(RHSA-2020:0983) Important: Red Hat Fuse 7.6.0 security update

2020-03-26T19:40:22
ID RHSA-2020:0983
Type redhat
Reporter RedHat
Modified 2020-04-20T11:12:10

Description

This release of Red Hat Fuse 7.6.0 serves as a replacement for Red Hat Fuse 7.5, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.

Security Fix(es):

  • undertow: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)

  • golang: HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)

  • undertow: HTTP/2: flood using PRIORITY frames results in excessive resource consumption (CVE-2019-9513)

  • undertow: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)

  • golang: HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)

  • undertow: HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)

  • undertow: HTTP/2: 0-length headers lead to denial of service (CVE-2019-9516)

  • undertow: HTTP/2: request for large response leads to denial of service (CVE-2019-9517)

  • undertow: HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)

  • infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)

  • spring-security-core: mishandling of user passwords allows logging in with a password of NULL (CVE-2019-11272)

  • jackson-databind: failure to block the logback-core class from polymorphic deserialization leading to remote code execution (CVE-2019-12384)

  • jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)

  • xmlrpc: Deserialization of server-side exception from faultCause in XMLRPC error response (CVE-2019-17570)

  • js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)

  • logback: Serialization vulnerability in SocketServer and ServerSocketReceiver (CVE-2017-5929)

  • js-jquery: XSS in responses from cross-origin ajax requests (CVE-2017-16012)

  • apache-commons-compress: ZipArchiveInputStream.read() fails to identify correct EOF allowing for DoS via crafted zip (CVE-2018-11771)

  • spring-data-api: potential information disclosure through maliciously crafted example value in ExampleMatcher (CVE-2019-3802)

  • undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)

  • shiro: Cookie padding oracle vulnerability with default configuration (CVE-2019-12422)

  • jackson-databind: polymorphic typing issue allows attacker to read arbitrary local files on the server via crafted JSON message. (CVE-2019-12814)

  • jackson-databind: Polymorphic typing issue related to logback/JNDI (CVE-2019-14439)

  • springframework: DoS Attack via Range Requests (CVE-2018-15756)

  • c3p0: loading XML configuration leads to denial of service (CVE-2019-5427)

  • undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.