VARIoT IoT vulnerabilities database
| VAR-201908-0261 | CVE-2019-9518 | HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustion |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU. Multiple HTTP/2 implementations are vulnerable to a variety of denial-of-service (DoS) attacks. Apple SwiftNIO and Apache Traffic Server Used in HTTP/2 Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. HTTP/2 is the second version of the hypertext transfer protocol, which is mainly used to ensure the communication between the client and the server. A resource management error vulnerability exists in HTTP/2. An attacker could exploit this vulnerability to cause a denial of service. Description:
Red Hat Decision Manager is an open source decision management platform
that combines business rules management, complex event processing, Decision
Model & Notation (DMN) execution, and Business Optimizer for solving
planning problems. It automates business decisions and makes that logic
available to the entire business.
It is recommended to halt the server by stopping the JBoss Application
Server process before installing this update; after installing the update,
restart the server by starting the JBoss Application Server process. Description:
Red Hat Fuse provides a small-footprint, flexible, open source enterprise
service bus and integration platform. Red Hat A-MQ is a standards compliant
messaging system that is tailored for use in mission critical applications. It
includes bug fixes, which are documented in the patch notes accompanying
the package on the download page. See the download link given in the
references section below. Solution:
Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.
Installation instructions are located in the download section of the
customer portal.
The References section of this erratum contains a download link (you must
log in to download the update).
The purpose of this text-only errata is to inform you about the security
issues fixed in this release. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: rh-nodejs8-nodejs security update
Advisory ID: RHSA-2019:2955-01
Product: Red Hat Software Collections
Advisory URL: https://access.redhat.com/errata/RHSA-2019:2955
Issue date: 2019-10-02
CVE Names: CVE-2019-9511 CVE-2019-9512 CVE-2019-9513
CVE-2019-9514 CVE-2019-9515 CVE-2019-9516
CVE-2019-9517 CVE-2019-9518
====================================================================
1. Summary:
An update for rh-nodejs8-nodejs is now available for Red Hat Software
Collections.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5) - noarch, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - noarch, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7) - noarch, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
3. Description:
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version:
rh-nodejs8-nodejs (8.16.1).
Security Fix(es):
* HTTP/2: large amount of data requests leads to denial of service
(CVE-2019-9511)
* HTTP/2: flood using PING frames results in unbounded memory growth
(CVE-2019-9512)
* HTTP/2: flood using PRIORITY frames results in excessive resource
consumption (CVE-2019-9513)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth
(CVE-2019-9514)
* HTTP/2: flood using SETTINGS frames results in unbounded memory growth
(CVE-2019-9515)
* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
* HTTP/2: request for large response leads to denial of service
(CVE-2019-9517)
* HTTP/2: flood using empty frames results in excessive resource
consumption (CVE-2019-9518)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Package List:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
rh-nodejs8-3.0-5.el7.src.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.src.rpm
aarch64:
rh-nodejs8-3.0-5.el7.aarch64.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.aarch64.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.aarch64.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.aarch64.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.aarch64.rpm
rh-nodejs8-runtime-3.0-5.el7.aarch64.rpm
rh-nodejs8-scldevel-3.0-5.el7.aarch64.rpm
noarch:
rh-nodejs8-nodejs-docs-8.16.1-2.el7.noarch.rpm
ppc64le:
rh-nodejs8-3.0-5.el7.ppc64le.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.ppc64le.rpm
rh-nodejs8-runtime-3.0-5.el7.ppc64le.rpm
rh-nodejs8-scldevel-3.0-5.el7.ppc64le.rpm
s390x:
rh-nodejs8-3.0-5.el7.s390x.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.s390x.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.s390x.rpm
rh-nodejs8-runtime-3.0-5.el7.s390x.rpm
rh-nodejs8-scldevel-3.0-5.el7.s390x.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
rh-nodejs8-3.0-5.el7.src.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.src.rpm
aarch64:
rh-nodejs8-3.0-5.el7.aarch64.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.aarch64.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.aarch64.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.aarch64.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.aarch64.rpm
rh-nodejs8-runtime-3.0-5.el7.aarch64.rpm
rh-nodejs8-scldevel-3.0-5.el7.aarch64.rpm
noarch:
rh-nodejs8-nodejs-docs-8.16.1-2.el7.noarch.rpm
ppc64le:
rh-nodejs8-3.0-5.el7.ppc64le.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.ppc64le.rpm
rh-nodejs8-runtime-3.0-5.el7.ppc64le.rpm
rh-nodejs8-scldevel-3.0-5.el7.ppc64le.rpm
s390x:
rh-nodejs8-3.0-5.el7.s390x.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.s390x.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.s390x.rpm
rh-nodejs8-runtime-3.0-5.el7.s390x.rpm
rh-nodejs8-scldevel-3.0-5.el7.s390x.rpm
x86_64:
rh-nodejs8-3.0-5.el7.x86_64.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.x86_64.rpm
rh-nodejs8-runtime-3.0-5.el7.x86_64.rpm
rh-nodejs8-scldevel-3.0-5.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5):
Source:
rh-nodejs8-3.0-5.el7.src.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.src.rpm
noarch:
rh-nodejs8-nodejs-docs-8.16.1-2.el7.noarch.rpm
ppc64le:
rh-nodejs8-3.0-5.el7.ppc64le.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.ppc64le.rpm
rh-nodejs8-runtime-3.0-5.el7.ppc64le.rpm
rh-nodejs8-scldevel-3.0-5.el7.ppc64le.rpm
s390x:
rh-nodejs8-3.0-5.el7.s390x.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.s390x.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.s390x.rpm
rh-nodejs8-runtime-3.0-5.el7.s390x.rpm
rh-nodejs8-scldevel-3.0-5.el7.s390x.rpm
x86_64:
rh-nodejs8-3.0-5.el7.x86_64.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.x86_64.rpm
rh-nodejs8-runtime-3.0-5.el7.x86_64.rpm
rh-nodejs8-scldevel-3.0-5.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):
Source:
rh-nodejs8-3.0-5.el7.src.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.src.rpm
noarch:
rh-nodejs8-nodejs-docs-8.16.1-2.el7.noarch.rpm
ppc64le:
rh-nodejs8-3.0-5.el7.ppc64le.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.ppc64le.rpm
rh-nodejs8-runtime-3.0-5.el7.ppc64le.rpm
rh-nodejs8-scldevel-3.0-5.el7.ppc64le.rpm
s390x:
rh-nodejs8-3.0-5.el7.s390x.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.s390x.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.s390x.rpm
rh-nodejs8-runtime-3.0-5.el7.s390x.rpm
rh-nodejs8-scldevel-3.0-5.el7.s390x.rpm
x86_64:
rh-nodejs8-3.0-5.el7.x86_64.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.x86_64.rpm
rh-nodejs8-runtime-3.0-5.el7.x86_64.rpm
rh-nodejs8-scldevel-3.0-5.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7):
Source:
rh-nodejs8-3.0-5.el7.src.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.src.rpm
noarch:
rh-nodejs8-nodejs-docs-8.16.1-2.el7.noarch.rpm
ppc64le:
rh-nodejs8-3.0-5.el7.ppc64le.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.ppc64le.rpm
rh-nodejs8-runtime-3.0-5.el7.ppc64le.rpm
rh-nodejs8-scldevel-3.0-5.el7.ppc64le.rpm
s390x:
rh-nodejs8-3.0-5.el7.s390x.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.s390x.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.s390x.rpm
rh-nodejs8-runtime-3.0-5.el7.s390x.rpm
rh-nodejs8-scldevel-3.0-5.el7.s390x.rpm
x86_64:
rh-nodejs8-3.0-5.el7.x86_64.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.x86_64.rpm
rh-nodejs8-runtime-3.0-5.el7.x86_64.rpm
rh-nodejs8-scldevel-3.0-5.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-nodejs8-3.0-5.el7.src.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.src.rpm
noarch:
rh-nodejs8-nodejs-docs-8.16.1-2.el7.noarch.rpm
x86_64:
rh-nodejs8-3.0-5.el7.x86_64.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.x86_64.rpm
rh-nodejs8-runtime-3.0-5.el7.x86_64.rpm
rh-nodejs8-scldevel-3.0-5.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2019-9511
https://access.redhat.com/security/cve/CVE-2019-9512
https://access.redhat.com/security/cve/CVE-2019-9513
https://access.redhat.com/security/cve/CVE-2019-9514
https://access.redhat.com/security/cve/CVE-2019-9515
https://access.redhat.com/security/cve/CVE-2019-9516
https://access.redhat.com/security/cve/CVE-2019-9517
https://access.redhat.com/security/cve/CVE-2019-9518
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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S8e1
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
The fixes are too intrusive to backport to the version in the oldstable
distribution (stretch). An upgrade to Debian stable (buster) is
recommended instead.
For the stable distribution (buster), these problems have been fixed in
version 8.0.2+ds-1+deb10u1.
We recommend that you upgrade your trafficserver packages.
