From bugzilla at redhat.com Tue Apr 5 20:44:10 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 5 Apr 2016 16:44:10 -0400 Subject: [RHSA-2016:0595-01] Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update Message-ID: <201604052044.u35KiAv9031684@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update Advisory ID: RHSA-2016:0595-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-0595.html Issue date: 2016-04-05 CVE Names: CVE-2014-0230 CVE-2016-2094 ===================================================================== 1. Summary: A Red Hat JBoss Enterprise Application Platform update is now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss EAP 6.4 for RHEL 5 - noarch 3. Description: Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.6, and includes bug fixes and enhancements. Documentation for these changes will be available shortly from the Red Hat JBoss Enterprise Application Platform 6.4.7 Release Notes, linked to in the References. Security Fix(es): * A read-timeout flaw was found in the HTTPS NIO Connector handling of SSL handshakes. A remote, unauthenticated attacker could create a socket and cause a thread to remain occupied indefinitely so long as the socket remained open (denial of service). (CVE-2016-2094) * It was found that Tomcat would keep connections open after processing requests with a large enough request body. A remote attacker could potentially use this flaw to exhaust the pool of available connections and preventing further, legitimate connections to the Tomcat server to be made. (CVE-2014-0230) The CVE-2016-2094 issue was discovered by Aaron Ogburn of Red Hat. 4. Solution: Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258 The JBoss server process must be restarted for the update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1191200 - CVE-2014-0230 tomcat: non-persistent DoS attack by feeding data by aborting an upload 1291760 - RHEL5 RPMs: Upgrade jbossweb to 7.5.15.Final-redhat-1 1295463 - RHEL5 RPMs: Upgrade jboss-hal to 2.5.12.Final-redhat-1 1299560 - RHEL5 RPMs: Upgrade hornetq to 2.3.25.SP9-redhat-1 1299904 - RHEL5 RPMs: Upgrade resteasy to 2.3.13.Final-redhat-1 1302405 - RHEL5 RPMs: Upgrade weld-core to 1.1.33.Final-redhat-1 1304475 - RHEL5 RPMs: Upgrade infinispan to 5.2.18.Final-redhat-1 1308465 - CVE-2016-2094 EAP: HTTPS NIO connector uses no timeout when reading SSL handshake from client 1310701 - RHEL5 RPMs: Upgrade jboss-as-console to 2.5.12.Final-redhat-1 1311624 - RHEL5 RPMs: Upgrade ironjacamar-eap6 to 1.0.36.Final-redhat-1 1312042 - RHEL5 RPMs: Upgrade jboss-security-negotiation to 2.3.11.Final-redhat-1 6. Package List: Red Hat JBoss EAP 6.4 for RHEL 5: Source: glassfish-jsf-eap6-2.1.28-10.SP9_redhat_1.1.ep6.el5.src.rpm hornetq-2.3.25-11.SP9_redhat_1.1.ep6.el5.src.rpm infinispan-5.2.18-1.Final_redhat_1.1.ep6.el5.src.rpm ironjacamar-eap6-1.0.36-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-appclient-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-cli-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-client-all-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-clustering-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-cmp-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-configadmin-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-connector-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-console-2.5.12-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-as-controller-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-controller-client-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-core-security-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-deployment-repository-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-deployment-scanner-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-domain-http-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-domain-management-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-ee-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-ee-deployment-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-ejb3-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-embedded-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-host-controller-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-jacorb-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-jaxr-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-jaxrs-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-jdr-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-jmx-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-jpa-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-jsf-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-jsr77-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-logging-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-mail-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-management-client-content-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-messaging-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-modcluster-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-naming-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-network-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-osgi-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-osgi-configadmin-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-osgi-service-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-picketlink-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-platform-mbean-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-pojo-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-process-controller-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-protocol-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-remoting-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-sar-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-security-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-server-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-system-jmx-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-threads-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-transactions-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-version-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-web-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-webservices-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-weld-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-as-xts-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jboss-hal-2.5.12-1.Final_redhat_1.1.ep6.el5.src.rpm jboss-security-negotiation-2.3.11-1.Final_redhat_1.1.ep6.el5.src.rpm