RLSA-2020:1644
Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update
Topic
An update is available for jackson-core, glassfish-jaxb-api, glassfish-fastinfoset, xalan-j2, xmlstreambuffer, jackson-annotations, jackson-databind, apache-commons-lang, jackson-module-jaxb-annotations, apache-commons-collections, javassist, python-nss, bea-stax, velocity, xml-commons-apis, resteasy, xsom, slf4j, jackson-jaxrs-providers, stax-ex, xerces-j2, jakarta-commons-httpclient, glassfish-jaxb, xml-commons-resolver, relaxngDatatype.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Description
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.
Security Fix(es):
* jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariConfig (CVE-2019-14540)
* jackson-databind: Serialization gadgets in com.zaxxer.hikari.HikariDataSource (CVE-2019-16335)
* jackson-databind: Serialization gadgets in org.apache.commons.dbcp.datasources.* (CVE-2019-16942)
* jackson-databind: Serialization gadgets in com.p6spy.engine.spy.P6DataSource (CVE-2019-16943)
* jackson-databind: Serialization gadgets in org.apache.log4j.receivers.db.* (CVE-2019-17531)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Rocky Linux 8.2 Release Notes linked from the References section.
Rocky Linux 8
SRPMs
- apache-commons-collections-0:3.2.2-10.module+el8.3.0+53+ea062990.src.rpm
- apache-commons-collections-0:3.2.2-10.module+el8.3.0+74+855e3f5d.src.rpm
- apache-commons-lang-0:2.6-21.module+el8.3.0+53+ea062990.src.rpm
- apache-commons-lang-0:2.6-21.module+el8.3.0+74+855e3f5d.src.rpm
- bea-stax-0:1.2.0-16.module+el8.3.0+53+ea062990.src.rpm
- glassfish-fastinfoset-0:1.2.13-9.module+el8.3.0+53+ea062990.src.rpm
- glassfish-jaxb-0:2.2.11-11.module+el8.3.0+53+ea062990.src.rpm
- glassfish-jaxb-api-0:2.2.12-8.module+el8.3.0+53+ea062990.src.rpm
- jackson-annotations-0:2.10.0-1.module+el8.3.0+53+ea062990.src.rpm
- jackson-core-0:2.10.0-1.module+el8.3.0+53+ea062990.src.rpm
- jackson-databind-0:2.10.0-1.module+el8.3.0+53+ea062990.src.rpm
- jackson-jaxrs-providers-0:2.9.9-1.module+el8.3.0+53+ea062990.src.rpm
- jackson-module-jaxb-annotations-0:2.7.6-4.module+el8.3.0+53+ea062990.src.rpm
- jakarta-commons-httpclient-1:3.1-28.module+el8.3.0+53+ea062990.src.rpm
- jakarta-commons-httpclient-1:3.1-28.module+el8.3.0+74+855e3f5d.src.rpm
- python-nss-0:1.0.1-10.module+el8.3.0+53+ea062990.src.rpm
- javassist-0:3.18.1-8.module+el8.3.0+53+ea062990.src.rpm
- javassist-0:3.18.1-8.module+el8.3.0+74+855e3f5d.src.rpm
- relaxngDatatype-0:2011.1-7.module+el8.3.0+53+ea062990.src.rpm
- resteasy-0:3.0.26-3.module+el8.3.0+53+ea062990.src.rpm
- slf4j-0:1.7.25-4.module+el8.5.0+697+f586bb30.src.rpm
- slf4j-0:1.7.25-4.module+el8.3.0+74+855e3f5d.src.rpm
- slf4j-0:1.7.25-4.module+el8.3.0+133+b8b54b58.src.rpm
- stax-ex-0:1.7.7-8.module+el8.3.0+53+ea062990.src.rpm
- velocity-0:1.7-24.module+el8.3.0+53+ea062990.src.rpm
- velocity-0:1.7-24.module+el8.3.0+74+855e3f5d.src.rpm
- xalan-j2-0:2.7.1-38.module+el8.3.0+53+ea062990.src.rpm
- xalan-j2-0:2.7.1-38.module+el8.3.0+74+855e3f5d.src.rpm
- xerces-j2-0:2.11.0-34.module+el8.3.0+53+ea062990.src.rpm
- xerces-j2-0:2.11.0-34.module+el8.3.0+74+855e3f5d.src.rpm
- xml-commons-apis-0:1.4.01-25.module+el8.5.0+697+f586bb30.src.rpm
- xml-commons-apis-0:1.4.01-25.module+el8.3.0+74+855e3f5d.src.rpm
- xml-commons-apis-0:1.4.01-25.module+el8.3.0+53+ea062990.src.rpm
- xml-commons-resolver-0:1.2-26.module+el8.3.0+53+ea062990.src.rpm
- xml-commons-resolver-0:1.2-26.module+el8.3.0+74+855e3f5d.src.rpm
- xmlstreambuffer-0:1.5.4-8.module+el8.3.0+53+ea062990.src.rpm
- xsom-0:0-19.20110809svn.module+el8.3.0+53+ea062990.src.rpm
RPMs
- apache-commons-collections-0:3.2.2-10.module+el8.3.0+53+ea062990.noarch.rpm
- apache-commons-collections-0:3.2.2-10.module+el8.3.0+74+855e3f5d.noarch.rpm
- apache-commons-lang-0:2.6-21.module+el8.3.0+53+ea062990.noarch.rpm
- apache-commons-lang-0:2.6-21.module+el8.3.0+74+855e3f5d.noarch.rpm
- bea-stax-api-0:1.2.0-16.module+el8.3.0+53+ea062990.noarch.rpm
- glassfish-fastinfoset-0:1.2.13-9.module+el8.3.0+53+ea062990.noarch.rpm