For the detailed security status of trafficserver please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/trafficserver
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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UFIM
-----END PGP SIGNATURE-----
. Description:
AMQ Broker is a high-performance messaging implementation based on ActiveMQ
Artemis. It uses an asynchronous journal for fast message persistence, and
supports multiple languages, protocols, and platforms
| VAR-201908-0263 | CVE-2019-9513 | HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustion |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU. Multiple HTTP/2 implementations are vulnerable to a variety of denial-of-service (DoS) attacks. Apple SwiftNIO Used in products such as HTTP/2 Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. A resource management error vulnerability exists in HTTP/2. A vulnerability in the HTTP/2 implementation of Nginx could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on a targeted system.
The vulnerability is due to improper priority changes in the affected software that could lead to excessive CPU usage. An attacker could exploit this vulnerability by sending a request that submits malicious input to an affected system. A successful exploit could result in a DoS condition on the targeted system.
nginx.org has confirmed the vulnerability and released software updates. 8) - aarch64, ppc64le, s390x, x86_64
3. Description:
libnghttp2 is a library implementing the Hypertext Transfer Protocol
version 2 (HTTP/2) protocol in C.
For the oldstable distribution (stretch), these problems have been fixed
in version 1.10.3-1+deb9u3.
For the stable distribution (buster), these problems have been fixed in
version 1.14.2-2+deb10u1.
We recommend that you upgrade your nginx packages.
For the detailed security status of nginx please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/nginx
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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+ZOE
-----END PGP SIGNATURE-----
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: rh-nginx110-nginx security update
Advisory ID: RHSA-2019:2745-01
Product: Red Hat Software Collections
Advisory URL: https://access.redhat.com/errata/RHSA-2019:2745
Issue date: 2019-09-12
CVE Names: CVE-2019-9511 CVE-2019-9513 CVE-2019-9516
====================================================================
1. Summary:
An update for rh-nginx110-nginx is now available for Red Hat Software
Collections.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64
3. Description:
nginx is a web and proxy server supporting HTTP and other protocols, with a
focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* HTTP/2: large amount of data request leads to denial of service
(CVE-2019-9511)
* HTTP/2: flood using PRIORITY frames resulting in excessive resource
consumption (CVE-2019-9513)
* HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The rh-nginx110-nginx service must be restarted for this update to take
effect.
5. Package List:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):
Source:
rh-nginx110-nginx-1.10.2-9.el6.1.src.rpm
x86_64:
rh-nginx110-nginx-1.10.2-9.el6.1.x86_64.rpm
rh-nginx110-nginx-debuginfo-1.10.2-9.el6.1.x86_64.rpm
rh-nginx110-nginx-mod-http-image-filter-1.10.2-9.el6.1.x86_64.rpm
rh-nginx110-nginx-mod-http-perl-1.10.2-9.el6.1.x86_64.rpm
rh-nginx110-nginx-mod-http-xslt-filter-1.10.2-9.el6.1.x86_64.rpm
rh-nginx110-nginx-mod-mail-1.10.2-9.el6.1.x86_64.rpm
rh-nginx110-nginx-mod-stream-1.10.2-9.el6.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):
Source:
rh-nginx110-nginx-1.10.2-9.el6.1.src.rpm
x86_64:
rh-nginx110-nginx-1.10.2-9.el6.1.x86_64.rpm
rh-nginx110-nginx-debuginfo-1.10.2-9.el6.1.x86_64.rpm
rh-nginx110-nginx-mod-http-image-filter-1.10.2-9.el6.1.x86_64.rpm
rh-nginx110-nginx-mod-http-perl-1.10.2-9.el6.1.x86_64.rpm
rh-nginx110-nginx-mod-http-xslt-filter-1.10.2-9.el6.1.x86_64.rpm
rh-nginx110-nginx-mod-mail-1.10.2-9.el6.1.x86_64.rpm
rh-nginx110-nginx-mod-stream-1.10.2-9.el6.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
rh-nginx110-nginx-1.10.2-9.el7.1.src.rpm
x86_64:
rh-nginx110-nginx-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-debuginfo-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-image-filter-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-perl-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-xslt-filter-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-mail-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-stream-1.10.2-9.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4):
Source:
rh-nginx110-nginx-1.10.2-9.el7.1.src.rpm
x86_64:
rh-nginx110-nginx-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-debuginfo-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-image-filter-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-perl-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-xslt-filter-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-mail-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-stream-1.10.2-9.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5):
Source:
rh-nginx110-nginx-1.10.2-9.el7.1.src.rpm
x86_64:
rh-nginx110-nginx-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-debuginfo-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-image-filter-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-perl-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-xslt-filter-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-mail-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-stream-1.10.2-9.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):
Source:
rh-nginx110-nginx-1.10.2-9.el7.1.src.rpm
x86_64:
rh-nginx110-nginx-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-debuginfo-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-image-filter-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-perl-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-xslt-filter-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-mail-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-stream-1.10.2-9.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7):
Source:
rh-nginx110-nginx-1.10.2-9.el7.1.src.rpm
x86_64:
rh-nginx110-nginx-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-debuginfo-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-image-filter-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-perl-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-xslt-filter-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-mail-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-stream-1.10.2-9.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-nginx110-nginx-1.10.2-9.el7.1.src.rpm
x86_64:
rh-nginx110-nginx-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-debuginfo-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-image-filter-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-perl-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-http-xslt-filter-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-mail-1.10.2-9.el7.1.x86_64.rpm
rh-nginx110-nginx-mod-stream-1.10.2-9.el7.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2019-9511
https://access.redhat.com/security/cve/CVE-2019-9513
https://access.redhat.com/security/cve/CVE-2019-9516
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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zH69
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
.
The purpose of this text-only errata is to inform you about the security
issues fixed in this release. Solution:
Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.
Installation instructions are available from the Fuse 7.6.0 product
documentation page:
https://access.redhat.com/documentation/en-us/red_hat_fuse/7.6/
4. Bugs fixed (https://bugzilla.redhat.com/):
1399546 - CVE-2015-9251 js-jquery: Cross-site scripting via cross-domain ajax requests
1432858 - CVE-2017-5929 logback: Serialization vulnerability in SocketServer and ServerSocketReceiver
1591854 - CVE-2017-16012 js-jquery: XSS in responses from cross-origin ajax requests
1618573 - CVE-2018-11771 apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip
1643043 - CVE-2018-15756 springframework: DoS Attack via Range Requests
1693777 - CVE-2019-3888 undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed
1703469 - CVE-2019-10174 infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods
1709860 - CVE-2019-5427 c3p0: loading XML configuration leads to denial of service
1713068 - CVE-2019-10184 undertow: Information leak in requests for directories without trailing slashes
1725795 - CVE-2019-12814 jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. Description:
This release adds the new Apache HTTP Server 2.4.37 packages that are part
of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Pack
Apache Server 2.4.29 and includes bug fixes and enhancements. Refer to the
Release Notes for information on the most significant bug fixes and
enhancements included in this release. After installing the updated
packages, the httpd daemon will be restarted automatically. 7) - noarch, x86_64
3. Description:
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version:
rh-nodejs10-nodejs (10.16.3)
| VAR-201908-0266 | CVE-2019-9516 | HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustion |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: MEDIUM |
Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory. Multiple HTTP/2 implementations are vulnerable to a variety of denial-of-service (DoS) attacks. HTTP/2 is the second version of the hypertext transfer protocol, which is mainly used to ensure the communication between the client and the server. A resource management error vulnerability exists in HTTP/2. A vulnerability in the HTTP/2 implementation of Nginx could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on a targeted system.
The vulnerability is due to improper parsing of zero length headers by the affected software that could lead to excessive CPU usage. An attacker could exploit this vulnerability by sending a request that
submits malicious input to an affected system. A successful exploit
could result in a DoS condition on the targeted system.
nginx.org has confirmed the vulnerability and released software updates. Description:
This release adds the new Apache HTTP Server 2.4.37 packages that are part
of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Pack
Apache Server 2.4.29 and includes bug fixes and enhancements. Refer to the
Release Notes for information on the most significant bug fixes and
enhancements included in this release. After installing the updated
packages, the httpd daemon will be restarted automatically. JIRA issues fixed (https://issues.jboss.org/):
JBCS-826 - Rebase nghttp2 to 1.39.2
7. 8) - aarch64, noarch, ppc64le, s390x, x86_64
3.
