-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.2038
       Red Hat JBoss Core Services Apache HTTP Server 2.4.29 RHEL 7
                              security update
                               13 July 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Red Hat JBoss Core Services Apache HTTP Server
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 7
                   Red Hat Enterprise Linux Server 6
                   Red Hat
Impact/Access:     Access Privileged Data -- Remote/Unauthenticated
                   Denial of Service      -- Remote/Unauthenticated
                   Reduced Security       -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-3738 CVE-2017-3737 CVE-2017-3736
                   CVE-2017-3732 CVE-2017-3731 CVE-2016-7055
                   CVE-2016-6306 CVE-2016-6302 CVE-2016-2182

Reference:         ESB-2017.2822
                   ESB-2016.2238

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2018:2185
   https://access.redhat.com/errata/RHSA-2018:2186
   https://access.redhat.com/errata/RHSA-2018:2187

Comment: This bulletin contains three (3) Red Hat security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat JBoss Core Services Apache HTTP Server 2.4.29  RHEL 7 security update
Advisory ID:       RHSA-2018:2185-01
Product:           Red Hat JBoss Core Services
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:2185
Issue date:        2018-07-12
CVE Names:         CVE-2016-2182 CVE-2016-6302 CVE-2016-6306 
                   CVE-2016-7055 CVE-2017-3731 CVE-2017-3732 
                   CVE-2017-3736 CVE-2017-3737 CVE-2017-3738 
=====================================================================

1. Summary:

Red Hat JBoss Core Services Pack Apache Server 2.4.29 packages are now
available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this release as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss Core Services on RHEL 7 Server - noarch, ppc64, x86_64

3. Description:

This release adds the new Apache HTTP Server 2.4.29 packages that are part
of the JBoss Core Services offering.

This release serves as a replacement for Red Hat JBoss Core Services
Apache HTTP Server 2.4.23, and includes bug fixes and enhancements. Refer
to the Release Notes for information on the most significant bug fixes,
enhancements and component upgrades included in this release.

This release upgrades OpenSSL to version 1.0.2.n

Security Fix(es):

*  openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()
(CVE-2016-2182)

*  openssl: Insufficient TLS session ticket HMAC length checks
(CVE-2016-6302)

*  openssl: certificate message OOB reads (CVE-2016-6306)

*  openssl: Carry propagating bug in Montgomery multiplication
(CVE-2016-7055)

*  openssl: Truncated packet could crash via OOB read (CVE-2017-3731)

*  openssl: BN_mod_exp may produce incorrect results on x86_64
(CVE-2017-3732)

*  openssl: bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)

*  openssl: Read/write after SSL object in error state (CVE-2017-3737)

*  openssl: rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)

Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6306
and CVE-2016-7055. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360
Inc.) as the original reporter of CVE-2016-6306.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1367340 - CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()
1369855 - CVE-2016-6302 openssl: Insufficient TLS session ticket HMAC length checks
1377594 - CVE-2016-6306 openssl: certificate message OOB reads
1393929 - CVE-2016-7055 openssl: Carry propagating bug in Montgomery multiplication
1416852 - CVE-2017-3731 openssl: Truncated packet could crash via OOB read
1416856 - CVE-2017-3732 openssl: BN_mod_exp may produce incorrect results on x86_64
1509169 - CVE-2017-3736 openssl: bn_sqrx8x_internal carry bug on x86_64
1523504 - CVE-2017-3737 openssl: Read/write after SSL object in error state
1523510 - CVE-2017-3738 openssl: rsaz_1024_mul_avx2 overflow bug on x86_64

6. JIRA issues fixed (https://issues.jboss.org/):

JBCS-373 - Errata for httpd 2.4.29 GA RHEL 7

7. Package List:

Red Hat JBoss Core Services on RHEL 7 Server:

Source:
jbcs-httpd24-apache-commons-daemon-1.1.0-1.redhat_2.1.jbcs.el7.src.rpm
jbcs-httpd24-apache-commons-daemon-jsvc-1.1.0-1.redhat_2.jbcs.el7.src.rpm
jbcs-httpd24-apr-1.6.3-14.jbcs.el7.src.rpm
jbcs-httpd24-apr-util-1.6.1-9.jbcs.el7.src.rpm
jbcs-httpd24-httpd-2.4.29-17.jbcs.el7.src.rpm
jbcs-httpd24-mod_auth_kerb-5.4-36.jbcs.el7.src.rpm
jbcs-httpd24-mod_bmx-0.9.6-17.GA.jbcs.el7.src.rpm
jbcs-httpd24-mod_cluster-native-1.3.8-1.Final_redhat_2.jbcs.el7.src.rpm
jbcs-httpd24-mod_jk-1.2.43-1.redhat_1.jbcs.el7.src.rpm
jbcs-httpd24-mod_rt-2.4.1-19.GA.jbcs.el7.src.rpm
jbcs-httpd24-mod_security-2.9.1-23.GA.jbcs.el7.src.rpm
jbcs-httpd24-nghttp2-1.29.0-8.jbcs.el7.src.rpm
jbcs-httpd24-openssl-1.0.2n-11.jbcs.el7.src.rpm

noarch:
jbcs-httpd24-apache-commons-daemon-1.1.0-1.redhat_2.1.jbcs.el7.noarch.rpm
jbcs-httpd24-httpd-manual-2.4.29-17.jbcs.el7.noarch.rpm

ppc64:
jbcs-httpd24-apache-commons-daemon-jsvc-1.1.0-1.redhat_2.jbcs.el7.ppc64.rpm
jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1.1.0-1.redhat_2.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-1.6.3-14.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-debuginfo-1.6.3-14.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-devel-1.6.3-14.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-debuginfo-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-devel-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-ldap-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-mysql-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-nss-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-odbc-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-openssl-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-pgsql-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-apr-util-sqlite-1.6.1-9.jbcs.el7.ppc64.rpm
jbcs-httpd24-httpd-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-httpd-debuginfo-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-httpd-devel-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-httpd-selinux-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-httpd-tools-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_auth_kerb-5.4-36.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_auth_kerb-debuginfo-5.4-36.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_bmx-0.9.6-17.GA.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_bmx-debuginfo-0.9.6-17.GA.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_cluster-native-1.3.8-1.Final_redhat_2.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_cluster-native-debuginfo-1.3.8-1.Final_redhat_2.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_jk-ap24-1.2.43-1.redhat_1.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_jk-debuginfo-1.2.43-1.redhat_1.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_jk-manual-1.2.43-1.redhat_1.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_ldap-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_proxy_html-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_rt-2.4.1-19.GA.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_rt-debuginfo-2.4.1-19.GA.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_security-2.9.1-23.GA.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_security-debuginfo-2.9.1-23.GA.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_session-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-mod_ssl-2.4.29-17.jbcs.el7.ppc64.rpm
jbcs-httpd24-nghttp2-1.29.0-8.jbcs.el7.ppc64.rpm
jbcs-httpd24-nghttp2-debuginfo-1.29.0-8.jbcs.el7.ppc64.rpm
jbcs-httpd24-nghttp2-devel-1.29.0-8.jbcs.el7.ppc64.rpm
jbcs-httpd24-openssl-1.0.2n-11.jbcs.el7.ppc64.rpm
jbcs-httpd24-openssl-debuginfo-1.0.2n-11.jbcs.el7.ppc64.rpm
jbcs-httpd24-openssl-devel-1.0.2n-11.jbcs.el7.ppc64.rpm
jbcs-httpd24-openssl-libs-1.0.2n-11.jbcs.el7.ppc64.rpm
jbcs-httpd24-openssl-perl-1.0.2n-11.jbcs.el7.ppc64.rpm
jbcs-httpd24-openssl-static-1.0.2n-11.jbcs.el7.ppc64.rpm