jbossas-appclient-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jbossas-bundles-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jbossas-core-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jbossas-domain-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jbossas-javadocs-7.5.7-3.Final_redhat_3.1.ep6.el5.src.rpm jbossas-modules-eap-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jbossas-product-eap-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jbossas-standalone-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jbossas-welcome-content-eap-7.5.7-2.Final_redhat_3.1.ep6.el5.src.rpm jbossweb-7.5.15-1.Final_redhat_1.1.ep6.el5.src.rpm resteasy-2.3.13-1.Final_redhat_1.1.ep6.el5.src.rpm weld-core-1.1.33-1.Final_redhat_1.1.ep6.el5.src.rpm noarch: glassfish-jsf-eap6-2.1.28-10.SP9_redhat_1.1.ep6.el5.noarch.rpm hornetq-2.3.25-11.SP9_redhat_1.1.ep6.el5.noarch.rpm infinispan-5.2.18-1.Final_redhat_1.1.ep6.el5.noarch.rpm infinispan-cachestore-jdbc-5.2.18-1.Final_redhat_1.1.ep6.el5.noarch.rpm infinispan-cachestore-remote-5.2.18-1.Final_redhat_1.1.ep6.el5.noarch.rpm infinispan-client-hotrod-5.2.18-1.Final_redhat_1.1.ep6.el5.noarch.rpm infinispan-core-5.2.18-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-common-api-eap6-1.0.36-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-common-impl-eap6-1.0.36-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-common-spi-eap6-1.0.36-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-core-api-eap6-1.0.36-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-core-impl-eap6-1.0.36-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-deployers-common-eap6-1.0.36-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-eap6-1.0.36-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-jdbc-eap6-1.0.36-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-spec-api-eap6-1.0.36-1.Final_redhat_1.1.ep6.el5.noarch.rpm ironjacamar-validator-eap6-1.0.36-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-appclient-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-cli-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-client-all-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-clustering-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-cmp-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-configadmin-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-connector-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-console-2.5.12-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-as-controller-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-controller-client-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-core-security-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-deployment-repository-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-deployment-scanner-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-domain-http-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-domain-management-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-ee-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-ee-deployment-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-ejb3-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-embedded-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-host-controller-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-jacorb-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-jaxr-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-jaxrs-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-jdr-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-jmx-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-jpa-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-jsf-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-jsr77-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-logging-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-mail-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-management-client-content-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-messaging-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-modcluster-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-naming-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-network-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-osgi-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-osgi-configadmin-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-osgi-service-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-picketlink-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-platform-mbean-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-pojo-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-process-controller-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-protocol-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-remoting-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-sar-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-security-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-server-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-system-jmx-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-threads-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-transactions-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-version-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-web-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-webservices-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-weld-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-xts-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-hal-2.5.12-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-security-negotiation-2.3.11-1.Final_redhat_1.1.ep6.el5.noarch.rpm jbossas-appclient-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jbossas-bundles-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jbossas-core-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jbossas-domain-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jbossas-javadocs-7.5.7-3.Final_redhat_3.1.ep6.el5.noarch.rpm jbossas-modules-eap-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jbossas-product-eap-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jbossas-standalone-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jbossas-welcome-content-eap-7.5.7-2.Final_redhat_3.1.ep6.el5.noarch.rpm jbossweb-7.5.15-1.Final_redhat_1.1.ep6.el5.noarch.rpm resteasy-2.3.13-1.Final_redhat_1.1.ep6.el5.noarch.rpm weld-core-1.1.33-1.Final_redhat_1.1.ep6.el5.