Bug Fix(es):
* Fixed repository mirror credentials properly escaped to allow special
characters
* Fixed repository mirror UI cancel button enabled
* Fixed repository mirror UI change next sync date
3. Solution:
Please download the release images via:
quay.io/redhat/quay:v3.1.1
quay.io/redhat/clair-jwt:v3.1.1
quay.io/redhat/quay-builder:v3.1.1
4. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: rh-nginx112-nginx security update
Advisory ID: RHSA-2019:2746-01
Product: Red Hat Software Collections
Advisory URL: https://access.redhat.com/errata/RHSA-2019:2746
Issue date: 2019-09-12
CVE Names: CVE-2019-9511 CVE-2019-9513 CVE-2019-9516
====================================================================
1. Summary:
An update for rh-nginx112-nginx is now available for Red Hat Software
Collections.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - aarch64, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4) - ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5) - ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7) - ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64
3. Description:
nginx is a web and proxy server supporting HTTP and other protocols, with a
focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* HTTP/2: large amount of data request leads to denial of service
(CVE-2019-9511)
* HTTP/2: flood using PRIORITY frames resulting in excessive resource
consumption (CVE-2019-9513)
* HTTP/2: 0-length headers leads to denial of service (CVE-2019-9516)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The rh-nginx112-nginx service must be restarted for this update to take
effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1735741 - CVE-2019-9513 HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption
1741860 - CVE-2019-9511 HTTP/2: large amount of data request leads to denial of service
1741864 - CVE-2019-9516 HTTP/2: 0-length headers leads to denial of service
6. Package List:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
rh-nginx112-nginx-1.12.1-3.el7.1.src.rpm
aarch64:
rh-nginx112-nginx-1.12.1-3.el7.1.aarch64.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.aarch64.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.aarch64.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.aarch64.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.aarch64.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.aarch64.rpm
ppc64le:
rh-nginx112-nginx-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.ppc64le.rpm
s390x:
rh-nginx112-nginx-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.s390x.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
rh-nginx112-nginx-1.12.1-3.el7.1.src.rpm
aarch64:
rh-nginx112-nginx-1.12.1-3.el7.1.aarch64.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.aarch64.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.aarch64.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.aarch64.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.aarch64.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.aarch64.rpm
ppc64le:
rh-nginx112-nginx-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.ppc64le.rpm
s390x:
rh-nginx112-nginx-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.s390x.rpm
x86_64:
rh-nginx112-nginx-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-perl-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4):
Source:
rh-nginx112-nginx-1.12.1-3.el7.1.src.rpm
ppc64le:
rh-nginx112-nginx-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.ppc64le.rpm
s390x:
rh-nginx112-nginx-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.s390x.rpm
x86_64:
rh-nginx112-nginx-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-perl-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5):
Source:
rh-nginx112-nginx-1.12.1-3.el7.1.src.rpm
ppc64le:
rh-nginx112-nginx-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.ppc64le.rpm
s390x:
rh-nginx112-nginx-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.s390x.rpm
x86_64:
rh-nginx112-nginx-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-perl-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):
Source:
rh-nginx112-nginx-1.12.1-3.el7.1.src.rpm
ppc64le:
rh-nginx112-nginx-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.ppc64le.rpm
s390x:
rh-nginx112-nginx-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.s390x.rpm
x86_64:
rh-nginx112-nginx-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-perl-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7):
Source:
rh-nginx112-nginx-1.12.1-3.el7.1.src.rpm
ppc64le:
rh-nginx112-nginx-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.ppc64le.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.ppc64le.rpm
s390x:
rh-nginx112-nginx-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.s390x.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.s390x.rpm
x86_64:
rh-nginx112-nginx-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-perl-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-nginx112-nginx-1.12.1-3.el7.1.src.rpm
x86_64:
rh-nginx112-nginx-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-debuginfo-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-image-filter-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-perl-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-http-xslt-filter-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-mail-1.12.1-3.el7.1.x86_64.rpm
rh-nginx112-nginx-mod-stream-1.12.1-3.el7.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2019-9511
https://access.redhat.com/security/cve/CVE-2019-9513
https://access.redhat.com/security/cve/CVE-2019-9516
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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PAtT
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. Description:
AMQ Broker is a high-performance messaging implementation based on ActiveMQ
Artemis. It uses an asynchronous journal for fast message persistence, and
supports multiple languages, protocols, and platforms. Solution:
Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.
The References section of this erratum contains a download link (you must
log in to download the update). 7) - noarch, x86_64
3. Description:
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version:
rh-nodejs10-nodejs (10.16.3)
| VAR-201908-0264 | CVE-2019-9514 | HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustion |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both. Multiple HTTP/2 implementations are vulnerable to a variety of denial-of-service (DoS) attacks. HTTP/2 is the second version of the hypertext transfer protocol, which is mainly used to ensure the communication between the client and the server. A resource management error vulnerability exists in HTTP/2. An attacker could exploit this vulnerability to cause a denial of service. it exists that Twisted incorrectly validated or sanitized certain
URIs or HTTP methods. A remote attacker could use this issue to inject
invalid characters and possibly perform header injection attacks.
(CVE-2019-12387). Red Hat A-MQ is a standards compliant
messaging system that is tailored for use in mission critical applications. It
includes bug fixes, which are documented in the patch notes accompanying
the package on the download page. See the download link given in the
references section below.
Installation instructions are located in the download section of the
customer portal.
The References section of this erratum contains a download link (you must
log in to download the update). Solution:
For OpenShift Container Platform 4.1 see the following documentation, which
will be updated shortly for release 4.1.21, for important instructions on
how to upgrade your cluster and fully apply this asynchronous errata
update:
https://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel
ease-notes.html
5. Description:
Red Hat Process Automation Manager is an open source business process
management suite that combines process management and decision service
management and enables business and IT users to create, manage, validate,
and deploy process applications and decision services.
It is recommended to halt the server by stopping the JBoss Application
Server process before installing this update; after installing the update,
restart the server by starting the JBoss Application Server process. Bugs fixed (https://bugzilla.redhat.com/):
1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth
1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth
1735745 - CVE-2019-9515 HTTP/2: flood using SETTINGS frames results in unbounded memory growth
1735749 - CVE-2019-9518 HTTP/2: flood using empty frames results in excessive resource consumption
1758619 - CVE-2019-16869 netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers
1767483 - CVE-2019-10086 apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
1793154 - CVE-2019-20330 jackson-databind: lacks certain net.sf.ehcache blocking
1796225 - CVE-2020-7238 netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
1796756 - CVE-2020-1718 keycloak: security issue on reset credential flow
1797006 - CVE-2019-12423 cxf: OpenId Connect token service does not properly validate the clientId
1797011 - CVE-2019-17573 cxf: reflected XSS in the services listing page
1798509 - CVE-2019-20445 netty: HttpObjectDecoder.java allows Content-Length header to accompanied by second Content-Length header
1798524 - CVE-2019-20444 netty: HTTP request smuggling
1801149 - CVE-2019-13990 libquartz: XXE attacks via job description
1815470 - CVE-2020-10673 jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
1815495 - CVE-2020-10672 jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
1816170 - CVE-2019-12406 cxf: does not restrict the number of message attachments
1816216 - CVE-2020-11612 netty: compression/decompression codecs don't enforce limits on buffer allocation sizes
1816330 - CVE-2020-8840 jackson-databind: Lacks certain xbean-reflect/JNDI blocking
1816332 - CVE-2020-9546 jackson-databind: Serialization gadgets in shaded-hikari-config
1816337 - CVE-2020-9547 jackson-databind: Serialization gadgets in ibatis-sqlmap
1816340 - CVE-2020-9548 jackson-databind: Serialization gadgets in anteros-core
1819208 - CVE-2020-10968 jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider
1819212 - CVE-2020-10969 jackson-databind: Serialization gadgets in javax.swing.JEditorPane
1821304 - CVE-2020-11111 jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory
1821311 - CVE-2020-11112 jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider
1821315 - CVE-2020-11113 jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
1826798 - CVE-2020-11620 jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
1826805 - CVE-2020-11619 jackson-databind: Serialization gadgets in org.springframework:spring-aop
1848960 - CVE-2020-14060 jackson-databind: serialization in oadd.org.apache.xalan.lib.sql.JNDIConnectionPool
1848962 - CVE-2020-14062 jackson-databind: serialization in com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool
1848966 - CVE-2020-14061 jackson-databind: serialization in weblogic/oracle-aqjms
5. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: rh-nodejs8-nodejs security update
Advisory ID: RHSA-2019:2955-01
Product: Red Hat Software Collections
Advisory URL: https://access.redhat.com/errata/RHSA-2019:2955
Issue date: 2019-10-02
CVE Names: CVE-2019-9511 CVE-2019-9512 CVE-2019-9513
CVE-2019-9514 CVE-2019-9515 CVE-2019-9516
CVE-2019-9517 CVE-2019-9518
====================================================================
1. Summary:
An update for rh-nodejs8-nodejs is now available for Red Hat Software
Collections.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5) - noarch, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - noarch, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7) - noarch, ppc64le, s390x, x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
3. Description:
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version:
rh-nodejs8-nodejs (8.16.1).