x86_64:
jbcs-httpd24-apache-commons-daemon-jsvc-1.1.0-1.redhat_2.jbcs.el7.x86_64.rpm
jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1.1.0-1.redhat_2.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-1.6.3-14.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-debuginfo-1.6.3-14.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-devel-1.6.3-14.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-debuginfo-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-devel-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-ldap-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-mysql-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-nss-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-odbc-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-openssl-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-pgsql-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-apr-util-sqlite-1.6.1-9.jbcs.el7.x86_64.rpm
jbcs-httpd24-httpd-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-httpd-debuginfo-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-httpd-devel-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-httpd-selinux-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-httpd-tools-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_auth_kerb-5.4-36.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_auth_kerb-debuginfo-5.4-36.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_bmx-0.9.6-17.GA.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_bmx-debuginfo-0.9.6-17.GA.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_cluster-native-1.3.8-1.Final_redhat_2.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_cluster-native-debuginfo-1.3.8-1.Final_redhat_2.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_jk-ap24-1.2.43-1.redhat_1.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_jk-debuginfo-1.2.43-1.redhat_1.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_jk-manual-1.2.43-1.redhat_1.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_ldap-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_proxy_html-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_rt-2.4.1-19.GA.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_rt-debuginfo-2.4.1-19.GA.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_security-2.9.1-23.GA.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_security-debuginfo-2.9.1-23.GA.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_session-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-mod_ssl-2.4.29-17.jbcs.el7.x86_64.rpm
jbcs-httpd24-nghttp2-1.29.0-8.jbcs.el7.x86_64.rpm
jbcs-httpd24-nghttp2-debuginfo-1.29.0-8.jbcs.el7.x86_64.rpm
jbcs-httpd24-nghttp2-devel-1.29.0-8.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-1.0.2n-11.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-debuginfo-1.0.2n-11.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-devel-1.0.2n-11.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-libs-1.0.2n-11.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-perl-1.0.2n-11.jbcs.el7.x86_64.rpm
jbcs-httpd24-openssl-static-1.0.2n-11.jbcs.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

8. References:

https://access.redhat.com/security/cve/CVE-2016-2182
https://access.redhat.com/security/cve/CVE-2016-6302
https://access.redhat.com/security/cve/CVE-2016-6306
https://access.redhat.com/security/cve/CVE-2016-7055
https://access.redhat.com/security/cve/CVE-2017-3731
https://access.redhat.com/security/cve/CVE-2017-3732
https://access.redhat.com/security/cve/CVE-2017-3736
https://access.redhat.com/security/cve/CVE-2017-3737
https://access.redhat.com/security/cve/CVE-2017-3738
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/

9. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=l2Ei
- -----END PGP SIGNATURE-----

- --------------------------------------------------------------------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 RHEL 6 security update
Advisory ID:       RHSA-2018:2186-01
Product:           Red Hat JBoss Core Services
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:2186
Issue date:        2018-07-12
CVE Names:         CVE-2016-2182 CVE-2016-6302 CVE-2016-6306 
                   CVE-2016-7055 CVE-2017-3731 CVE-2017-3732 
                   CVE-2017-3736 CVE-2017-3737 CVE-2017-3738 
=====================================================================

1. Summary:

Red Hat JBoss Core Services Pack Apache Server 2.4.29 packages are now
available for Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this release as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat JBoss Core Services on RHEL 6 Server - i386, noarch, x86_64

3. Description:

This release adds the new Apache HTTP Server 2.4.29 packages that are part
of the JBoss Core Services offering.

This release serves as a replacement for Red Hat JBoss Core Services
Apache HTTP Server 2.4.23, and includes bug fixes and enhancements. Refer
to the Release Notes for information on the most significant bug fixes,
enhancements and component upgrades included in this release.

