- Issued:
- 2020-03-05
- Updated:
- 2020-03-05
RHSA-2020:0727 - Security Advisory
Synopsis
Important: Red Hat Data Grid 7.3.3 security update
Type/Severity
Security Advisory: Important
Topic
An update for Red Hat Data Grid is now available.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Red Hat Data Grid is a distributed, in-memory, NoSQL datastore based on the Infinispan project.
This release of Red Hat Data Grid 7.3.3 serves as a replacement for Red Hat Data Grid 7.3.2 and includes bug fixes and enhancements, which are described in the Release Notes, linked to in the References section of this erratum.
Security Fix(es):
- HTTP/2: flood using PING frames results in unbounded memory growth (CVE-2019-9512)
- HTTP/2: flood using HEADERS frames results in unbounded memory growth (CVE-2019-9514)
- HTTP/2: flood using SETTINGS frames results in unbounded memory growth (CVE-2019-9515)
- HTTP/2: flood using empty frames results in excessive resource consumption (CVE-2019-9518)
- xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285) (CVE-2019-10173)
- infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods (CVE-2019-10174)
- jackson-databind: default typing mishandling leading to remote code execution (CVE-2019-14379)
- h2: Information Exposure due to insecure handling of permissions in the backup (CVE-2018-14335)
- wildfly: Race condition on PID file allows for termination of arbitrary processes by local users (CVE-2019-3805)
- undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed (CVE-2019-3888)
- undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files (CVE-2019-10212)
- undertow: Information leak in requests for directories without trailing slashes (CVE-2019-10184)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
To install this update, do the following:
1. Download the Data Grid 7.3.3 server patch from the customer portal.
2. Back up your existing Data Grid installation. You should back up databases, configuration files, and so on.
3. Install the Data Grid 7.3.3 server patch. Refer to the 7.3 Release Notes for patching instructions.
4. Restart Data Grid to ensure the changes take effect.
Affected Products
- Red Hat JBoss Data Grid Text-Only Advisories x86_64
Fixes
- BZ - 1610877 - CVE-2018-14335 h2: Information Exposure due to insecure handling of permissions in the backup
- BZ - 1660263 - CVE-2019-3805 wildfly: Race condition on PID file allows for termination of arbitrary processes by local users
- BZ - 1693777 - CVE-2019-3888 undertow: leak credentials to log files UndertowLogger.REQUEST_LOGGER.undertowRequestFailed
- BZ - 1703469 - CVE-2019-10174 infinispan: invokeAccessibly method from ReflectionUtil class allows to invoke private methods
- BZ - 1713068 - CVE-2019-10184 undertow: Information leak in requests for directories without trailing slashes
- BZ - 1722971 - CVE-2019-10173 xstream: remote code execution due to insecure XML deserialization (regression of CVE-2013-7285)
- BZ - 1731984 - CVE-2019-10212 undertow: DEBUG log for io.undertow.request.security if enabled leaks credentials to log files
- BZ - 1735645 - CVE-2019-9512 HTTP/2: flood using PING frames results in unbounded memory growth
- BZ - 1735744 - CVE-2019-9514 HTTP/2: flood using HEADERS frames results in unbounded memory growth
- BZ - 1735745 - CVE-2019-9515 HTTP/2: flood using SETTINGS frames results in unbounded memory growth
- BZ - 1735749 - CVE-2019-9518 HTTP/2: flood using empty frames results in excessive resource consumption
- BZ - 1737517 - CVE-2019-14379 jackson-databind: default typing mishandling leading to remote code execution
CVEs
References
- https://access.redhat.com/security/updates/classification/#important
- https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.grid&downloadType=patches&version=7.3
- https://access.redhat.com/documentation/en-us/red_hat_data_grid/7.3/html-single/red_hat_data_grid_7.3_release_notes/index
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.