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-0230 https://access.redhat.com/security/cve/CVE-2016-2094 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXBCOYXlSAg2UNWIIRAr58AKCMA5MsNuh4+EmguVtE8hjkc0eFGACfbuXc I1JpV+J6WH4WwSWV5HBV2fU= =ygU7 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 5 20:44:51 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 5 Apr 2016 16:44:51 -0400 Subject: [RHSA-2016:0596-01] Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update Message-ID: <201604052044.u35KipPt020438@int-mx14.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update Advisory ID: RHSA-2016:0596-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-0596.html Issue date: 2016-04-05 CVE Names: CVE-2014-0230 CVE-2016-2094 ===================================================================== 1. Summary: A Red Hat JBoss Enterprise Application Platform update is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss EAP 6.4 for RHEL 6 - noarch 3. Description: Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.6, and includes bug fixes and enhancements. Documentation for these changes will be available shortly from the Red Hat JBoss Enterprise Application Platform 6.4.7 Release Notes, linked to in the References. Security Fix(es): * A read-timeout flaw was found in the HTTPS NIO Connector handling of SSL handshakes. A remote, unauthenticated attacker could create a socket and cause a thread to remain occupied indefinitely so long as the socket remained open (denial of service). (CVE-2016-2094) * It was found that Tomcat would keep connections open after processing requests with a large enough request body. A remote attacker could potentially use this flaw to exhaust the pool of available connections and preventing further, legitimate connections to the Tomcat server to be made. (CVE-2014-0230) The CVE-2016-2094 issue was discovered by Aaron Ogburn of Red Hat. 4. Solution: Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258 The JBoss server process must be restarted for the update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1191200 - CVE-2014-0230 tomcat: non-persistent DoS attack by feeding data by aborting an upload 1291759 - RHEL6 RPMs: Upgrade jbossweb to 7.5.15.Final-redhat-1 1295462 - RHEL6 RPMs: Upgrade jboss-hal to 2.5.12.Final-redhat-1 1299559 - RHEL6 RPMs: Upgrade hornetq to 2.3.25.SP9-redhat-1 1299903 - RHEL6 RPMs: Upgrade resteasy to 2.3.13.Final-redhat-1 1302404 - RHEL6 RPMs: Upgrade weld-core to 1.1.33.Final-redhat-1 1304474 - RHEL6 RPMs: Upgrade infinispan to 5.2.18.Final-redhat-1 1308465 - CVE-2016-2094 EAP: HTTPS NIO connector uses no timeout when reading SSL handshake from client 1310700 - RHEL6 RPMs: Upgrade jboss-as-console to 2.5.12.Final-redhat-1 1311623 - RHEL6 RPMs: Upgrade ironjacamar-eap6 to 1.0.36.Final-redhat-1 1312041 - RHEL6 RPMs: Upgrade jboss-security-negotiation to 2.3.11.Final-redhat-1 6. Package List: Red Hat JBoss EAP 6.4 for RHEL 6: Source: glassfish-jsf-eap6-2.1.28-10.SP9_redhat_1.1.ep6.el6.src.rpm hornetq-2.3.25-11.SP9_redhat_1.1.ep6.el6.src.rpm infinispan-5.2.18-1.Final_redhat_1.1.ep6.el6.src.rpm ironjacamar-eap6-1.0.36-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-appclient-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-cli-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-client-all-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-clustering-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-cmp-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-configadmin-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-connector-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-console-2.5.12-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-as-controller-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-controller-client-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-core-security-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-deployment-repository-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-deployment-scanner-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-domain-http-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-domain-management-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-ee-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-ee-deployment-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-ejb3-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-embedded-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-host-controller-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-jacorb-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-jaxr-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-jaxrs-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-jdr-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-jmx-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-jpa-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-jsf-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-jsr77-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-logging-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-mail-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-management-client-content-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-messaging-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-modcluster-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-naming-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-network-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-osgi-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-osgi-configadmin-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-osgi-service-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-picketlink-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-platform-mbean-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-pojo-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-process-controller-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-protocol-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-remoting-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-sar-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-security-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-server-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-system-jmx-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-threads-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-transactions-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-version-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-web-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-webservices-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-weld-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-as-xts-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jboss-hal-2.5.12-1.Final_redhat_1.1.ep6.el6.src.rpm