This release upgrades OpenSSL to version 1.0.2.n

Security Fix(es):

*  openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()
(CVE-2016-2182)

*  openssl: Insufficient TLS session ticket HMAC length checks
(CVE-2016-6302)

*  openssl: certificate message OOB reads (CVE-2016-6306)

*  openssl: Carry propagating bug in Montgomery multiplication
(CVE-2016-7055)

*  openssl: Truncated packet could crash via OOB read (CVE-2017-3731)

*  openssl: BN_mod_exp may produce incorrect results on x86_64
(CVE-2017-3732)

*  openssl: bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)

*  openssl: Read/write after SSL object in error state (CVE-2017-3737)

*  openssl: rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)

Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6306
and CVE-2016-7055. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360
Inc.) as the original reporter of CVE-2016-6306.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1367340 - CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()
1369855 - CVE-2016-6302 openssl: Insufficient TLS session ticket HMAC length checks
1377594 - CVE-2016-6306 openssl: certificate message OOB reads
1393929 - CVE-2016-7055 openssl: Carry propagating bug in Montgomery multiplication
1416852 - CVE-2017-3731 openssl: Truncated packet could crash via OOB read
1416856 - CVE-2017-3732 openssl: BN_mod_exp may produce incorrect results on x86_64
1509169 - CVE-2017-3736 openssl: bn_sqrx8x_internal carry bug on x86_64
1523504 - CVE-2017-3737 openssl: Read/write after SSL object in error state
1523510 - CVE-2017-3738 openssl: rsaz_1024_mul_avx2 overflow bug on x86_64

6. JIRA issues fixed (https://issues.jboss.org/):

JBCS-372 - Errata for httpd 2.4.29 GA RHEL 6

7. Package List:

Red Hat JBoss Core Services on RHEL 6 Server:

Source:
jbcs-httpd24-apache-commons-daemon-1.1.0-1.redhat_2.1.jbcs.el6.src.rpm
jbcs-httpd24-apache-commons-daemon-jsvc-1.1.0-1.redhat_2.jbcs.el6.src.rpm
jbcs-httpd24-apr-1.6.3-14.jbcs.el6.src.rpm
jbcs-httpd24-apr-util-1.6.1-9.jbcs.el6.src.rpm
jbcs-httpd24-httpd-2.4.29-17.jbcs.el6.src.rpm
jbcs-httpd24-mod_auth_kerb-5.4-36.jbcs.el6.src.rpm
jbcs-httpd24-mod_bmx-0.9.6-17.GA.jbcs.el6.src.rpm
jbcs-httpd24-mod_cluster-native-1.3.8-1.Final_redhat_2.jbcs.el6.src.rpm
jbcs-httpd24-mod_jk-1.2.43-1.redhat_1.jbcs.el6.src.rpm
jbcs-httpd24-mod_rt-2.4.1-19.GA.jbcs.el6.src.rpm
jbcs-httpd24-mod_security-2.9.1-23.GA.jbcs.el6.src.rpm
jbcs-httpd24-nghttp2-1.29.0-8.jbcs.el6.src.rpm
jbcs-httpd24-openssl-1.0.2n-11.jbcs.el6.src.rpm