Security Fix(es):
* HTTP/2: large amount of data requests leads to denial of service
(CVE-2019-9511)
* HTTP/2: flood using PING frames results in unbounded memory growth
(CVE-2019-9512)
* HTTP/2: flood using PRIORITY frames results in excessive resource
consumption (CVE-2019-9513)
* HTTP/2: flood using HEADERS frames results in unbounded memory growth
(CVE-2019-9514)
* HTTP/2: flood using SETTINGS frames results in unbounded memory growth
(CVE-2019-9515)
* HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)
* HTTP/2: request for large response leads to denial of service
(CVE-2019-9517)
* HTTP/2: flood using empty frames results in excessive resource
consumption (CVE-2019-9518)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth
1735741 - CVE-2019-9513 HTTP/2: flood using PRIORITY frames results in excessive resource consumption
1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth
1735745 - CVE-2019-9515 HTTP/2: flood using SETTINGS frames results in unbounded memory growth
1735749 - CVE-2019-9518 HTTP/2: flood using empty frames results in excessive resource consumption
1741860 - CVE-2019-9511 HTTP/2: large amount of data requests leads to denial of service
1741864 - CVE-2019-9516 HTTP/2: 0-length headers lead to denial of service
1741868 - CVE-2019-9517 HTTP/2: request for large response leads to denial of service
6. Package List:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
rh-nodejs8-3.0-5.el7.src.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.src.rpm
aarch64:
rh-nodejs8-3.0-5.el7.aarch64.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.aarch64.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.aarch64.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.aarch64.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.aarch64.rpm
rh-nodejs8-runtime-3.0-5.el7.aarch64.rpm
rh-nodejs8-scldevel-3.0-5.el7.aarch64.rpm
noarch:
rh-nodejs8-nodejs-docs-8.16.1-2.el7.noarch.rpm
ppc64le:
rh-nodejs8-3.0-5.el7.ppc64le.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.ppc64le.rpm
rh-nodejs8-runtime-3.0-5.el7.ppc64le.rpm
rh-nodejs8-scldevel-3.0-5.el7.ppc64le.rpm
s390x:
rh-nodejs8-3.0-5.el7.s390x.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.s390x.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.s390x.rpm
rh-nodejs8-runtime-3.0-5.el7.s390x.rpm
rh-nodejs8-scldevel-3.0-5.el7.s390x.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source:
rh-nodejs8-3.0-5.el7.src.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.src.rpm
aarch64:
rh-nodejs8-3.0-5.el7.aarch64.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.aarch64.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.aarch64.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.aarch64.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.aarch64.rpm
rh-nodejs8-runtime-3.0-5.el7.aarch64.rpm
rh-nodejs8-scldevel-3.0-5.el7.aarch64.rpm
noarch:
rh-nodejs8-nodejs-docs-8.16.1-2.el7.noarch.rpm
ppc64le:
rh-nodejs8-3.0-5.el7.ppc64le.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.ppc64le.rpm
rh-nodejs8-runtime-3.0-5.el7.ppc64le.rpm
rh-nodejs8-scldevel-3.0-5.el7.ppc64le.rpm
s390x:
rh-nodejs8-3.0-5.el7.s390x.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.s390x.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.s390x.rpm
rh-nodejs8-runtime-3.0-5.el7.s390x.rpm
rh-nodejs8-scldevel-3.0-5.el7.s390x.rpm
x86_64:
rh-nodejs8-3.0-5.el7.x86_64.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.x86_64.rpm
rh-nodejs8-runtime-3.0-5.el7.x86_64.rpm
rh-nodejs8-scldevel-3.0-5.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5):
Source:
rh-nodejs8-3.0-5.el7.src.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.src.rpm
noarch:
rh-nodejs8-nodejs-docs-8.16.1-2.el7.noarch.rpm
ppc64le:
rh-nodejs8-3.0-5.el7.ppc64le.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.ppc64le.rpm
rh-nodejs8-runtime-3.0-5.el7.ppc64le.rpm
rh-nodejs8-scldevel-3.0-5.el7.ppc64le.rpm
s390x:
rh-nodejs8-3.0-5.el7.s390x.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.s390x.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.s390x.rpm
rh-nodejs8-runtime-3.0-5.el7.s390x.rpm
rh-nodejs8-scldevel-3.0-5.el7.s390x.rpm
x86_64:
rh-nodejs8-3.0-5.el7.x86_64.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.x86_64.rpm
rh-nodejs8-runtime-3.0-5.el7.x86_64.rpm
rh-nodejs8-scldevel-3.0-5.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):
Source:
rh-nodejs8-3.0-5.el7.src.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.src.rpm
noarch:
rh-nodejs8-nodejs-docs-8.16.1-2.el7.noarch.rpm
ppc64le:
rh-nodejs8-3.0-5.el7.ppc64le.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.ppc64le.rpm
rh-nodejs8-runtime-3.0-5.el7.ppc64le.rpm
rh-nodejs8-scldevel-3.0-5.el7.ppc64le.rpm
s390x:
rh-nodejs8-3.0-5.el7.s390x.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.s390x.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.s390x.rpm
rh-nodejs8-runtime-3.0-5.el7.s390x.rpm
rh-nodejs8-scldevel-3.0-5.el7.s390x.rpm
x86_64:
rh-nodejs8-3.0-5.el7.x86_64.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.x86_64.rpm
rh-nodejs8-runtime-3.0-5.el7.x86_64.rpm
rh-nodejs8-scldevel-3.0-5.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7):
Source:
rh-nodejs8-3.0-5.el7.src.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.src.rpm
noarch:
rh-nodejs8-nodejs-docs-8.16.1-2.el7.noarch.rpm
ppc64le:
rh-nodejs8-3.0-5.el7.ppc64le.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.ppc64le.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.ppc64le.rpm
rh-nodejs8-runtime-3.0-5.el7.ppc64le.rpm
rh-nodejs8-scldevel-3.0-5.el7.ppc64le.rpm
s390x:
rh-nodejs8-3.0-5.el7.s390x.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.s390x.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.s390x.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.s390x.rpm
rh-nodejs8-runtime-3.0-5.el7.s390x.rpm
rh-nodejs8-scldevel-3.0-5.el7.s390x.rpm
x86_64:
rh-nodejs8-3.0-5.el7.x86_64.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.x86_64.rpm
rh-nodejs8-runtime-3.0-5.el7.x86_64.rpm
rh-nodejs8-scldevel-3.0-5.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source:
rh-nodejs8-3.0-5.el7.src.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.src.rpm
noarch:
rh-nodejs8-nodejs-docs-8.16.1-2.el7.noarch.rpm
x86_64:
rh-nodejs8-3.0-5.el7.x86_64.rpm
rh-nodejs8-nodejs-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-debuginfo-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-nodejs-devel-8.16.1-2.el7.x86_64.rpm
rh-nodejs8-npm-6.4.1-8.16.1.2.el7.x86_64.rpm
rh-nodejs8-runtime-3.0-5.el7.x86_64.rpm
rh-nodejs8-scldevel-3.0-5.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2019-9511
https://access.redhat.com/security/cve/CVE-2019-9512
https://access.redhat.com/security/cve/CVE-2019-9513
https://access.redhat.com/security/cve/CVE-2019-9514
https://access.redhat.com/security/cve/CVE-2019-9515
https://access.redhat.com/security/cve/CVE-2019-9516
https://access.redhat.com/security/cve/CVE-2019-9517
https://access.redhat.com/security/cve/CVE-2019-9518
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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S8e1
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. Description:
The Container Network Interface (CNI) project consists of a specification
and libraries for writing plug-ins for configuring network interfaces in
Linux containers, along with a number of supported plug-ins. CNI concerns
itself only with network connectivity of containers and removing allocated
resources when the container is deleted. Description:
Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak
project, that provides authentication and standards-based single sign-on
capabilities for web and mobile applications. JIRA issues fixed (https://issues.jboss.org/):
KEYCLOAK-11792 - keycloak-spring-boot-2-adapter is missing from Red Hat maven and incremental client adapter zip
6. Description:
Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on the WildFly application runtime. See the Red Hat JBoss Enterprise
Application Platform 7.2.5 Release Notes for information about the most
significant bug fixes and enhancements included in this release. Solution:
Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications. JIRA issues fixed (https://issues.jboss.org/):
JBEAP-17075 - (7.2.z) Upgrade yasson from 1.0.2.redhat-00001 to 1.0.5
JBEAP-17220 - (7.2.x) HHH-13504 Upgrade ByteBuddy to 1.9.11
JBEAP-17365 - [GSS](7.2.z) Upgrade RESTEasy from 3.6.1.SP6 to 3.6.1.SP7
JBEAP-17476 - [GSS](7.2.z) Upgrade Generic JMS RA 2.0.2.Final
JBEAP-17478 - [GSS](7.2.z) Upgrade JBoss Remoting from 5.0.14.SP1 to 5.0.16.Final
JBEAP-17483 - [GSS](7.2.z) Upgrade Apache CXF from 3.2.9 to 3.2.10
JBEAP-17495 - (7.2.z) Upgrade PicketLink from 2.5.5.SP12-redhat-00007 to 2.5.5.SP12-redhat-00009
JBEAP-17496 - (7.2.z) Upgrade PicketLink bindings from 2.5.5.SP12-redhat-00007 to 2.5.5.SP12-redhat-00009
JBEAP-17513 - [GSS](7.2.z) Upgrade Hibernate ORM from 5.3.11.SP1 to 5.3.13
JBEAP-17521 - (7.2.z) Upgrade picketbox from 5.0.3.Final-redhat-00004 to 5.0.3.Final-redhat-00005
JBEAP-17523 - [GSS](7.2.z) Upgrade wildfly-core from 6.0.16 to 6.0.17
JBEAP-17547 - [GSS](7.2.z) Upgrade Elytron-Tool from 1.4.3 to 1.4.4.Final
JBEAP-17548 - [GSS](7.2.z) Upgrade Elytron from 1.6.4.Final-redhat-00001 to 1.6.5.Final-redhat-00001
JBEAP-17560 - [GSS](7.2.z) Upgrade HAL from 3.0.16 to 3.0.17
JBEAP-17579 - [GSS](7.2.z) Upgrade JBoss MSC from 1.4.8 to 1.4.11
JBEAP-17582 - [GSS](7.2.z) Upgrade JSF based on Mojarra 2.3.5.SP3-redhat-00002 to 2.3.5.SP3-redhat-00003
JBEAP-17604 - Tracker bug for the EAP 7.2.5 release for RHEL-7
JBEAP-17631 - [GSS](7.2.z) Upgrade Undertow from 2.0.25.SP1 to 2.0.26.SP3
JBEAP-17647 - [GSS](7.2.z) Upgrade IronJacamar from 1.4.17.Final to 1.4.18.Final
JBEAP-17665 - [GSS](7.2.z) Upgrade XNIO from 3.7.3.Final-redhat-00001 to 3.7.6.Final
JBEAP-17722 - [GSS](7.2.z) Upgrade wildfly-http-client from 1.0.15.Final-redhat-00001 to 1.0.17.Final
JBEAP-17874 - (7.2.z) Upgrade to wildfly-openssl 1.0.8
JBEAP-17880 - (7.2.z) Upgrade XNIO from 3.7.6.Final-redhat-00001 to 3.7.6.SP1
7.