jboss-security-negotiation-2.3.11-1.Final_redhat_1.1.ep6.el6.src.rpm jbossas-appclient-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jbossas-bundles-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jbossas-core-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jbossas-domain-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jbossas-javadocs-7.5.7-3.Final_redhat_3.1.ep6.el6.src.rpm jbossas-modules-eap-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jbossas-product-eap-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jbossas-standalone-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jbossas-welcome-content-eap-7.5.7-2.Final_redhat_3.1.ep6.el6.src.rpm jbossweb-7.5.15-1.Final_redhat_1.1.ep6.el6.src.rpm resteasy-2.3.13-1.Final_redhat_1.1.ep6.el6.src.rpm weld-core-1.1.33-1.Final_redhat_1.1.ep6.el6.src.rpm noarch: glassfish-jsf-eap6-2.1.28-10.SP9_redhat_1.1.ep6.el6.noarch.rpm hornetq-2.3.25-11.SP9_redhat_1.1.ep6.el6.noarch.rpm infinispan-5.2.18-1.Final_redhat_1.1.ep6.el6.noarch.rpm infinispan-cachestore-jdbc-5.2.18-1.Final_redhat_1.1.ep6.el6.noarch.rpm infinispan-cachestore-remote-5.2.18-1.Final_redhat_1.1.ep6.el6.noarch.rpm infinispan-client-hotrod-5.2.18-1.Final_redhat_1.1.ep6.el6.noarch.rpm infinispan-core-5.2.18-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-common-api-eap6-1.0.36-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-common-impl-eap6-1.0.36-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-common-spi-eap6-1.0.36-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-core-api-eap6-1.0.36-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-core-impl-eap6-1.0.36-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-deployers-common-eap6-1.0.36-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-eap6-1.0.36-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-jdbc-eap6-1.0.36-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-spec-api-eap6-1.0.36-1.Final_redhat_1.1.ep6.el6.noarch.rpm ironjacamar-validator-eap6-1.0.36-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-appclient-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-cli-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-client-all-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-clustering-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-cmp-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-configadmin-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-connector-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-console-2.5.12-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-as-controller-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-controller-client-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-core-security-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-deployment-repository-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-deployment-scanner-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-domain-http-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-domain-management-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-ee-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-ee-deployment-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-ejb3-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-embedded-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-host-controller-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-jacorb-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-jaxr-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-jaxrs-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-jdr-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-jmx-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-jpa-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-jsf-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-jsr77-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-logging-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-mail-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-management-client-content-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-messaging-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-modcluster-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-naming-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-network-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-osgi-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-osgi-configadmin-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-osgi-service-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-picketlink-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-platform-mbean-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-pojo-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-process-controller-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-protocol-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-remoting-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-sar-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-security-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-server-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-system-jmx-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-threads-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-transactions-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-version-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-web-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-webservices-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-weld-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-xts-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-hal-2.5.12-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-security-negotiation-2.3.11-1.Final_redhat_1.1.ep6.el6.noarch.rpm jbossas-appclient-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jbossas-bundles-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jbossas-core-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jbossas-domain-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jbossas-javadocs-7.5.7-3.Final_redhat_3.1.ep6.el6.noarch.rpm jbossas-modules-eap-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jbossas-product-eap-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jbossas-standalone-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jbossas-welcome-content-eap-7.5.7-2.Final_redhat_3.1.ep6.el6.noarch.rpm jbossweb-7.5.15-1.Final_redhat_1.1.ep6.el6.noarch.rpm resteasy-2.3.13-1.Final_redhat_1.1.ep6.el6.noarch.rpm weld-core-1.1.33-1.Final_redhat_1.1.ep6.el6.