i386:
jbcs-httpd24-apache-commons-daemon-jsvc-1.1.0-1.redhat_2.jbcs.el6.i686.rpm
jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1.1.0-1.redhat_2.jbcs.el6.i686.rpm
jbcs-httpd24-apr-1.6.3-14.jbcs.el6.i686.rpm
jbcs-httpd24-apr-debuginfo-1.6.3-14.jbcs.el6.i686.rpm
jbcs-httpd24-apr-devel-1.6.3-14.jbcs.el6.i686.rpm
jbcs-httpd24-apr-util-1.6.1-9.jbcs.el6.i686.rpm
jbcs-httpd24-apr-util-debuginfo-1.6.1-9.jbcs.el6.i686.rpm
jbcs-httpd24-apr-util-devel-1.6.1-9.jbcs.el6.i686.rpm
jbcs-httpd24-apr-util-ldap-1.6.1-9.jbcs.el6.i686.rpm
jbcs-httpd24-apr-util-mysql-1.6.1-9.jbcs.el6.i686.rpm
jbcs-httpd24-apr-util-nss-1.6.1-9.jbcs.el6.i686.rpm
jbcs-httpd24-apr-util-odbc-1.6.1-9.jbcs.el6.i686.rpm
jbcs-httpd24-apr-util-openssl-1.6.1-9.jbcs.el6.i686.rpm
jbcs-httpd24-apr-util-pgsql-1.6.1-9.jbcs.el6.i686.rpm
jbcs-httpd24-apr-util-sqlite-1.6.1-9.jbcs.el6.i686.rpm
jbcs-httpd24-httpd-2.4.29-17.jbcs.el6.i686.rpm
jbcs-httpd24-httpd-debuginfo-2.4.29-17.jbcs.el6.i686.rpm
jbcs-httpd24-httpd-devel-2.4.29-17.jbcs.el6.i686.rpm
jbcs-httpd24-httpd-selinux-2.4.29-17.jbcs.el6.i686.rpm
jbcs-httpd24-httpd-tools-2.4.29-17.jbcs.el6.i686.rpm
jbcs-httpd24-mod_auth_kerb-5.4-36.jbcs.el6.i686.rpm
jbcs-httpd24-mod_auth_kerb-debuginfo-5.4-36.jbcs.el6.i686.rpm
jbcs-httpd24-mod_bmx-0.9.6-17.GA.jbcs.el6.i686.rpm
jbcs-httpd24-mod_bmx-debuginfo-0.9.6-17.GA.jbcs.el6.i686.rpm
jbcs-httpd24-mod_cluster-native-1.3.8-1.Final_redhat_2.jbcs.el6.i686.rpm
jbcs-httpd24-mod_cluster-native-debuginfo-1.3.8-1.Final_redhat_2.jbcs.el6.i686.rpm
jbcs-httpd24-mod_jk-ap24-1.2.43-1.redhat_1.jbcs.el6.i686.rpm
jbcs-httpd24-mod_jk-debuginfo-1.2.43-1.redhat_1.jbcs.el6.i686.rpm
jbcs-httpd24-mod_jk-manual-1.2.43-1.redhat_1.jbcs.el6.i686.rpm
jbcs-httpd24-mod_ldap-2.4.29-17.jbcs.el6.i686.rpm
jbcs-httpd24-mod_proxy_html-2.4.29-17.jbcs.el6.i686.rpm
jbcs-httpd24-mod_rt-2.4.1-19.GA.jbcs.el6.i686.rpm
jbcs-httpd24-mod_rt-debuginfo-2.4.1-19.GA.jbcs.el6.i686.rpm
jbcs-httpd24-mod_security-2.9.1-23.GA.jbcs.el6.i686.rpm
jbcs-httpd24-mod_security-debuginfo-2.9.1-23.GA.jbcs.el6.i686.rpm
jbcs-httpd24-mod_session-2.4.29-17.jbcs.el6.i686.rpm
jbcs-httpd24-mod_ssl-2.4.29-17.jbcs.el6.i686.rpm
jbcs-httpd24-nghttp2-1.29.0-8.jbcs.el6.i686.rpm
jbcs-httpd24-nghttp2-debuginfo-1.29.0-8.jbcs.el6.i686.rpm
jbcs-httpd24-nghttp2-devel-1.29.0-8.jbcs.el6.i686.rpm
jbcs-httpd24-openssl-1.0.2n-11.jbcs.el6.i686.rpm
jbcs-httpd24-openssl-debuginfo-1.0.2n-11.jbcs.el6.i686.rpm
jbcs-httpd24-openssl-devel-1.0.2n-11.jbcs.el6.i686.rpm
jbcs-httpd24-openssl-libs-1.0.2n-11.jbcs.el6.i686.rpm
jbcs-httpd24-openssl-perl-1.0.2n-11.jbcs.el6.i686.rpm
jbcs-httpd24-openssl-static-1.0.2n-11.jbcs.el6.i686.rpm

noarch:
jbcs-httpd24-apache-commons-daemon-1.1.0-1.redhat_2.1.jbcs.el6.noarch.rpm
jbcs-httpd24-httpd-manual-2.4.29-17.jbcs.el6.noarch.rpm