The fixes are too intrusive to backport to the version in the oldstable
distribution (stretch). An upgrade to Debian stable (buster) is
recommended instead.
For the stable distribution (buster), these problems have been fixed in
version 8.0.2+ds-1+deb10u1.
We recommend that you upgrade your trafficserver packages.
For the detailed security status of trafficserver please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/trafficserver
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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UFIM
-----END PGP SIGNATURE-----
. 8) - aarch64, noarch, ppc64le, s390x, x86_64
3. Description:
The container-tools module contains tools for working with containers,
notably podman, buildah, skopeo, and runc. Each of these container images includes gRPC,
which has been updated with the below fixes
| VAR-201908-0422 | CVE-2019-9512 | HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustion |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both. Multiple HTTP/2 implementations are vulnerable to a variety of denial-of-service (DoS) attacks. HTTP/2 is the second version of the hypertext transfer protocol, which is mainly used to ensure the communication between the client and the server. A resource management error vulnerability exists in HTTP/2. An attacker could exploit this vulnerability to cause a denial of service. Description:
Skydive is an open source real-time network topology and protocols
analyzer. Bugs fixed (https://bugzilla.redhat.com/):
1649870 - CVE-2019-14820 keycloak: adapter endpoints are exposed via arbitrary URLs
1690628 - CVE-2019-3875 keycloak: missing signatures validation on CRL used to verify client certificates
1728609 - CVE-2019-10201 keycloak: SAML broker does not check existence of signature on document allowing any user impersonation
1729261 - CVE-2019-10199 keycloak: CSRF check missing in My Resources functionality in the Account Console
1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth
1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth
1735745 - CVE-2019-9515 HTTP/2: flood using SETTINGS frames results in unbounded memory growth
1738673 - CVE-2019-10219 hibernate-validator: safeHTML validator allows XSS
1741860 - CVE-2019-9511 HTTP/2: large amount of data requests leads to denial of service
1749487 - CVE-2019-14832 keycloak: cross-realm user access auth bypass
1751227 - CVE-2019-14838 wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default
1755831 - CVE-2019-16335 jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource
1755849 - CVE-2019-14540 jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig
1758167 - CVE-2019-17267 jackson-databind: Serialization gadgets in classes of the ehcache package
1758171 - CVE-2019-14892 jackson-databind: Serialization gadgets in classes of the commons-configuration package
1758182 - CVE-2019-14893 jackson-databind: Serialization gadgets in classes of the xalan package
1758187 - CVE-2019-16942 jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.*
1758191 - CVE-2019-16943 jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource
1764607 - CVE-2019-0210 thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol
1764612 - CVE-2019-0205 thrift: Endless loop when feed with specific input data
1764658 - CVE-2019-12400 xml-security: Apache Santuario potentially loads XML parsing code from an untrusted source
1767483 - CVE-2019-10086 apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default
1772008 - CVE-2019-14887 wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use
1772464 - CVE-2019-14888 undertow: possible Denial Of Service (DOS) in Undertow HTTP server listening on HTTPS
1775293 - CVE-2019-17531 jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.*
1793154 - CVE-2019-20330 jackson-databind: lacks certain net.sf.ehcache blocking
1796225 - CVE-2020-7238 netty: HTTP Request Smuggling due to Transfer-Encoding whitespace mishandling
1802444 - CVE-2020-1729 SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader
1815470 - CVE-2020-10673 jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
1815495 - CVE-2020-10672 jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
1816170 - CVE-2019-12406 cxf: does not restrict the number of message attachments
1816175 - CVE-2019-12419 cxf: OpenId Connect token service does not properly validate the clientId
1816330 - CVE-2020-8840 jackson-databind: Lacks certain xbean-reflect/JNDI blocking
1816332 - CVE-2020-9546 jackson-databind: Serialization gadgets in shaded-hikari-config
1816337 - CVE-2020-9547 jackson-databind: Serialization gadgets in ibatis-sqlmap
1816340 - CVE-2020-9548 jackson-databind: Serialization gadgets in anteros-core
1819208 - CVE-2020-10968 jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider
1819212 - CVE-2020-10969 jackson-databind: Serialization gadgets in javax.swing.JEditorPane
1821304 - CVE-2020-11111 jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory
1821311 - CVE-2020-11112 jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider
1821315 - CVE-2020-11113 jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
1826798 - CVE-2020-11620 jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
1826805 - CVE-2020-11619 jackson-databind: Serialization gadgets in org.springframework:spring-aop
5. Description:
Both the openshift and atomic-enterprise-service-catalog packages have been
rebuilt with updates versions of golang. The golang packages provide the Go
programming language compiler. Solution:
For OpenShift Container Platform 4.1 see the following documentation, which
will be updated shortly for release 4.1.14, for important instructions on
how to upgrade your cluster and fully apply this asynchronous errata
update:
https://docs.openshift.com/container-platform/4.1/release_notes/ocp-4-1-rel
ease-notes.html
Details on how to access this content are available at
https://docs.openshift.com/container-platform/4.1/updating/updating-cluster
- -cli.html. Description:
AMQ Broker is a high-performance messaging implementation based on ActiveMQ
Artemis. It uses an asynchronous journal for fast message persistence, and
supports multiple languages, protocols, and platforms. For further information, refer to the release notes linked to
in the References section.
The References section of this erratum contains a download link (you must
log in to download the update). -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: Red Hat JBoss Enterprise Application Platform 7.2.5 on RHEL 6 security update
Advisory ID: RHSA-2019:4018-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2019:4018
Issue date: 2019-11-26
CVE Names: CVE-2019-9511 CVE-2019-9512 CVE-2019-9514
CVE-2019-9515 CVE-2019-14838 CVE-2019-14843
====================================================================
1. Summary:
An update is now available for Red Hat JBoss Enterprise Application
Platform 7.2 for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat JBoss EAP 7.2 for RHEL 6 Server - noarch, x86_64
3. Description:
Red Hat JBoss Enterprise Application Platform 7 is a platform for Java
applications based on the WildFly application runtime.
This release of Red Hat JBoss Enterprise Application Platform 7.2.5 serves
as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.4,
and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise
Application Platform 7.2.5 Release Notes for information about the most
significant bug fixes and enhancements included in this release.
Security Fix(es):
* undertow: HTTP/2: large amount of data requests leads to denial of
service (CVE-2019-9511)
* undertow: HTTP/2: flood using PING frames results in unbounded memory
growth (CVE-2019-9512)
* undertow: HTTP/2: flood using HEADERS frames results in unbounded memory
growth (CVE-2019-9514)
* undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory
growth (CVE-2019-9515)
* wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and
'Deployer' user by default (CVE-2019-14838)
* wildfly: wildfly-security-manager: security manager authorization bypass
(CVE-2019-14843)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
4. Solution:
Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.