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-0230 https://access.redhat.com/security/cve/CVE-2016-2094 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXBCPBXlSAg2UNWIIRAiSGAJ9r3JSxxRLZ2+G82pd2+l+/af2vqACfWU9f QBsJZgps4waGzCmzmw4qrRI= =IzqJ -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 5 20:45:33 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 5 Apr 2016 16:45:33 -0400 Subject: [RHSA-2016:0597-01] Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update Message-ID: <201604052045.u35KjXXP000449@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update Advisory ID: RHSA-2016:0597-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-0597.html Issue date: 2016-04-05 CVE Names: CVE-2014-0230 CVE-2016-2094 ===================================================================== 1. Summary: A Red Hat JBoss Enterprise Application Platform update is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss Enterprise Application Platform 6 for RHEL 7 Server - noarch 3. Description: Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.6, and includes bug fixes and enhancements. Documentation for these changes will be available shortly from the Red Hat JBoss Enterprise Application Platform 6.4.7 Release Notes, linked to in the References. Security Fix(es): * A read-timeout flaw was found in the HTTPS NIO Connector handling of SSL handshakes. A remote, unauthenticated attacker could create a socket and cause a thread to remain occupied indefinitely so long as the socket remained open (denial of service). (CVE-2016-2094) * It was found that Tomcat would keep connections open after processing requests with a large enough request body. A remote attacker could potentially use this flaw to exhaust the pool of available connections and preventing further, legitimate connections to the Tomcat server to be made. (CVE-2014-0230) The CVE-2016-2094 issue was discovered by Aaron Ogburn of Red Hat. 4. Solution: Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258 The JBoss server process must be restarted for the update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1191200 - CVE-2014-0230 tomcat: non-persistent DoS attack by feeding data by aborting an upload 1291761 - RHEL7 RPMs: Upgrade jbossweb to 7.5.15.Final-redhat-1 1295464 - RHEL7 RPMs: Upgrade jboss-hal to 2.5.12.Final-redhat-1 1299561 - RHEL7 RPMs: Upgrade hornetq to 2.3.25.SP9-redhat-1 1299905 - RHEL7 RPMs: Upgrade resteasy to 2.3.13.Final-redhat-1 1302406 - RHEL7 RPMs: Upgrade weld-core to 1.1.33.Final-redhat-1 1304476 - RHEL7 RPMs: Upgrade infinispan to 5.2.18.Final-redhat-1 1308465 - CVE-2016-2094 EAP: HTTPS NIO connector uses no timeout when reading SSL handshake from client 1310702 - RHEL7 RPMs: Upgrade jboss-as-console to 2.5.12.Final-redhat-1 1311625 - RHEL7 RPMs: Upgrade ironjacamar-eap6 to 1.0.36.Final-redhat-1 1312043 - RHEL7 RPMs: Upgrade jboss-security-negotiation to 2.3.11.Final-redhat-1 6. Package List: Red Hat JBoss Enterprise Application Platform 6 for RHEL 7 Server: Source: glassfish-jsf-eap6-2.1.28-10.SP9_redhat_1.1.ep6.el7.src.rpm hornetq-2.3.25-11.SP9_redhat_1.1.ep6.el7.src.rpm infinispan-5.2.18-1.Final_redhat_1.1.ep6.el7.src.rpm ironjacamar-eap6-1.0.36-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-appclient-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-cli-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-client-all-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-clustering-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-cmp-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-configadmin-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-connector-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-console-2.5.12-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-as-controller-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-controller-client-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-core-security-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-deployment-repository-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-deployment-scanner-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-domain-http-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-domain-management-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-ee-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-ee-deployment-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-ejb3-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-embedded-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-host-controller-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-jacorb-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-jaxr-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-jaxrs-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-jdr-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-jmx-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-jpa-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-jsf-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-jsr77-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-logging-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-mail-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-management-client-content-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-messaging-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-modcluster-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-naming-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-network-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-osgi-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-osgi-configadmin-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-osgi-service-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-picketlink-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-platform-mbean-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-pojo-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-process-controller-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-protocol-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-remoting-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-sar-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-security-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-server-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-system-jmx-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-threads-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-transactions-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-version-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-web-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-webservices-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-weld-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-as-xts-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jboss-hal-2.5.12-1.Final_redhat_1.1.ep6.el7.src.rpm