RHEL 8:Red Hat JBoss Enterprise Application Platform 8.0.3 安全更新(重要)(RHSA-2024:5479)

critical Nessus 插件 ID 205637

简介

远程 Red Hat 主机缺少一个或多个安全更新。

描述

远程 Redhat Enterprise Linux 8 主机上安装的程序包受到 RHSA-2024:5479 公告中提及的多个漏洞的影响。

Red Hat JBoss Enterprise Application Platform 8 是基于 WildFly 应用程序运行时的 Java 应用程序平台。此 Red Hat JBoss Enterprise Application Platform 8.0.3 版本可替换 Red Hat JBoss Enterprise Application Platform 8.0.2,并包含缺陷修复和多项增强。请参阅 Red Hat JBoss Enterprise Application Platform 8.0.3 版本说明以获取有关此版本最重要的缺陷修复和增强功能信息。

安全修复:

* cxf-core:使用 Aegis 数据绑定 [eap-8.0.z] 的 Apache CXF SSRF 漏洞 (CVE-2024-28752)

* org.bouncycastle-bcprov-jdk18on:BouncyCastle 容易受到 Bleichenbacher 时序变体的影响(Marvin 攻击)[eap-8.0.z] (CVE-2024-30171)

* netty-codec-http:无限制或节流的资源分配 [eap-8.0.z] (CVE-2024-29025)

* org.bouncycastle:bcprov-jdk18on:ScalarUtil 类的 ED25519 验证中存在无限循环 [eap-8.0.z] (CVE-2024-30172)

* org.bouncycastle:bcprov-jdk18on:org.bouncycastle:导入含有构建的 F2m 参数的 EC 证书可能导致拒绝服务 [eap-8.0.z] (CVE-2024-29857)