For details about how to apply this update, which includes the changes
described in this advisory, see:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth
1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth
1735745 - CVE-2019-9515 HTTP/2: flood using SETTINGS frames results in unbounded memory growth
1741860 - CVE-2019-9511 HTTP/2: large amount of data requests leads to denial of service
1751227 - CVE-2019-14838 wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default
1752980 - CVE-2019-14843 wildfly-security-manager: security manager authorization bypass
6. JIRA issues fixed (https://issues.jboss.org/):
JBEAP-17075 - (7.2.z) Upgrade yasson from 1.0.2.redhat-00001 to 1.0.5
JBEAP-17220 - (7.2.x) HHH-13504 Upgrade ByteBuddy to 1.9.11
JBEAP-17365 - [GSS](7.2.z) Upgrade RESTEasy from 3.6.1.SP6 to 3.6.1.SP7
JBEAP-17476 - [GSS](7.2.z) Upgrade Generic JMS RA 2.0.2.Final
JBEAP-17478 - [GSS](7.2.z) Upgrade JBoss Remoting from 5.0.14.SP1 to 5.0.16.Final
JBEAP-17483 - [GSS](7.2.z) Upgrade Apache CXF from 3.2.9 to 3.2.10
JBEAP-17495 - (7.2.z) Upgrade PicketLink from 2.5.5.SP12-redhat-00007 to 2.5.5.SP12-redhat-00009
JBEAP-17496 - (7.2.z) Upgrade PicketLink bindings from 2.5.5.SP12-redhat-00007 to 2.5.5.SP12-redhat-00009
JBEAP-17513 - [GSS](7.2.z) Upgrade Hibernate ORM from 5.3.11.SP1 to 5.3.13
JBEAP-17521 - (7.2.z) Upgrade picketbox from 5.0.3.Final-redhat-00004 to 5.0.3.Final-redhat-00005
JBEAP-17523 - [GSS](7.2.z) Upgrade wildfly-core from 6.0.16 to 6.0.17
JBEAP-17547 - [GSS](7.2.z) Upgrade Elytron-Tool from 1.4.3 to 1.4.4.Final
JBEAP-17548 - [GSS](7.2.z) Upgrade Elytron from 1.6.4.Final-redhat-00001 to 1.6.5.Final-redhat-00001
JBEAP-17560 - [GSS](7.2.z) Upgrade HAL from 3.0.16 to 3.0.17
JBEAP-17579 - [GSS](7.2.z) Upgrade JBoss MSC from 1.4.8 to 1.4.11
JBEAP-17582 - [GSS](7.2.z) Upgrade JSF based on Mojarra 2.3.5.SP3-redhat-00002 to 2.3.5.SP3-redhat-00003
JBEAP-17603 - Tracker bug for the EAP 7.2.5 release for RHEL-6
JBEAP-17631 - [GSS](7.2.z) Upgrade Undertow from 2.0.25.SP1 to 2.0.26.SP3
JBEAP-17647 - [GSS](7.2.z) Upgrade IronJacamar from 1.4.17.Final to 1.4.18.Final
JBEAP-17665 - [GSS](7.2.z) Upgrade XNIO from 3.7.3.Final-redhat-00001 to 3.7.6.Final
JBEAP-17722 - [GSS](7.2.z) Upgrade wildfly-http-client from 1.0.15.Final-redhat-00001 to 1.0.17.Final
JBEAP-17874 - (7.2.z) Upgrade to wildfly-openssl 1.0.8
JBEAP-17880 - (7.2.z) Upgrade XNIO from 3.7.6.Final-redhat-00001 to 3.7.6.SP1
7. Package List:
Red Hat JBoss EAP 7.2 for RHEL 6 Server:
Source:
eap7-apache-cxf-3.2.10-1.redhat_00001.1.el6eap.src.rpm
eap7-byte-buddy-1.9.11-1.redhat_00002.1.el6eap.src.rpm
eap7-glassfish-jsf-2.3.5-5.SP3_redhat_00003.1.el6eap.src.rpm
eap7-hal-console-3.0.17-2.Final_redhat_00001.1.el6eap.src.rpm
eap7-hibernate-5.3.13-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-ironjacamar-1.4.18-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jboss-genericjms-2.0.2-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jboss-msc-1.4.11-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-jboss-remoting-5.0.16-2.Final_redhat_00001.1.el6eap.src.rpm
eap7-jboss-server-migration-1.3.1-6.Final_redhat_00006.1.el6eap.src.rpm
eap7-jboss-xnio-base-3.7.6-2.SP1_redhat_00001.1.el6eap.src.rpm
eap7-picketbox-5.0.3-6.Final_redhat_00005.1.el6eap.src.rpm
eap7-picketlink-bindings-2.5.5-20.SP12_redhat_00009.1.el6eap.src.rpm
eap7-picketlink-federation-2.5.5-20.SP12_redhat_00009.1.el6eap.src.rpm
eap7-resteasy-3.6.1-7.SP7_redhat_00001.1.el6eap.src.rpm
eap7-undertow-2.0.26-2.SP3_redhat_00001.1.el6eap.src.rpm
eap7-wildfly-7.2.5-4.GA_redhat_00002.1.el6eap.src.rpm
eap7-wildfly-elytron-1.6.5-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-wildfly-elytron-tool-1.4.4-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-wildfly-http-client-1.0.17-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-wildfly-openssl-1.0.8-1.Final_redhat_00001.1.el6eap.src.rpm
eap7-wildfly-openssl-linux-x86_64-1.0.8-5.Final_redhat_00001.1.el6eap.src.rpm
eap7-yasson-1.0.5-1.redhat_00001.1.el6eap.src.rpm
noarch:
eap7-apache-cxf-3.2.10-1.redhat_00001.1.el6eap.noarch.rpm
eap7-apache-cxf-rt-3.2.10-1.redhat_00001.1.el6eap.noarch.rpm
eap7-apache-cxf-services-3.2.10-1.redhat_00001.1.el6eap.noarch.rpm
eap7-apache-cxf-tools-3.2.10-1.redhat_00001.1.el6eap.noarch.rpm
eap7-byte-buddy-1.9.11-1.redhat_00002.1.el6eap.noarch.rpm
eap7-glassfish-jsf-2.3.5-5.SP3_redhat_00003.1.el6eap.noarch.rpm
eap7-hal-console-3.0.17-2.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-5.3.13-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-core-5.3.13-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-entitymanager-5.3.13-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-envers-5.3.13-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-hibernate-java8-5.3.13-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-1.4.18-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-common-api-1.4.18-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-common-impl-1.4.18-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-common-spi-1.4.18-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-core-api-1.4.18-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-core-impl-1.4.18-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-deployers-common-1.4.18-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-jdbc-1.4.18-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-ironjacamar-validator-1.4.18-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-genericjms-2.0.2-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-msc-1.4.11-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-remoting-5.0.16-2.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-jboss-server-migration-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-cli-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-core-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap6.4-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.0-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.0-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.1-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.1-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-eap7.2-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.0-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.0-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.1-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly10.1-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly11.0-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly11.0-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly12.0-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly12.0-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly13.0-server-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly14.0-server-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly8.2-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly8.2-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly9.0-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-server-migration-wildfly9.0-to-eap7.2-1.3.1-6.Final_redhat_00006.1.el6eap.noarch.rpm
eap7-jboss-xnio-base-3.7.6-2.SP1_redhat_00001.1.el6eap.noarch.rpm
eap7-picketbox-5.0.3-6.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-picketbox-infinispan-5.0.3-6.Final_redhat_00005.1.el6eap.noarch.rpm
eap7-picketlink-api-2.5.5-20.SP12_redhat_00009.1.el6eap.noarch.rpm
eap7-picketlink-bindings-2.5.5-20.SP12_redhat_00009.1.el6eap.noarch.rpm
eap7-picketlink-common-2.5.5-20.SP12_redhat_00009.1.el6eap.noarch.rpm
eap7-picketlink-config-2.5.5-20.SP12_redhat_00009.1.el6eap.noarch.rpm
eap7-picketlink-federation-2.5.5-20.SP12_redhat_00009.1.el6eap.noarch.rpm
eap7-picketlink-idm-api-2.5.5-20.SP12_redhat_00009.1.el6eap.noarch.rpm
eap7-picketlink-idm-impl-2.5.5-20.SP12_redhat_00009.1.el6eap.noarch.rpm
eap7-picketlink-idm-simple-schema-2.5.5-20.SP12_redhat_00009.1.el6eap.noarch.rpm
eap7-picketlink-impl-2.5.5-20.SP12_redhat_00009.1.el6eap.noarch.rpm
eap7-picketlink-wildfly8-2.5.5-20.SP12_redhat_00009.1.el6eap.noarch.rpm
eap7-resteasy-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-atom-provider-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-cdi-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-client-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-client-microprofile-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-crypto-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-jackson-provider-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-jackson2-provider-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-jaxb-provider-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-jaxrs-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-jettison-provider-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-jose-jwt-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-jsapi-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-json-binding-provider-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-json-p-provider-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-multipart-provider-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-rxjava2-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-spring-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-validator-provider-11-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-resteasy-yaml-provider-3.6.1-7.SP7_redhat_00001.1.el6eap.noarch.rpm
eap7-undertow-2.0.26-2.SP3_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-7.2.5-4.GA_redhat_00002.1.el6eap.noarch.rpm
eap7-wildfly-elytron-1.6.5-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-elytron-tool-1.4.4-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-http-client-common-1.0.17-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-http-ejb-client-1.0.17-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-http-naming-client-1.0.17-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-http-transaction-client-1.0.17-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-javadocs-7.2.5-4.GA_redhat_00002.1.el6eap.noarch.rpm
eap7-wildfly-modules-7.2.5-4.GA_redhat_00002.1.el6eap.noarch.rpm
eap7-wildfly-openssl-1.0.8-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-wildfly-openssl-java-1.0.8-1.Final_redhat_00001.1.el6eap.noarch.rpm
eap7-yasson-1.0.5-1.redhat_00001.1.el6eap.noarch.rpm
x86_64:
eap7-wildfly-openssl-linux-x86_64-1.0.8-5.Final_redhat_00001.1.el6eap.x86_64.rpm
eap7-wildfly-openssl-linux-x86_64-debuginfo-1.0.8-5.Final_redhat_00001.1.el6eap.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
8. References:
https://access.redhat.com/security/cve/CVE-2019-9511
https://access.redhat.com/security/cve/CVE-2019-9512
https://access.redhat.com/security/cve/CVE-2019-9514
https://access.redhat.com/security/cve/CVE-2019-9515
https://access.redhat.com/security/cve/CVE-2019-14838
https://access.redhat.com/security/cve/CVE-2019-14843
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/
https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.2/html-single/installation_guide/
9. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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FRPz
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. Summary:
This is a security update for JBoss EAP Continuous Delivery 18.0.
