upgrade RESTEasy from 3.11.2.Final.redhat-00001 to 3.11.3.Final.redhat-00001 JBEAP-20403 - [GSS](7.3.z) Upgrade XNIO from 3.7.11.Final to 3.7.12.Final JBEAP-20405 - [GSS](7.3.z) Upgrade Artemis from 2.9.0.redhat-00016 to 2.9.0.redhat-00017 JBEAP-20438 - [GSS](7.3.z) Upgrade JBoss Remoting from 5.0.19.Final-redhat-00001 to 5.0.20.Final-redhat-00001 JBEAP-20480 - [GSS](7.3.z) Upgrade HAL from 3.2.11.Final-redhat-00001 to 3.2.12.Final JBEAP-20502 - (7.3.z) Upgrade JBoss Modules from 1.10.0.Final to 1.11.0.Final JBEAP-20521 - (7.3.z) Upgrade wildfly-discovery-client to 1.2.1.Final JBEAP-20591 - (7.3.z) Upgrade opentracing-interceptors from 0.0.4.redhat-00004 to 0.0.4.1.redhat-00002 6. References: https://access.redhat.com/security/cve/CVE-2020-13956 https://access.redhat.com/security/cve/CVE-2020-25633 https://access.redhat.com/security/cve/CVE-2020-25640 https://access.redhat.com/security/cve/CVE-2020-25689 https://access.redhat.com/security/cve/CVE-2020-27782 https://access.redhat.com/security/cve/CVE-2020-27822 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=7.3 https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/ https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYA7vwtzjgjWX9erEAQggvw/9HSYPiSvkgNFbKMZDsVMjC4mg9LsZAi15 WfhZwZmRZcWRSyhFW0b8m4G0cgvtWoS/AfKkPLMUivgvJ42T/iMwOegHS9GC+4y/ mIUdii+8uQ2YoEYOgQjlawJ7TsEAx3IUQltnSrKS2vLbGtrorXqQgnURvJMtfG4x GsWSQ/yk8ZquCTfxuo97BU+bhcqZXp/ElBD0WP09FD/10ZPhtnUpPUf90GnCNcHj /+0gTxOqJuSxflPn/RUjrlwMLZNsaIFHY66zYNzCYdwIUDLzTlyT70AmAfnQskNb 7TBNbbtkfi8rJcduFyt+WQJ/3wk//PNkpyzJiO8h53RgsBdwe2f/IIefbABEzaXR 3y5a2Bdu0zJKQuT0samjAj8N13L7MQwejaxC3Q9gVgeC3eGdN5FnS1cMcIqU8MRr 4dysFny7NMIMmqu3mXBSChbyRlGtlLkXN4msAeivvrtnJHcVaFffx75hzWoK+0mE ZaIlx1dQknXZMqa1frJmI4nOjq7+VE5KcVknKRALoWWSWmvzQQ4QtUAOtSVWzmrQ EGlicVcz8IVX5zkJFX2EkA9pOGRT4hftXj5gFnTxQ8a6Yqw8m6YUsHbmYb8Z5Uza 8GxsE46jQJxfLxT9891xc0LEl74WsWHmVlnPdf3XJ2YUabo4XW8LFOeHfmgqhCwh 2b53B7Bw5Wc= =5Dnp - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYBC3zeNLKJtyKPYoAQiuYQ/+Mtgg8QZBj4MkiwI08u/GGtYil7DX9BGP c2MK4Y0ov+ESu6vf3um8jZs8ab2tgfhEZeDrdU1iMAQWWLIk0SAUM5awPFjAQy1S tPua3KXmnXh2NTonvzPDDUF8DNdQHgKyHeDbmv07iG5JT07gYGiHo9maklSiF7H6 eB8fwPlASSB/pZdsEEXEepcWCqBjfnW+IqDVA43PVonV895mX1y4RenUf8yE5ekD gCIz3mVGYx0Ylrh5CgTTr9ki8WVZOjlIaqYOeOA1HL+3I5mfOpXC+OHlJYmb2wZX QPJLncKA/EMPVAiyURGq2Ic1AlrPAMnJtKAGMwWVC9FaKN30a0Hi1DUt4x4oRFo6 V7Lb9XHd+yRXLUjgYKWZRKJw6UbhhUeWWm5NGYhQHEi7UJQ9iPa7C9hJtrbbYn74 bkqLn3N4IWAmX8gNy+PBVK5maRIV4EivAi7vafoMjq92F2fc2jo0vzSFr2iQIr5T RiP/4UUL6G5CEQWUqyBO/8SZnmfNFcSyH11LSS7fC350vaHrK4nQH3VlhyJ6bcMg eqyeLUto9gEfUvEnseoxRDAq22wdUHw+MhBrcDyzI9a+rKiBI+rKr60qldcso2Yi cWpdYXoXuYTOPG5ZS5FEJ2cveUgqI2fFHZ0w1kAUVs8k5cykJehuFxNxFJ1bLc/u RFMTOvdKSpY= =dpnR -----END PGP SIGNATURE-----