Red Hat Security Advisory 2019-0450-01

Hash: SHA256

Red Hat Security Advisory

Synopsis: Moderate: Red Hat JBoss Web Server 5.0 Service Pack 2 security and bug fix update
Advisory ID: RHSA-2019:0450-01
Product: Red Hat JBoss Web Server
Advisory URL:
Issue date: 2019-03-04
CVE Names: CVE-2018-8014 CVE-2018-8034
1. Summary:

An update is now available for Red Hat JBoss Web Server 5.0 for RHEL 6 and
Red Hat JBoss Web Server 5.0 for RHEL 7.

Red Hat Product Security has rated this release as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Web Server is a fully integrated and certified set of
components for hosting Java web applications. It is comprised of the Apache
Tomcat Servlet container, JBoss HTTP Connector (mod_cluster), the
PicketLink Vault extension for Apache Tomcat, and the Tomcat Native

This release of Red Hat JBoss Web Server 5.0 Service Pack 2 serves as a
replacement for Red Hat JBoss Web Server 5.0 Service Pack 1, and includes
bug fixes, which are documented in the Release Notes document linked to in
the References.

Security Fix(es):

* tomcat: Insecure defaults in CORS filter enable ‘supportsCredentials’ for
all origins (CVE-2018-8014)
* tomcat: host name verification missing in WebSocket client

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying the update, back up your existing Red Hat JBoss Web Server
installation (including all applications and configuration files).

For details on how to apply this update, refer to:

4. Bugs fixed (

1579611 – CVE-2018-8014 tomcat: Insecure defaults in CORS filter enable ‘supportsCredentials’ for all origins
1607580 – CVE-2018-8034 tomcat: host name verification missing in WebSocket client

5. JIRA issues fixed (

JWS-1069 – [ASF BZ 62258] Avoid error pages in some cases
JWS-1070 – Unexpected handshake failures with OpenSSL
JWS-1071 – Java 11 support for annotation scanning
JWS-1072 – Missing handshake timeouts for NIO 2 and NIO 2 timeout improvements
JWS-1073 – NIO 2 fixes affecting IO API reliability
JWS-1074 – [ASF BZ 62476] Use GMT in expires date format
JWS-1080 – Error page processing regression
JWS-1122 – HTTP/2 async output reliability fixes and refactorings
JWS-1123 – Tomcat embedded: Different default location for natives lookup
JWS-1153 – Body text property replacement fails
JWS-1160 – [ASF BZ 62803] Tomcat Host Manager incorrectly saves connector with SSL configuration
JWS-1164 – Add some substitution recursive parsing for rewrite
JWS-1281 – [ASF BZ 62892] tomcat-native memory leak when using Mutual authentication + OCSP
JWS-1286 – [ASF BZ 62899] HTTP/2 non blocking Servlet API reliability fixes
JWS-1290 – Several pom.xml files are invalid according to Maven POM XSD
JWS-849 – Hibernate in maven repo could be missing artifacts present in hibernate zip

6. References:

7. Contact:

The Red Hat security contact is <>. More contact
details at

Copyright 2019 Red Hat, Inc.
Version: GnuPG v1


RHSA-announce mailing list