You must restart the JBoss server process for the update to take effect. Description:
Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak
project, that provides authentication and standards-based single sign-on
capabilities for web and mobile applications. Solution:
Before applying this update, make sure all previously released errata
relevant to your system have been applied. JIRA issues fixed (https://issues.jboss.org/):
KEYCLOAK-11817 - Tracker bug for the RH-SSO 7.3.5 release for RHEL8
7. 8) - aarch64, noarch, ppc64le, s390x, x86_64
3. Description:
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version:
nodejs (10.16.3).
For the stable distribution (buster), these problems have been fixed in
version 1.11.6-1+deb10u1.
We recommend that you upgrade your golang-1.11 packages.
For the detailed security status of golang-1.11 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/golang-1.11
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl1ZlroACgkQEMKTtsN8
TjZChQ//Vz4y63s3LD3Vz7oJLjchohCR9kHInoJcLM09osvIwBvi5rl/MnsEPUpP
8aMsDt50fZk/YhWSWQsmMCIQT+5CtjUOVbYnThHY5Hy+TpfgwVfe4JHIui5SEqDt
7K0VH7lIgkAncQc+wFzZALwPC+FgkZWyUk/4RuVXybiO8RgB9NMIXANl8PRK47b0
GxKJDT/Q84lksxhrFV0ib34+IPbF3mKAkxwx0FR9COEDBxBxKSQshY+imjtFo2NG
YHgwXyGuR9zOcyR8ObTsYaXOPQj8Kd/XZCeWN97Ii6UHWrSG4PvhjQzJfeV/NmJc
+kUfM7jzvg8PcGptOLPgbMlMt+XDwNwmPQC54RNyIv36OiYquMZSss3TweL2NV3Y
z/1CqG0A4qx9/KqZcgEpIOTgeyUc7LHgO8WEWkS5QcozWxaWC9/RoJZQ8spG5Ztd
leeDkzxkBSFoJJ3PBVRWGwzCMB7z6ePegw+/X4zdtBjQTb9TRMI0aj3MUyXOykrC
NkEj+QgAdZ8B9sIhke4gCEnvbsx5+L8lyVVZsVQ7yIgklXyMXwXqRKANtVAWVEU+
1367B1bGAxYfRWhE+HlAX6e6aKMyqRWi6/jb55MxOq3KTAljcIxSBZVBU+6Tpcd+
C5nG/4ox6oKlJMjOLt5/lWPiN2OVm0iJkyF154M9JjXKAz35gAk=5Pta
-----END PGP SIGNATURE-----
| VAR-201908-0924 | CVE-2019-14359 | BC Vault Information Disclosure Vulnerability |
CVSS V2: 2.1 CVSS V3: 2.4 Severity: LOW |
On BC Vault devices, a side channel for the row-based SSD1309 OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover a data value. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. NOTE: the vendor's position is that there is no security impact: the only potentially leaked information is the number of characters in the PIN. ** Unsettled ** This case has not been confirmed as a vulnerability. The vendor has disputed this vulnerability. For details, see NVD of Current Description Please Confirm. https://nvd.nist.gov/vuln/detail/CVE-2019-14359Information may be obtained. The vulnerability stems from errors in the configuration of the network system or product during operation. An unauthorized attacker can exploit the vulnerability to obtain sensitive information about the affected component
| VAR-201909-0069 | CVE-2019-6648 | F5 Container Ingress Service and Red Hat OpenShift Vulnerable to information disclosure from log files |
CVSS V2: 1.9 CVSS V3: 4.4 Severity: MEDIUM |
On version 1.9.0, If DEBUG logging is enable, F5 Container Ingress Service (CIS) for Kubernetes and Red Hat OpenShift (k8s-bigip-ctlr) log files may contain BIG-IP secrets such as SSL Private Keys and Private key Passphrases as provided as inputs by an AS3 Declaration. F5 Container Ingress Services is a product of the US company F5 that provides application services for container deployment. This product mainly provides functions such as Ingress control HTTP routing, load balancing and application delivery. An attacker could exploit this vulnerability to retrieve this information
| VAR-201908-2206 | No CVE | Command execution vulnerability exists in Xiamen Caimao's industrial 4G_3G wireless router |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
Xiamen Caimao Communication Technology Co., Ltd. is a high-tech enterprise focusing on 2G / 3G / 4G / 5G wireless communication and control.
A command execution vulnerability exists in the background of Xiamen Caimao's industrial-grade 4G_3G wireless router. Attackers can use this vulnerability to obtain server permissions.
| VAR-201908-0626 | CVE-2019-14935 | 3CX Phone Permissions vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
3CX Phone 15 on Windows has insecure permissions on the "%PROGRAMDATA%\3CXPhone for Windows\PhoneApp" installation directory, allowing Full Control access for Everyone, and leading to privilege escalation because of a StartUp link. 3CX Phone Contains a permission vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. 3CX Phone is a software-based dedicated branch switch. The product works with SIP-based IP phones, SIP trunks, and VoIP gateways to provide a complete communications solution. An attacker could exploit this vulnerability to increase privileges
| VAR-201908-0921 | CVE-2019-14354 | Ledger Nano S and Nano X device Vulnerable to information disclosure |
CVSS V2: 1.9 CVSS V3: 2.4 Severity: LOW |
On Ledger Nano S and Nano X devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. Unauthorized attackers can exploit the vulnerability to obtain sensitive information about affected components. This vulnerability stems from configuration errors in network systems or products during operation
| VAR-201908-0922 | CVE-2019-14355 | ShapeShift KeepKey Information Disclosure Vulnerability |
CVSS V2: 1.9 CVSS V3: 2.4 Severity: LOW |
On ShapeShift KeepKey devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover secret data shown on the display. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. NOTE: the vendor's position is that there is "insignificant risk. ** Unsettled ** This case has not been confirmed as a vulnerability. ShapeShift KeepKey The device contains an information disclosure vulnerability. The vendor has disputed this vulnerability. For details, see NVD of Current Description Please Confirm. https://nvd.nist.gov/vuln/detail/CVE-2019-14355Information may be obtained. This vulnerability stems from configuration errors in network systems or products during operation
| VAR-201908-0923 | CVE-2019-14357 | Mooltipass Mini Information Disclosure Vulnerability |
CVSS V2: 1.9 CVSS V3: 2.4 Severity: LOW |
On Mooltipass Mini devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. NOTE: the vendor's position is that an attack is not "realistically implementable. ** Unsettled ** This case has not been confirmed as a vulnerability. Mooltipass Mini The device contains an information disclosure vulnerability. The vendor has disputed this vulnerability. For details, see NVD of Current Description Please Confirm. https://nvd.nist.gov/vuln/detail/CVE-2019-14357Information may be obtained. The vulnerability stems from errors in the configuration of the network system or product during operation. An unauthorized attacker can exploit the vulnerability to obtain sensitive information about the affected component
| VAR-201908-2208 | No CVE | Dlink DIR-816 has a buffer overflow vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Dlink DIR-816 is a wireless router.
Dlink DIR-816 has a buffer overflow vulnerability. An attacker could use this vulnerability to execute arbitrary code, causing the service to crash.
| VAR-201908-2202 | No CVE | Dlink DIR-816 d_wl ***. Asp page has buffer overflow vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Dlink DIR-816 is a wireless router.