有关上述安全问题的更多详细信息,包括其影响、CVSS 得分、致谢,以及其他相关信息,请参阅列于“参考”部分的 CVE 页面。

Tenable 已直接从 Red Hat Enterprise Linux 安全公告中提取上述描述块。

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

更新受影响的程序包。

另见

https://access.redhat.com/security/updates/classification/#important

http://www.nessus.org/u?919aa761

http://www.nessus.org/u?af7e7991

https://bugzilla.redhat.com/show_bug.cgi?id=2270732

https://bugzilla.redhat.com/show_bug.cgi?id=2272907

https://bugzilla.redhat.com/show_bug.cgi?id=2276360

https://bugzilla.redhat.com/show_bug.cgi?id=2293025

https://bugzilla.redhat.com/show_bug.cgi?id=2293028

https://issues.redhat.com/browse/JBEAP-25224

https://issues.redhat.com/browse/JBEAP-26018

https://issues.redhat.com/browse/JBEAP-26696

https://issues.redhat.com/browse/JBEAP-26790

https://issues.redhat.com/browse/JBEAP-26791

https://issues.redhat.com/browse/JBEAP-26792

https://issues.redhat.com/browse/JBEAP-26802

https://issues.redhat.com/browse/JBEAP-26816

https://issues.redhat.com/browse/JBEAP-26823

https://issues.redhat.com/browse/JBEAP-26843

https://issues.redhat.com/browse/JBEAP-26886

https://issues.redhat.com/browse/JBEAP-26932

https://issues.redhat.com/browse/JBEAP-26948

https://issues.redhat.com/browse/JBEAP-26961

https://issues.redhat.com/browse/JBEAP-26962

https://issues.redhat.com/browse/JBEAP-26966

https://issues.redhat.com/browse/JBEAP-26986

https://issues.redhat.com/browse/JBEAP-27002

https://issues.redhat.com/browse/JBEAP-27019

https://issues.redhat.com/browse/JBEAP-27055

https://issues.redhat.com/browse/JBEAP-27090

https://issues.redhat.com/browse/JBEAP-27192

https://issues.redhat.com/browse/JBEAP-27194

https://issues.redhat.com/browse/JBEAP-27261

https://issues.redhat.com/browse/JBEAP-27262

https://issues.redhat.com/browse/JBEAP-27327

https://issues.redhat.com/browse/JBEAP-27356

https://access.redhat.com/errata/RHSA-2024:5479

插件详情

严重性: Critical

ID: 205637

文件名: redhat-RHSA-2024-5479.nasl

版本: 1.2

类型: local

代理: unix

发布时间: 2024/8/15

最近更新时间: 2024/11/7

支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

风险信息

VPR

风险因素: High

分数: 7.1

Vendor

Vendor Severity: Important

CVSS v2

风险因素: High

基本分数: 9.4

时间分数: 7

矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N

CVSS 分数来源: CVE-2024-28752

CVSS v3

风险因素: Critical

基本分数: 9.3

时间分数: 8.1

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

漏洞信息

CPE: p-cpe:/a:redhat:enterprise_linux:eap8-wsdl4j, p-cpe:/a:redhat:enterprise_linux:eap8-rngom, p-cpe:/a:redhat:enterprise_linux:eap8-bouncycastle, p-cpe:/a:redhat:enterprise_linux:eap8-netty-common, p-cpe:/a:redhat:enterprise_linux:eap8-cxf-xjc-ts, p-cpe:/a:redhat:enterprise_linux:eap8-netty-handler-proxy, p-cpe:/a:redhat:enterprise_linux:eap8-apache-cxf-tools, p-cpe:/a:redhat:enterprise_linux:eap8-guava-libraries, p-cpe:/a:redhat:enterprise_linux:eap8-apache-commons-beanutils, p-cpe:/a:redhat:enterprise_linux:eap8-netty-transport-classes-epoll, p-cpe:/a:redhat:enterprise_linux:eap8-jaxb, p-cpe:/a:redhat:enterprise_linux:eap8-netty-codec, p-cpe:/a:redhat:enterprise_linux:eap8-netty-buffer, p-cpe:/a:redhat:enterprise_linux:eap8-cxf-xjc-boolean, p-cpe:/a:redhat:enterprise_linux:eap8-apache-cxf, p-cpe:/a:redhat:enterprise_linux:eap8-bouncycastle-pkix, p-cpe:/a:redhat:enterprise_linux:eap8-guava, p-cpe:/a:redhat:enterprise_linux:eap8-cxf-xjc-dv, p-cpe:/a:redhat:enterprise_linux:eap8-netty-resolver-dns, p-cpe:/a:redhat:enterprise_linux:eap8-netty-codec-http, p-cpe:/a:redhat:enterprise_linux:eap8-cxf-xjc-runtime, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:eap8-codemodel, p-cpe:/a:redhat:enterprise_linux:eap8-apache-cxf-services, p-cpe:/a:redhat:enterprise_linux:eap8-netty-transport-native-unix-common, p-cpe:/a:redhat:enterprise_linux:eap8-jaxb-jxc, p-cpe:/a:redhat:enterprise_linux:eap8-netty-handler, p-cpe:/a:redhat:enterprise_linux:eap8-jboss-openjdk-orb, p-cpe:/a:redhat:enterprise_linux:eap8-jaxb-runtime, p-cpe:/a:redhat:enterprise_linux:eap8-bouncycastle-jmail, p-cpe:/a:redhat:enterprise_linux:eap8-apache-cxf-rt, p-cpe:/a:redhat:enterprise_linux:eap8-jaxb-xjc, p-cpe:/a:redhat:enterprise_linux:eap8-relaxng-datatype, p-cpe:/a:redhat:enterprise_linux:eap8-jaxb-core, p-cpe:/a:redhat:enterprise_linux:eap8-xsom, p-cpe:/a:redhat:enterprise_linux:eap8-netty-codec-dns, p-cpe:/a:redhat:enterprise_linux:eap8-bouncycastle-pg, p-cpe:/a:redhat:enterprise_linux:eap8-netty-resolver, p-cpe:/a:redhat:enterprise_linux:eap8-apache-cxf-xjc-utils, p-cpe:/a:redhat:enterprise_linux:eap8-bouncycastle-prov, p-cpe:/a:redhat:enterprise_linux:eap8-netty-codec-socks, p-cpe:/a:redhat:enterprise_linux:eap8-cxf-xjc-bug986, p-cpe:/a:redhat:enterprise_linux:eap8-txw2, p-cpe:/a:redhat:enterprise_linux:eap8-jakarta-servlet-api, p-cpe:/a:redhat:enterprise_linux:eap8-netty-transport, p-cpe:/a:redhat:enterprise_linux:eap8-netty, p-cpe:/a:redhat:enterprise_linux:eap8-bouncycastle-util

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

易利用性: No known exploits are available

补丁发布日期: 2024/8/15

漏洞发布日期: 2024/3/15

参考资料信息

CVE: CVE-2024-28752, CVE-2024-29025, CVE-2024-29857, CVE-2024-30171, CVE-2024-30172

CWE: 20, 208, 770, 835, 918

RHSA: 2024:5479