From bugzilla at redhat.com Thu Dec 10 00:12:44 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 9 Dec 2009 19:12:44 -0500 Subject: [RHSA-2009:1636-01] Moderate: JBoss Enterprise Application Platform 4.3.0.CP07 update Message-ID: <200912100012.nBA0CiZI029688@int-mx08.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: JBoss Enterprise Application Platform 4.3.0.CP07 update Advisory ID: RHSA-2009:1636-01 Product: JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1636.html Issue date: 2009-12-09 CVE Names: CVE-2009-0217 CVE-2009-1380 CVE-2009-2405 CVE-2009-2625 CVE-2009-3554 ===================================================================== 1. Summary: Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix multiple security issues, several bugs, and add enhancements are now available for Red Hat Enterprise Linux 4 as JBEAP 4.3.0.CP07. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS - noarch JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES - noarch 3. Description: JBoss Enterprise Application Platform is the market leading platform for innovative and scalable Java applications; integrating the JBoss Application Server, with JBoss Hibernate and JBoss Seam into a complete, simple enterprise solution. This release of JBEAP for Red Hat Enterprise Linux 4 serves as a replacement to JBEAP 4.3.0.CP06. These updated packages include bug fixes and enhancements which are detailed in the Release Notes, available shortly from: http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/ The following security issues are also fixed with this release: A missing check for the recommended minimum length of the truncated form of HMAC-based XML signatures was found in xml-security. An attacker could use this flaw to create a specially-crafted XML file that forges an XML signature, allowing the attacker to bypass authentication that is based on the XML Signature specification. (CVE-2009-0217) Swatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss Application Server Web Console. An attacker could use these flaws to present misleading data to an authenticated user, or execute arbitrary scripting code in the context of the authenticated user's browser session. (CVE-2009-2405) A flaw was found in the way the Apache Xerces2 Java Parser processed the SYSTEM identifier in DTDs. A remote attacker could provide a specially-crafted XML file, which once parsed by an application using the Apache Xerces2 Java Parser, would lead to a denial of service (application hang due to excessive CPU use). (CVE-2009-2625) An information leak flaw was found in the twiddle command line client. The JMX password was logged in plain text to "twiddle.log". (CVE-2009-3554) An XSS flaw was found in the JMX Console. An attacker could use this flaw to present misleading data to an authenticated user, or execute arbitrary scripting code in the context of the authenticated user's browser session. (CVE-2009-1380) Warning: Before applying this update, please backup the JBEAP "server/[configuration]/deploy/" directory, and any other customized configuration files. All users of JBEAP 4.3 on Red Hat Enterprise Linux 4 are advised to upgrade to these updated packages. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 510023 - CVE-2009-2405 JBoss Application Server Web Console XSS 511224 - CVE-2009-1380 jbossas JMX-Console cross-site-scripting in filter parameter 511915 - CVE-2009-0217 xmlsec1, mono, xml-security-c, xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass 512921 - CVE-2009-2625 OpenJDK: XML parsing Denial-Of-Service (6845701) 532117 - Tracker bug for the EAP 4.3.0.cp07 release. 