Dlink DIR-816 d_wl ***. Asp page has a buffer overflow vulnerability. An attacker could use this vulnerability to execute arbitrary code, causing the service to crash.
| VAR-201909-0068 | CVE-2019-6647 | plural BIG-IP Product resource exhaustion vulnerability |
CVSS V2: 4.3 CVSS V3: 5.3 Severity: MEDIUM |
On BIG-IP 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.2, 12.1.0-12.1.4.1, 11.5.2-11.6.4, when processing authentication attempts for control-plane users MCPD leaks a small amount of memory. Under rare conditions attackers with access to the management interface could eventually deplete memory on the system. plural BIG-IP The product contains a resource exhaustion vulnerability.Denial of service (DoS) May be in a state. F5 BIG-IP AFM, etc. are all products of F5 Company in the United States. F5 BIG-IP AFM is an advanced firewall product used to protect against DDos attacks. F5 BIG-IP Analytics is a suite of web application performance analysis software. F5 BIG-IP ASM, a web application firewall (WAF), has security vulnerabilities in several F5 products. An attacker can exploit this vulnerability to exhaust resources through continuous authentication and affect the operation of TMM and other components. The following products and versions are affected: F5 BIG-IP LTM Version 14.1.0, Version 14.0.0, Version 13.1.0 to Version 13.1.1, Version 12.1.0 to Version 12.1.4, Version 11.5.2 to Version 11.6.4 Version; BIG-IP AAM Version 14.1.0, Version 14.0.0, Version 13.1.0 to Version 13.1.1, Version 12.1.0 to Version 12.1.4, Version 11.5.2 to Version 11.6.4; BIG-IP AFM Version 14.1.0, Version 14.0.0, Version 13.1.0 to Version 13.1.1, Version 12.1.0 to Version 12.1.4, Version 11.5.2 to Version 11.6.4; BIG-IP Analytics Version 14.1.0, Version 14.0 .0, 13.1.0 to 13.1.1, 12.1.0 to 12.1.4, 11.5.2 to 11.6.4; BIG-IP APM 14.1.0, 14.0.0, 13.1. 0 to 13.1.1, 12.1.0 to 12.1.4, 11.5.2 to 11.6.4; BIG-IP ASM 14.1.0, 14.0.0, 13.1.0 to 13.1.1 Versions, 12.1.0 to 12.1.4, 11.5.2 to 11.6.4; BIG-IP DNS 14.1.0, 14.0.0, 13.1.0 to 13.1.1, 12.1.0 to version 12.1.4, version 11.5.2 to version 11.6.4; BIG-IP Edge Gateway version 14.1.0, version 14.0.0, version 13.1.0 to version 13.1.1, version 12.1.0 to 12.1
| VAR-201909-0133 | CVE-2019-6643 | BIG-IP Virtual server input validation vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
On versions 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.2, 12.1.0-12.1.4.1, and 11.5.2-11.6.4, an attacker sending specifically crafted DHCPv6 requests through a BIG-IP virtual server configured with a DHCPv6 profile may be able to cause the TMM process to produce a core file. BIG-IP Virtual server contains a vulnerability related to input validation.Service operation interruption (DoS) There is a possibility of being put into a state. F5 BIG-IP AFM, etc. are all products of F5 Company in the United States. F5 BIG-IP AFM is an advanced firewall product used to protect against DDos attacks. F5 BIG-IP Analytics is a suite of web application performance analysis software. F5 BIG-IP ASM, a web application firewall (WAF), has security vulnerabilities in several F5 products. An attacker could exploit this vulnerability with a specially crafted DHCPv6 request to cause a denial of service, or to cause a failover. The following products and versions are affected: F5 BIG-IP LTM Version 14.1.0, Version 14.0.0, Version 13.0.0 to Version 13.1.1, Version 12.1.0 to Version 12.1.4, Version 11.5.2 to Version 11.6.4 Version; BIG-IP AAM Release 14.1.0, Release 14.0.0, Release 13.0.0 to Release 13.1.1, Release 12.1.0 to Release 12.1.4, Release 11.5.2 to Release 11.6.4; BIG-IP AFM Version 14.1.0, Version 14.0.0, Version 13.0.0 to Version 13.1.1, Version 12.1.0 to Version 12.1.4, Version 11.5.2 to Version 11.6.4; BIG-IP Analytics Version 14.1.0, Version 14.0 .0, 13.0.0 to 13.1.1, 12.1.0 to 12.1.4, 11.5.2 to 11.6.4; BIG-IP APM 14.1.0, 14.0.0, 13.0. 0 to 13.1.1, 12.1.0 to 12.1.4, 11.5.2 to 11.6.4; BIG-IP ASM 14.1.0, 14.0.0, 13.0.0 to 13.1.1 Versions, 12.1.0 to 12.1.4, 11.5.2 to 11.6.4; BIG-IP DNS 14.1.0, 14.0.0, 13.0.0 to 13.1.1, 12.1.0 to version 12.1.4, version 11.5.2 to version 11.6.4; BIG-IP Edge Gateway version 14.1.0, version 14.0.0, version 13.0.0 to version 13.1.1, version 12.1.0 to 12.1
| VAR-201909-0134 | CVE-2019-6644 | plural BIG-IP Authorization vulnerabilities in products |
CVSS V2: 6.8 CVSS V3: 9.4 Severity: CRITICAL |
Similar to the issue identified in CVE-2018-12120, on versions 14.1.0-14.1.0.5, 14.0.0-14.0.0.4, 13.0.0-13.1.2, and 12.1.0-12.1.4 BIG-IP will bind a debug nodejs process to all interfaces when invoked. This may expose the process to unauthorized users if the plugin is left in debug mode and the port is accessible. plural BIG-IP The product contains an authorization vulnerability. This vulnerability CVE-2018-12120 Is the same vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. F5 BIG-IP AFM, etc. are all products of F5 Company in the United States. F5 BIG-IP AFM is an advanced firewall product used to protect against DDos attacks. F5 BIG-IP Analytics is a suite of web application performance analysis software. F5 BIG-IP ASM, a web application firewall (WAF), has security vulnerabilities in several F5 products. An attacker could exploit this vulnerability to execute code. The following products and versions are affected: F5 BIG-IP LTM Version 14.1.0, Version 14.0.0, Version 13.0.0 to Version 13.1.2, Version 12.1.3 to Version 12.1.4; BIG-IP AAM Version 14.1.0 , Version 14.0.0, Version 13.0.0 to Version 13.1.2, Version 12.1.3 to Version 12.1.4; BIG-IP AFM Version 14.1.0, Version 14.0.0, Version 13.0.0 to Version 13.1.2, 12.1.3 to 12.1.4; BIG-IP Analytics 14.1.0, 14.0.0, 13.0.0 to 13.1.2, 12.1.3 to 12.1.4; BIG-IP APM 14.1. 0, 14.0.0, 13.0.0 to 13.1.2, 12.1.3 to 12.1.4; BIG-IP ASM 14.1.0, 14.0.0, 13.0.0 to 13.1.2 Versions, 12.1.3 to 12.1.4; BIG-IP DNS 14.1.0, 14.0.0, 13.0.0 to 13.1.2, 12.1.3 to 12.1.4; BIG-IP Edge Gateway 14.1.0, 14.0.0, 13.0.0 to 13.1.2, 12.1.3 to 12.1.4; BIG-IP FPS 14.1.0, 14.0.0, 13.0.0 to Version 13.1.2, Version 12.1.3 to Version 12.1.4; BIG-IP GTM Version 14.1.0, Version 14.0.0, Version 13.0.0 to Version 13.1.2, Version 12.1.3 to Version 12.1
| VAR-201909-0067 | CVE-2019-6646 | BIG-IP and Enterprise Manager Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
On BIG-IP 11.5.2-11.6.4 and Enterprise Manager 3.1.1, REST users with guest privileges may be able to escalate their privileges and run commands with admin privileges. BIG-IP and Enterprise Manager Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. F5 BIG-IP AFM, etc. are all products of F5 Company in the United States. F5 BIG-IP AFM is an advanced firewall product used to protect against DDos attacks. F5 BIG-IP Analytics is a suite of web application performance analysis software. F5 BIG-IP ASM, a web application firewall (WAF), has security vulnerabilities in several F5 products. The following products and versions are affected: F5 BIG-IP LTM version 12.0.0, version 11.5.2 to 11.6.4; BIG-IP AAM version 12.0.0, version 11.5.2 to 11.6.4; BIG-IP AFM Version 12.0.0, version 11.5.2 to version 11.6.4; BIG-IP Analytics version 12.0.0, version 11.5.2 to version 11.6.4; BIG-IP APM version 12.0.0, version 11.5.2 to 11.6. 4 versions; BIG-IP ASM version 12.0.0, 11.5.2 through 11.6.4; BIG-IP DNS version 12.0.0, 11.5.2 through 11.6.4; BIG-IP Edge Gateway version 12.0.0 , version 11.5.2 to 11.6.4; BIG-IP FPS version 12.0.0, version 11.5.2 to 11.6.4; BIG-IP GTM version 12.0.0, version 11.5.2 to 11.6.4; BIG -IP Link Controller version 12.0.0, version 11.5.2 to 11.6.4; BIG-IP PEM version 12.0.0, version 11.5.2 to 11.6.4; BIG-IP WebAccelerator version 12.0.0, 11.5.2 Version to version 11.6.4; Enterprise Manager version 3.1.1
| VAR-201909-0066 | CVE-2019-6645 | plural BIG-IP Vulnerability related to input validation in products |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
On BIG-IP 14.0.0-14.1.0.5, 13.0.0-13.1.2, 12.1.0-12.1.4.1, 11.5.2-11.6.4, FTP traffic passing through a Virtual Server with both an active FTP profile associated and connection mirroring configured may lead to a TMM crash causing the configured HA action to be taken. plural BIG-IP The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state
| VAR-201908-0109 | CVE-2019-5399 | HPE 3PAR Service Processor Authorization vulnerability |
CVSS V2: 9.7 CVSS V3: 9.4 Severity: CRITICAL |
A remote gain authorized access vulnerability was discovered in HPE 3PAR Service Processor version(s): prior to 5.0.5.1. HPE 3PAR Service Processor Contains an authorization vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The HPE 3PAR Service Processor (SP) is a set of virtual service processors deployed by the HPE Corporation of the United States on the VMware vSphere hypervisor