-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat OpenShift Application Runtimes security and bug fix update
Advisory ID:       RHSA-2018:1786-01
Product:           Red Hat OpenShift Application Runtimes
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:1786
Issue date:        2018-06-04
CVE Names:         CVE-2018-7489 
====================================================================
1. Summary:

An update is now available for Red Hat OpenShift Application Runtimes.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat Openshift Application Runtimes provides an application platform
that reduces the complexity of developing and operating applications
(monoliths and microservices) for OpenShift as a containerized platform.

The RHOAR Eclipse Vert.x 3.5.1 release serves as a replacement for RHOAR
Eclipse Vert.x 3.4.2, and includes bug fixes and enhancements. For a
detailed list of issues resolved in the community Eclipse Vert.x 3.5.1
release, see the release notes in the References section.

Security Fix(es):

* jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe
serialization via c3p0 libraries (CVE-2018-7489)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

3. Solution:

Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (https://bugzilla.redhat.com/):

1549276 - CVE-2018-7489 jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries

5. JIRA issues fixed (https://issues.redhat.com/):

ENTVTX-155 - CVE-2018-7489 jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries [vertx-3.4.2]

6. References:

https://access.redhat.com/security/cve/CVE-2018-7489
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=catRhoar.eclipse.vertx&version=3.5.1

7. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBWxUfs9zjgjWX9erEAQgiUBAAjTx7dgqLTOawfGm+r1rZftfPY+IX7tHG
dy8M2emTiyKo8+zixguDg2O5NiC7lXtxDx1b0j7qACBAHmYYeKZdqOv9UPdMRrT6
f9SzH4RmhGedDaBhU/HV8TD+gqQJWJ12YxOax7oXg7J+GN4qXyIQQ7DG0wpAXHCG
KDzD2MZyVoB8gji8MFBEr7KFV/g13U5+WhNsXARJGu1XPcuCl5GMGBV3SVIJ69HS
SDT5Rb9QibHbTvbemlyU4ah9hAYj/c0oz6Dg8+8R5fLK/MeoqEVkZEtzE+ADW+MZ
a0BMkq7u/2QImV3TI1NwhHKSnWv2FvPPF6D2nT3mgpq+Y4EjO5up8q18veQSYE9c
xPdguFXcgQ9/DCKPYzMbvtldM9x5odChz2PTci9h/DPLn4OTbH2nrpILR+hR/SYa
TrDYho/oNW8evjb69R+pfTI13khnSkeUQScBBPxusclwew8wqcNfQ0YeuQoaWD3n
tmXc0TXLYWAijkcANVJZ6VB6HSR2WwviQN3jPLvZqGSN8zMdUnSk1CiFVNxaxc8r
NVJ8llTG8EuJwT9ojtLx6ONfn9ZLlSvGpKSrVEQjJljTutVW79HQUYDTVPO81PjM
XCB9oXObUnucC97/0Q2/3jaTpcemqM6pG8xQWTTaQJGYtGzGwhboilbY8wZdpTxR
vhv8weeVXwE=T0Yq
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2018-1786:01 Moderate: Red Hat OpenShift Application Runtimes

An update is now available for Red Hat OpenShift Application Runtimes

Summary

Red Hat Openshift Application Runtimes provides an application platform that reduces the complexity of developing and operating applications (monoliths and microservices) for OpenShift as a containerized platform.
The RHOAR Eclipse Vert.x 3.5.1 release serves as a replacement for RHOAR Eclipse Vert.x 3.4.2, and includes bug fixes and enhancements. For a detailed list of issues resolved in the community Eclipse Vert.x 3.5.1 release, see the release notes in the References section.
Security Fix(es):
* jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries (CVE-2018-7489)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.
The References section of this erratum contains a download link (you must log in to download the update).

References

https://access.redhat.com/security/cve/CVE-2018-7489 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=catRhoar.eclipse.vertx&version=3.5.1

Package List


Severity
Advisory ID: RHSA-2018:1786-01
Product: Red Hat OpenShift Application Runtimes
Advisory URL: https://access.redhat.com/errata/RHSA-2018:1786
Issued Date: : 2018-06-04
CVE Names: CVE-2018-7489

Topic

An update is now available for Red Hat OpenShift Application Runtimes.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

1549276 - CVE-2018-7489 jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries

5. JIRA issues fixed (https://issues.redhat.com/):

ENTVTX-155 - CVE-2018-7489 jackson-databind: incomplete fix for CVE-2017-7525 permits unsafe serialization via c3p0 libraries [vertx-3.4.2]


Related News