jboss-security-negotiation-2.3.11-1.Final_redhat_1.1.ep6.el7.src.rpm jbossas-appclient-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jbossas-bundles-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jbossas-core-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jbossas-domain-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jbossas-javadocs-7.5.7-3.Final_redhat_3.1.ep6.el7.src.rpm jbossas-modules-eap-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jbossas-product-eap-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jbossas-standalone-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jbossas-welcome-content-eap-7.5.7-2.Final_redhat_3.1.ep6.el7.src.rpm jbossweb-7.5.15-1.Final_redhat_1.1.ep6.el7.src.rpm resteasy-2.3.13-1.Final_redhat_1.1.ep6.el7.src.rpm weld-core-1.1.33-1.Final_redhat_1.1.ep6.el7.src.rpm noarch: glassfish-jsf-eap6-2.1.28-10.SP9_redhat_1.1.ep6.el7.noarch.rpm hornetq-2.3.25-11.SP9_redhat_1.1.ep6.el7.noarch.rpm infinispan-5.2.18-1.Final_redhat_1.1.ep6.el7.noarch.rpm infinispan-cachestore-jdbc-5.2.18-1.Final_redhat_1.1.ep6.el7.noarch.rpm infinispan-cachestore-remote-5.2.18-1.Final_redhat_1.1.ep6.el7.noarch.rpm infinispan-client-hotrod-5.2.18-1.Final_redhat_1.1.ep6.el7.noarch.rpm infinispan-core-5.2.18-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-common-api-eap6-1.0.36-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-common-impl-eap6-1.0.36-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-common-spi-eap6-1.0.36-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-core-api-eap6-1.0.36-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-core-impl-eap6-1.0.36-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-deployers-common-eap6-1.0.36-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-eap6-1.0.36-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-jdbc-eap6-1.0.36-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-spec-api-eap6-1.0.36-1.Final_redhat_1.1.ep6.el7.noarch.rpm ironjacamar-validator-eap6-1.0.36-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-appclient-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-cli-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-client-all-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-clustering-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-cmp-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-configadmin-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-connector-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-console-2.5.12-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-as-controller-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-controller-client-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-core-security-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-deployment-repository-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-deployment-scanner-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-domain-http-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-domain-management-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-ee-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-ee-deployment-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-ejb3-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-embedded-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-host-controller-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-jacorb-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-jaxr-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-jaxrs-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-jdr-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-jmx-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-jpa-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-jsf-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-jsr77-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-logging-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-mail-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-management-client-content-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-messaging-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-modcluster-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-naming-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-network-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-osgi-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-osgi-configadmin-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-osgi-service-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-picketlink-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-platform-mbean-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-pojo-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-process-controller-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-protocol-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-remoting-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-sar-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-security-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-server-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-system-jmx-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-threads-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-transactions-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-version-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-web-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-webservices-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-weld-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-as-xts-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jboss-hal-2.5.12-1.Final_redhat_1.1.ep6.el7.noarch.rpm jboss-security-negotiation-2.3.11-1.Final_redhat_1.1.ep6.el7.noarch.rpm jbossas-appclient-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jbossas-bundles-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jbossas-core-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jbossas-domain-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jbossas-javadocs-7.5.7-3.Final_redhat_3.1.ep6.el7.noarch.rpm jbossas-modules-eap-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jbossas-product-eap-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jbossas-standalone-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jbossas-welcome-content-eap-7.5.7-2.Final_redhat_3.1.ep6.el7.noarch.rpm jbossweb-7.5.15-1.Final_redhat_1.1.ep6.el7.noarch.rpm resteasy-2.3.13-1.Final_redhat_1.1.ep6.el7.noarch.rpm weld-core-1.1.33-1.Final_redhat_1.1.ep6.el7.