First published: Mon Sep 30 2019(Updated: )
This release of Red Hat JBoss Enterprise Application Platform 7.2.4 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.3, and includes bug fixes and enhancements. Refer to the Red Hat JBoss Enterprise Application Platform 7.2.4 Release Notes for information on the most significant bug fixes and enhancements included in this release.<br>Security Fix(es):<br><li> jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)</li> <li> jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)</li> <li> jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message (CVE-2019-12814)</li> <li> undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files (CVE-2019-10212)</li> <li> codehaus: incomplete fix for unsafe deserialization in jackson-databind vulnerabilities (CVE-2019-10202)</li> <li> jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server (CVE-2019-12086)</li> <li> undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | =7.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
RHSA-2019:2938 is classified as a moderate severity vulnerability.
To fix RHSA-2019:2938, upgrade to Red Hat JBoss Enterprise Application Platform 7.2.4.
RHSA-2019:2938 affects Red Hat JBoss Enterprise Application Platform versions prior to 7.2.4.
RHSA-2019:2938 includes bug fixes and enhancements to improve the functionality of JBoss Enterprise Application Platform.
Yes, you should address RHSA-2019:2938 to ensure your JBoss Enterprise Application Platform is secure and up to date.