x86_64:
jbcs-httpd24-apache-commons-daemon-jsvc-1.1.0-1.redhat_2.jbcs.el6.x86_64.rpm
jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1.1.0-1.redhat_2.jbcs.el6.x86_64.rpm
jbcs-httpd24-apr-1.6.3-14.jbcs.el6.x86_64.rpm
jbcs-httpd24-apr-debuginfo-1.6.3-14.jbcs.el6.x86_64.rpm
jbcs-httpd24-apr-devel-1.6.3-14.jbcs.el6.x86_64.rpm
jbcs-httpd24-apr-util-1.6.1-9.jbcs.el6.x86_64.rpm
jbcs-httpd24-apr-util-debuginfo-1.6.1-9.jbcs.el6.x86_64.rpm
jbcs-httpd24-apr-util-devel-1.6.1-9.jbcs.el6.x86_64.rpm
jbcs-httpd24-apr-util-ldap-1.6.1-9.jbcs.el6.x86_64.rpm
jbcs-httpd24-apr-util-mysql-1.6.1-9.jbcs.el6.x86_64.rpm
jbcs-httpd24-apr-util-nss-1.6.1-9.jbcs.el6.x86_64.rpm
jbcs-httpd24-apr-util-odbc-1.6.1-9.jbcs.el6.x86_64.rpm
jbcs-httpd24-apr-util-openssl-1.6.1-9.jbcs.el6.x86_64.rpm
jbcs-httpd24-apr-util-pgsql-1.6.1-9.jbcs.el6.x86_64.rpm
jbcs-httpd24-apr-util-sqlite-1.6.1-9.jbcs.el6.x86_64.rpm
jbcs-httpd24-httpd-2.4.29-17.jbcs.el6.x86_64.rpm
jbcs-httpd24-httpd-debuginfo-2.4.29-17.jbcs.el6.x86_64.rpm
jbcs-httpd24-httpd-devel-2.4.29-17.jbcs.el6.x86_64.rpm
jbcs-httpd24-httpd-selinux-2.4.29-17.jbcs.el6.x86_64.rpm
jbcs-httpd24-httpd-tools-2.4.29-17.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_auth_kerb-5.4-36.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_auth_kerb-debuginfo-5.4-36.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_bmx-0.9.6-17.GA.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_bmx-debuginfo-0.9.6-17.GA.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_cluster-native-1.3.8-1.Final_redhat_2.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_cluster-native-debuginfo-1.3.8-1.Final_redhat_2.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_jk-ap24-1.2.43-1.redhat_1.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_jk-debuginfo-1.2.43-1.redhat_1.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_jk-manual-1.2.43-1.redhat_1.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_ldap-2.4.29-17.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_proxy_html-2.4.29-17.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_rt-2.4.1-19.GA.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_rt-debuginfo-2.4.1-19.GA.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_security-2.9.1-23.GA.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_security-debuginfo-2.9.1-23.GA.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_session-2.4.29-17.jbcs.el6.x86_64.rpm
jbcs-httpd24-mod_ssl-2.4.29-17.jbcs.el6.x86_64.rpm
jbcs-httpd24-nghttp2-1.29.0-8.jbcs.el6.x86_64.rpm
jbcs-httpd24-nghttp2-debuginfo-1.29.0-8.jbcs.el6.x86_64.rpm
jbcs-httpd24-nghttp2-devel-1.29.0-8.jbcs.el6.x86_64.rpm
jbcs-httpd24-openssl-1.0.2n-11.jbcs.el6.x86_64.rpm
jbcs-httpd24-openssl-debuginfo-1.0.2n-11.jbcs.el6.x86_64.rpm
jbcs-httpd24-openssl-devel-1.0.2n-11.jbcs.el6.x86_64.rpm
jbcs-httpd24-openssl-libs-1.0.2n-11.jbcs.el6.x86_64.rpm
jbcs-httpd24-openssl-perl-1.0.2n-11.jbcs.el6.x86_64.rpm
jbcs-httpd24-openssl-static-1.0.2n-11.jbcs.el6.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