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-0230 https://access.redhat.com/security/cve/CVE-2016-2094 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXBCPrXlSAg2UNWIIRAoWqAJ0eK2cg+s8ckkJaHhwxeUmFBUWIzQCfUcZl kENIizhp/BKiStD85U3Dids= =8TT1 -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 5 20:45:42 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 5 Apr 2016 16:45:42 -0400 Subject: [RHSA-2016:0598-01] Moderate: jboss-ec2-eap security, bug fix, and enhancement update Message-ID: <201604052045.u35Kjg4D012240@int-mx10.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: jboss-ec2-eap security, bug fix, and enhancement update Advisory ID: RHSA-2016:0598-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-0598.html Issue date: 2016-04-05 CVE Names: CVE-2014-0230 CVE-2016-2094 ===================================================================== 1. Summary: A jboss-ec2-eap update is now available for Red Hat JBoss Enterprise Application Platform 6.4.7 on Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss EAP 6.4 for RHEL 6 - noarch 3. Description: Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. The jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services (AWS) Elastic Compute Cloud (EC2). With this update, the packages have been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 6.4.7. Security Fix(es): * A read-timeout flaw was found in the HTTPS NIO Connector handling of SSL handshakes. A remote, unauthenticated attacker could create a socket and cause a thread to remain occupied indefinitely so long as the socket remained open (denial of service). (CVE-2016-2094) * It was found that Tomcat would keep connections open after processing requests with a large enough request body. A remote attacker could potentially use this flaw to exhaust the pool of available connections and preventing further, legitimate connections to the Tomcat server to be made. (CVE-2014-0230) The CVE-2016-2094 issue was discovered by Aaron Ogburn of Red Hat. 4. Solution: Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258 The JBoss server process must be restarted for the update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 1191200 - CVE-2014-0230 tomcat: non-persistent DoS attack by feeding data by aborting an upload 1308465 - CVE-2016-2094 EAP: HTTPS NIO connector uses no timeout when reading SSL handshake from client 6. Package List: Red Hat JBoss EAP 6.4 for RHEL 6: Source: jboss-ec2-eap-7.5.7-2.Final_redhat_3.ep6.el6.src.rpm noarch: jboss-ec2-eap-7.5.7-2.Final_redhat_3.ep6.el6.noarch.rpm jboss-ec2-eap-samples-7.5.7-2.Final_redhat_3.ep6.el6.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2014-0230 https://access.redhat.com/security/cve/CVE-2016-2094 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/ 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXBCP0XlSAg2UNWIIRAuLYAJ4m87iuztzVVOA4pBm35amG6X6tvgCdG9K0 OWGfFBNWbCuuQiz5k0SFJXs= =bjME -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Apr 5 22:23:24 2016 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 5 Apr 2016 18:23:24 -0400 Subject: [RHSA-2016:0599-01] Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update Message-ID: <201604052223.u35MNOhH013232@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 6.4.7 update Advisory ID: RHSA-2016:0599-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-0599.html Issue date: 2016-04-05 CVE Names: CVE-2014-0230 CVE-2016-2094 ===================================================================== 1. Summary: An update is now available for Red Hat JBoss Enterprise Application Platform from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. This release serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.6, and includes bug fixes and enhancements. Documentation for these changes will be available shortly from the Red Hat JBoss Enterprise Application Platform 6.4.7 Release Notes, linked to in the References. Security Fix(es): * A read-timeout flaw was found in the HTTPS NIO Connector handling of SSL handshakes. A remote, unauthenticated attacker could create a socket and cause a thread to remain occupied indefinitely so long as the socket remained open (denial of service). (CVE-2016-2094) * It was found that Tomcat would keep connections open after processing requests with a large enough request body. A remote attacker could potentially use this flaw to exhaust the pool of available connections and preventing further, legitimate connections to the Tomcat server to be made. (CVE-2014-0230) The CVE-2016-2094 issue was discovered by Aaron Ogburn of Red Hat. 3. Solution: The References section of this erratum contains a download link (you must log in to download the update). The References section of this erratum contains a download link (you must log in to download the update). Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications. The JBoss server process must be restarted for the update to take effect. 4. Bugs fixed (https://bugzilla.redhat.com/): 1191200 - CVE-2014-0230 tomcat: non-persistent DoS attack by feeding data by aborting an upload 1291761 - RHEL7 RPMs: Upgrade jbossweb to 7.5.15.Final-redhat-1 1295464 - RHEL7 RPMs: Upgrade jboss-hal to 2.5.12.Final-redhat-1 1299561 - RHEL7 RPMs: Upgrade hornetq to 2.3.25.SP9-redhat-1 1299905 - RHEL7 RPMs: Upgrade resteasy to 2.3.13.Final-redhat-1 1302406 - RHEL7 RPMs: Upgrade weld-core to 1.1.33.Final-redhat-1 1304476 - RHEL7 RPMs: Upgrade infinispan to 5.2.18.Final-redhat-1 1308465 - CVE-2016-2094 EAP: HTTPS NIO connector uses no timeout when reading SSL handshake from client 1310702 - RHEL7 RPMs: Upgrade jboss-as-console to 2.5.12.Final-redhat-1 1311625 - RHEL7 RPMs: Upgrade ironjacamar-eap6 to 1.0.36.Final-redhat-1 1312043 - RHEL7 RPMs: Upgrade jboss-security-negotiation to 2.3.11.Final-redhat-1 5. References: https://access.redhat.com/security/cve/CVE-2014-0230 https://access.redhat.com/security/cve/CVE-2016-2094 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en/jboss-enterprise-application-platform/ https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.4 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFXBDraXlSAg2UNWIIRAmmmAJ45Bgl5VHQEo1/gWVnRsxg7H+MW/gCfUiUx HA5/x9dIFsacD0eIFz8jtew= =BMTT -----END PGP SIGNATURE-----