539495 - CVE-2009-3554 JBoss EAP Twiddle logs the JMX password 6. Package List: JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS: Source: glassfish-javamail-1.4.2-0jpp.ep1.5.el4.src.rpm glassfish-jaxb-2.1.4-1.12.patch03.ep1.el4.src.rpm glassfish-jsf-1.2_13-2.1.ep1.el4.src.rpm hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src.rpm hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.src.rpm hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.src.rpm jacorb-2.3.0-1jpp.ep1.9.el4.src.rpm jakarta-commons-logging-jboss-1.1-9.ep1.el4.src.rpm jboss-aop-1.5.5-3.CP04.2.ep1.el4.src.rpm jboss-common-1.2.1-0jpp.ep1.3.el4.src.rpm jboss-messaging-1.4.0-3.SP3_CP09.4.ep1.el4.src.rpm jboss-remoting-2.2.3-3.SP1.ep1.el4.src.rpm jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src.rpm jboss-seam2-2.0.2.FP-1.ep1.21.el4.src.rpm jbossas-4.3.0-6.GA_CP07.4.ep1.el4.src.rpm jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src.rpm jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.src.rpm jbossws-2.0.1-4.SP2_CP07.2.ep1.el4.src.rpm jbossws-common-1.0.0-2.GA_CP05.1.ep1.el4.src.rpm jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el4.src.rpm jcommon-1.0.16-1.1.ep1.el4.src.rpm jfreechart-1.0.13-2.3.1.ep1.el4.src.rpm jgroups-2.4.7-1.ep1.el4.src.rpm quartz-1.5.2-1jpp.patch01.ep1.4.el4.src.rpm rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el4.src.rpm xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.src.rpm xml-security-1.3.0-1.3.patch01.ep1.2.el4.src.rpm noarch: glassfish-javamail-1.4.2-0jpp.ep1.5.el4.noarch.rpm glassfish-jaxb-2.1.4-1.12.patch03.ep1.el4.noarch.rpm glassfish-jaxb-javadoc-2.1.4-1.12.patch03.ep1.el4.noarch.rpm glassfish-jsf-1.2_13-2.1.ep1.el4.noarch.rpm hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm hibernate3-annotations-javadoc-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm hibernate3-entitymanager-javadoc-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm hibernate3-javadoc-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm jacorb-2.3.0-1jpp.ep1.9.el4.noarch.rpm jakarta-commons-logging-jboss-1.1-9.ep1.el4.noarch.rpm jboss-aop-1.5.5-3.CP04.2.ep1.el4.noarch.rpm jboss-common-1.2.1-0jpp.ep1.3.el4.noarch.rpm jboss-messaging-1.4.0-3.SP3_CP09.4.ep1.el4.noarch.rpm jboss-remoting-2.2.3-3.SP1.ep1.el4.noarch.rpm jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch.rpm jboss-seam-docs-1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch.rpm jboss-seam2-2.0.2.FP-1.ep1.21.el4.noarch.rpm jboss-seam2-docs-2.0.2.FP-1.ep1.21.el4.noarch.rpm jbossas-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm jbossas-4.3.0.GA_CP07-bin-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm jbossas-client-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch.rpm jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.noarch.rpm jbossws-2.0.1-4.SP2_CP07.2.ep1.el4.noarch.rpm jbossws-common-1.0.0-2.GA_CP05.1.ep1.el4.noarch.rpm jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el4.noarch.rpm jbossws-native42-2.0.1-4.SP2_CP07.2.ep1.el4.noarch.rpm jcommon-1.0.16-1.1.ep1.el4.noarch.rpm jfreechart-1.0.13-2.3.1.ep1.el4.noarch.rpm jgroups-2.4.7-1.ep1.el4.noarch.rpm quartz-1.5.2-1jpp.patch01.ep1.4.el4.noarch.rpm rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el4.noarch.rpm rh-eap-docs-examples-4.3.0-6.GA_CP07.ep1.3.el4.noarch.rpm xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch.rpm xml-security-1.3.0-1.3.patch01.ep1.2.el4.noarch.rpm JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES: Source: glassfish-javamail-1.4.2-0jpp.ep1.5.el4.src.rpm glassfish-jaxb-2.1.4-1.12.patch03.ep1.el4.src.rpm glassfish-jsf-1.2_13-2.1.ep1.el4.src.rpm hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src.rpm hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.src.rpm hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.src.rpm jacorb-2.3.0-1jpp.ep1.9.el4.src.rpm jakarta-commons-logging-jboss-1.1-9.ep1.el4.src.rpm jboss-aop-1.5.5-3.CP04.2.ep1.el4.src.rpm jboss-common-1.2.1-0jpp.ep1.3.el4.src.rpm jboss-messaging-1.4.0-3.SP3_CP09.4.ep1.el4.src.rpm jboss-remoting-2.2.3-3.SP1.ep1.el4.src.rpm jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src.rpm jboss-seam2-2.0.2.FP-1.ep1.21.el4.src.rpm jbossas-4.3.0-6.GA_CP07.4.ep1.el4.src.rpm jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src.rpm jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.src.rpm jbossws-2.0.1-4.SP2_CP07.2.ep1.el4.src.rpm jbossws-common-1.0.0-2.GA_CP05.1.ep1.el4.src.rpm jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el4.src.rpm jcommon-1.0.16-1.1.ep1.el4.src.rpm jfreechart-1.0.13-2.3.1.ep1.el4.src.rpm jgroups-2.4.7-1.ep1.el4.src.rpm