- glassfish-jaxb-api-0:2.2.12-8.module+el8.3.0+53+ea062990.noarch.rpm
- glassfish-jaxb-core-0:2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
- glassfish-jaxb-runtime-0:2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
- glassfish-jaxb-txw2-0:2.2.11-11.module+el8.3.0+53+ea062990.noarch.rpm
- jackson-annotations-0:2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
- jackson-core-0:2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
- jackson-databind-0:2.10.0-1.module+el8.3.0+53+ea062990.noarch.rpm
- jackson-jaxrs-json-provider-0:2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm
- jackson-jaxrs-providers-0:2.9.9-1.module+el8.3.0+53+ea062990.noarch.rpm
- jackson-module-jaxb-annotations-0:2.7.6-4.module+el8.3.0+53+ea062990.noarch.rpm
- jakarta-commons-httpclient-1:3.1-28.module+el8.3.0+53+ea062990.noarch.rpm
- jakarta-commons-httpclient-1:3.1-28.module+el8.3.0+74+855e3f5d.noarch.rpm
- javassist-0:3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
- javassist-0:3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
- javassist-javadoc-0:3.18.1-8.module+el8.3.0+53+ea062990.noarch.rpm
- javassist-javadoc-0:3.18.1-8.module+el8.3.0+74+855e3f5d.noarch.rpm
- python3-nss-0:1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm
- python3-nss-0:1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
- python3-nss-debuginfo-0:1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm
- python3-nss-debuginfo-0:1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
- python-nss-debugsource-0:1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm
- python-nss-debugsource-0:1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
- python-nss-doc-0:1.0.1-10.module+el8.3.0+53+ea062990.aarch64.rpm
- python-nss-doc-0:1.0.1-10.module+el8.3.0+53+ea062990.x86_64.rpm
- relaxngDatatype-0:2011.1-7.module+el8.3.0+53+ea062990.noarch.rpm
- resteasy-0:3.0.26-3.module+el8.3.0+53+ea062990.noarch.rpm
- slf4j-0:1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
- slf4j-0:1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
- slf4j-0:1.7.25-4.module+el8.3.0+133+b8b54b58.noarch.rpm
- slf4j-jdk14-0:1.7.25-4.module+el8.5.0+697+f586bb30.noarch.rpm
- slf4j-jdk14-0:1.7.25-4.module+el8.3.0+74+855e3f5d.noarch.rpm
- slf4j-jdk14-0:1.7.25-4.module+el8.3.0+53+ea062990.noarch.rpm
- stax-ex-0:1.7.7-8.module+el8.3.0+53+ea062990.noarch.rpm
- velocity-0:1.7-24.module+el8.3.0+53+ea062990.noarch.rpm
- velocity-0:1.7-24.module+el8.3.0+74+855e3f5d.noarch.rpm
- xalan-j2-0:2.7.1-38.module+el8.3.0+53+ea062990.noarch.rpm
- xalan-j2-0:2.7.1-38.module+el8.3.0+74+855e3f5d.noarch.rpm
- xerces-j2-0:2.11.0-34.module+el8.3.0+53+ea062990.noarch.rpm
- xerces-j2-0:2.11.0-34.module+el8.3.0+74+855e3f5d.noarch.rpm
- xml-commons-apis-0:1.4.01-25.module+el8.5.0+697+f586bb30.noarch.rpm
- xml-commons-apis-0:1.4.01-25.module+el8.3.0+74+855e3f5d.noarch.rpm
- xml-commons-apis-0:1.4.01-25.module+el8.3.0+53+ea062990.noarch.rpm
- xml-commons-resolver-0:1.2-26.module+el8.3.0+53+ea062990.noarch.rpm
- xml-commons-resolver-0:1.2-26.module+el8.3.0+74+855e3f5d.noarch.rpm
- xmlstreambuffer-0:1.5.4-8.module+el8.3.0+53+ea062990.noarch.rpm
- xsom-0:0-19.20110809svn.module+el8.3.0+53+ea062990.noarch.rpm
Issued: 4/28/2020
Type: Security
Severity: Moderate
Affected Product
- Rocky Linux 8
Fixes
- Red Hat - 1535313
- Red Hat - 1655438
- Red Hat - 1656786
- Red Hat - 1698084
- Red Hat - 1744095
- Red Hat - 1755831
- Red Hat - 1755849
- Red Hat - 1758187
- Red Hat - 1758191
- Red Hat - 1767125
- Red Hat - 1767131
- Red Hat - 1775293
- Red Hat - 1777032
- Red Hat - 1782486
- Red Hat - 1795215
- Red Hat - 1802006
- Red Hat - 1806840
- Red Hat - 1807371
- Red Hat - 1807421
- Red Hat - 1809210
CVEs
- CVE-2019-14540 (Source: MITRE)
- CVE-2019-16335 (Source: MITRE)
- CVE-2019-16942 (Source: MITRE)
- CVE-2019-16943 (Source: MITRE)
- CVE-2019-17531 (Source: MITRE)
- CVE-2019-20330 (Source: MITRE)
- CVE-2020-10672 (Source: MITRE)
- CVE-2020-10673 (Source: MITRE)
- CVE-2020-8840 (Source: MITRE)
- CVE-2020-9546 (Source: MITRE)
- CVE-2020-9547 (Source: MITRE)
- CVE-2020-9548 (Source: MITRE)
References
- No references