First published: Fri Sep 23 2016(Updated: )
Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint, flexible, open source enterprise service bus and integration platform. Red Hat JBoss A-MQ, based on Apache ActiveMQ, is a standards compliant messaging system that is tailored for use in mission critical applications.<br>This patch is an update to Red Hat JBoss Fuse 6.2.1 and Red Hat JBoss A-MQ 6.2.1. It includes several bug fixes, which are documented in the readme.txt file included with the patch files.<br>Security Fix(es):<br><li> It was found that the fix for CVE-2012-6153 was incomplete: the code</li> added to check that the server hostname matches the domain name in a<br>subject's Common Name (CN) field in X.509 certificates was flawed. A<br>man-in-the-middle attacker could use this flaw to spoof an SSL server using<br>a specially crafted X.509 certificate. (CVE-2014-3577)<br>Refer to the readme.txt file included with the patch files for installation instructions.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Fuse | ||
Red Hat JBoss Fuse/A-MQ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2016:1931 is classified as important.
To fix RHSA-2016:1931, you should apply the recommended patches for Red Hat JBoss Fuse and Red Hat JBoss A-MQ.
RHSA-2016:1931 affects specific versions of Red Hat JBoss Fuse and Red Hat JBoss A-MQ, which should be reviewed in your environment.
No specific workaround is documented for RHSA-2016:1931; patching is recommended to address the vulnerability.
More information about RHSA-2016:1931 can be found in the official Red Hat advisories and security updates.