quartz-1.5.2-1jpp.patch01.ep1.4.el4.src.rpm rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el4.src.rpm xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.src.rpm xml-security-1.3.0-1.3.patch01.ep1.2.el4.src.rpm noarch: glassfish-javamail-1.4.2-0jpp.ep1.5.el4.noarch.rpm glassfish-jaxb-2.1.4-1.12.patch03.ep1.el4.noarch.rpm glassfish-jaxb-javadoc-2.1.4-1.12.patch03.ep1.el4.noarch.rpm glassfish-jsf-1.2_13-2.1.ep1.el4.noarch.rpm hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm hibernate3-annotations-javadoc-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm hibernate3-entitymanager-javadoc-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm hibernate3-javadoc-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm jacorb-2.3.0-1jpp.ep1.9.el4.noarch.rpm jakarta-commons-logging-jboss-1.1-9.ep1.el4.noarch.rpm jboss-aop-1.5.5-3.CP04.2.ep1.el4.noarch.rpm jboss-common-1.2.1-0jpp.ep1.3.el4.noarch.rpm jboss-messaging-1.4.0-3.SP3_CP09.4.ep1.el4.noarch.rpm jboss-remoting-2.2.3-3.SP1.ep1.el4.noarch.rpm jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch.rpm jboss-seam-docs-1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch.rpm jboss-seam2-2.0.2.FP-1.ep1.21.el4.noarch.rpm jboss-seam2-docs-2.0.2.FP-1.ep1.21.el4.noarch.rpm jbossas-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm jbossas-4.3.0.GA_CP07-bin-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm jbossas-client-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch.rpm jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.noarch.rpm jbossws-2.0.1-4.SP2_CP07.2.ep1.el4.noarch.rpm jbossws-common-1.0.0-2.GA_CP05.1.ep1.el4.noarch.rpm jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el4.noarch.rpm jbossws-native42-2.0.1-4.SP2_CP07.2.ep1.el4.noarch.rpm jcommon-1.0.16-1.1.ep1.el4.noarch.rpm jfreechart-1.0.13-2.3.1.ep1.el4.noarch.rpm jgroups-2.4.7-1.ep1.el4.noarch.rpm quartz-1.5.2-1jpp.patch01.ep1.4.el4.noarch.rpm rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el4.noarch.rpm rh-eap-docs-examples-4.3.0-6.GA_CP07.ep1.3.el4.noarch.rpm xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch.rpm xml-security-1.3.0-1.3.patch01.ep1.2.el4.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0217 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1380 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2405 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3554 http://www.redhat.com/security/updates/classification/#moderate http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/ 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLIDzmXlSAg2UNWIIRAhhkAKDAj8v8w2aTwSgUIX1LpP2e6wRDhACfZ9Px JmgS7lgaYnNRcG0z9ksCkMU= =RaXE -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Dec 10 00:13:21 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 9 Dec 2009 19:13:21 -0500 Subject: [RHSA-2009:1637-01] Moderate: JBoss Enterprise Application Platform 4.2.0.CP08 update Message-ID: <200912100013.nBA0DL11012246@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: JBoss Enterprise Application Platform 4.2.0.CP08 update Advisory ID: RHSA-2009:1637-01 Product: JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1637.html Issue date: 2009-12-09 CVE Names: CVE-2009-0217 CVE-2009-1380 CVE-2009-2405 CVE-2009-2625 CVE-2009-3554 ===================================================================== 1. Summary: Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix multiple security issues, several bugs, and add enhancements are now available for Red Hat Enterprise Linux 4 as JBEAP 4.2.0.CP08. