First published: Thu May 30 2019(Updated: )
Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.<br>This release adds the new Apache HTTP Server 2.4.29 Service Pack 2 packages that are part of the JBoss Core Services offering. It serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP1, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.<br>Security Fix(es):<br><li> openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732)</li> <li> openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495)</li> <li> httpd: privilege escalation from modules scripts (CVE-2019-0211)</li> Details around this issue, including information about the CVE, severity of the issue, and CVSS scores can be found on the CVE pages listed in the References section below.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2019:1296 is considered moderate.
To fix RHSA-2019:1296, you should apply the latest updates provided for Red Hat JBoss Core Services.
RHSA-2019:1296 affects Red Hat JBoss Middleware products utilizing JBoss Core Services.
RHSA-2019:1296 addresses several security issues that could potentially allow an attacker to exploit the underlying system.
RHSA-2019:1296 is applicable to users of Red Hat JBoss Core Services and connected middleware solutions.