8. References:

https://access.redhat.com/security/cve/CVE-2016-2182
https://access.redhat.com/security/cve/CVE-2016-6302
https://access.redhat.com/security/cve/CVE-2016-6306
https://access.redhat.com/security/cve/CVE-2016-7055
https://access.redhat.com/security/cve/CVE-2017-3731
https://access.redhat.com/security/cve/CVE-2017-3732
https://access.redhat.com/security/cve/CVE-2017-3736
https://access.redhat.com/security/cve/CVE-2017-3737
https://access.redhat.com/security/cve/CVE-2017-3738
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/

9. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=1qjW
- -----END PGP SIGNATURE-----

- --------------------------------------------------------------------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update
Advisory ID:       RHSA-2018:2187-01
Product:           Red Hat JBoss Core Services
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:2187
Issue date:        2018-07-12
CVE Names:         CVE-2016-2182 CVE-2016-6302 CVE-2016-6306 
                   CVE-2016-7055 CVE-2017-3731 CVE-2017-3732 
                   CVE-2017-3736 CVE-2017-3737 CVE-2017-3738 
=====================================================================

1. Summary:

Red Hat JBoss Core Services Pack Apache Server 2.4.29 packages are now
available.

Red Hat Product Security has rated this release as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

This release adds the new Apache HTTP Server 2.4.29 packages that are part
of the JBoss Core Services offering.

This release serves as a replacement for Red Hat JBoss Core Services
Apache HTTP Server 2.4.23, and includes bug fixes and enhancements. Refer
to the Release Notes for information on the most significant bug fixes,
enhancements and component upgrades included in this release.

This release upgrades OpenSSL to version 1.0.2.n

Security Fix(es):

*  openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()
(CVE-2016-2182)

*  openssl: Insufficient TLS session ticket HMAC length checks
(CVE-2016-6302)

*  openssl: certificate message OOB reads (CVE-2016-6306)

*  openssl: Carry propagating bug in Montgomery multiplication
(CVE-2016-7055)

*  openssl: Truncated packet could crash via OOB read (CVE-2017-3731)

*  openssl: BN_mod_exp may produce incorrect results on x86_64
(CVE-2017-3732)

*  openssl: bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)

*  openssl: Read/write after SSL object in error state (CVE-2017-3737)

*  openssl: rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)

Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6306
and CVE-2016-7055. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360
Inc.) as the original reporter of CVE-2016-6306.

3. Solution:

The References section of this erratum contains a download link (you must
log in to download the update). Before applying the update, back up your
existing Red Hat JBoss Web Server installation (including all applications
and configuration files).

After installing the updated packages, the httpd daemon will be restarted
automatically.

4. Bugs fixed (https://bugzilla.redhat.com/):

1367340 - CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()
1369855 - CVE-2016-6302 openssl: Insufficient TLS session ticket HMAC length checks
1377594 - CVE-2016-6306 openssl: certificate message OOB reads
1393929 - CVE-2016-7055 openssl: Carry propagating bug in Montgomery multiplication
1416852 - CVE-2017-3731 openssl: Truncated packet could crash via OOB read
1416856 - CVE-2017-3732 openssl: BN_mod_exp may produce incorrect results on x86_64
1509169 - CVE-2017-3736 openssl: bn_sqrx8x_internal carry bug on x86_64
1523504 - CVE-2017-3737 openssl: Read/write after SSL object in error state
1523510 - CVE-2017-3738 openssl: rsaz_1024_mul_avx2 overflow bug on x86_64

5. References:

https://access.redhat.com/security/cve/CVE-2016-2182
https://access.redhat.com/security/cve/CVE-2016-6302
https://access.redhat.com/security/cve/CVE-2016-6306
https://access.redhat.com/security/cve/CVE-2016-7055
https://access.redhat.com/security/cve/CVE-2017-3731
https://access.redhat.com/security/cve/CVE-2017-3732
https://access.redhat.com/security/cve/CVE-2017-3736
https://access.redhat.com/security/cve/CVE-2017-3737
https://access.redhat.com/security/cve/CVE-2017-3738
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=l1qZ
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=uGxP
-----END PGP SIGNATURE-----