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: JBoss Enterprise Application Platform for RHEL 4 AS - noarch JBoss Enterprise Application Platform for RHEL 4 ES - noarch 3. Description: JBoss Enterprise Application Platform is the market leading platform for innovative and scalable Java applications; integrating the JBoss Application Server, with JBoss Hibernate and JBoss Seam into a complete, simple enterprise solution. This release of JBEAP for Red Hat Enterprise Linux 4 serves as a replacement to JBEAP 4.2.0.CP07. These updated packages include bug fixes and enhancements which are detailed in the Release Notes, available shortly from: http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/ The following security issues are also fixed with this release: A missing check for the recommended minimum length of the truncated form of HMAC-based XML signatures was found in xml-security. An attacker could use this flaw to create a specially-crafted XML file that forges an XML signature, allowing the attacker to bypass authentication that is based on the XML Signature specification. (CVE-2009-0217) Swatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss Application Server Web Console. An attacker could use these flaws to present misleading data to an authenticated user, or execute arbitrary scripting code in the context of the authenticated user's browser session. (CVE-2009-2405) A flaw was found in the way the Apache Xerces2 Java Parser processed the SYSTEM identifier in DTDs. A remote attacker could provide a specially-crafted XML file, which once parsed by an application using the Apache Xerces2 Java Parser, would lead to a denial of service (application hang due to excessive CPU use). (CVE-2009-2625) An information leak flaw was found in the twiddle command line client. The JMX password was logged in plain text to "twiddle.log". (CVE-2009-3554) An XSS flaw was found in the JMX Console. An attacker could use this flaw to present misleading data to an authenticated user, or execute arbitrary scripting code in the context of the authenticated user's browser session. (CVE-2009-1380) Warning: Before applying this update, please backup the JBEAP "server/[configuration]/deploy/" directory, and any other customized configuration files. All users of JBEAP 4.2 on Red Hat Enterprise Linux 4 are advised to upgrade to these updated packages. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 510023 - CVE-2009-2405 JBoss Application Server Web Console XSS 511224 - CVE-2009-1380 jbossas JMX-Console cross-site-scripting in filter parameter 511915 - CVE-2009-0217 xmlsec1, mono, xml-security-c, xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass 512921 - CVE-2009-2625 OpenJDK: XML parsing Denial-Of-Service (6845701) 532116 - Tracker bug for the EAP 4.2.0.cp08 release. 539495 - CVE-2009-3554 JBoss EAP Twiddle logs the JMX password 6. Package List: JBoss Enterprise Application Platform for RHEL 4 AS: Source: glassfish-javamail-1.4.2-0jpp.ep1.5.el4.src.rpm glassfish-jsf-1.2_13-2.1.ep1.el4.src.rpm hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src.rpm hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.src.rpm hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.src.rpm jacorb-2.3.0-1jpp.ep1.9.el4.src.rpm jakarta-commons-logging-jboss-1.1-9.ep1.el4.src.rpm jboss-aop-1.5.5-3.CP04.2.ep1.el4.src.rpm jboss-common-1.2.1-0jpp.ep1.3.el4.src.rpm jboss-remoting-2.2.3-3.SP1.ep1.el4.src.rpm jboss-seam-1.2.1-1.ep1.22.el4.src.rpm jbossas-4.2.0-5.GA_CP08.5.ep1.el4.src.rpm jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src.rpm jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.src.rpm jcommon-1.0.16-1.1.ep1.el4.src.rpm jfreechart-1.0.13-2.3.1.ep1.el4.src.rpm jgroups-2.4.7-1.ep1.el4.src.rpm quartz-1.5.2-1jpp.patch01.ep1.4.el4.src.rpm rh-eap-docs-4.2.0-6.GA_CP08.ep1.3.el4.src.rpm xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.src.rpm xml-security-1.3.0-1.3.patch01.ep1.2.el4.src.rpm noarch: glassfish-javamail-1.4.2-0jpp.ep1.5.el4.noarch.rpm glassfish-jsf-1.2_13-2.1.ep1.el4.noarch.rpm hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm hibernate3-annotations-javadoc-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm hibernate3-entitymanager-javadoc-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm hibernate3-javadoc-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm jacorb-2.3.0-1jpp.ep1.9.el4.noarch.rpm jakarta-commons-logging-jboss-1.1-9.ep1.el4.noarch.rpm jboss-aop-1.5.5-3.CP04.2.ep1.el4.noarch.rpm jboss-common-1.2.1-0jpp.ep1.3.el4.noarch.rpm jboss-remoting-2.2.3-3.SP1.ep1.el4.noarch.rpm jboss-seam-1.2.1-1.ep1.22.el4.noarch.rpm jboss-seam-docs-1.2.1-1.ep1.22.el4.noarch.rpm jbossas-4.2.0-5.GA_CP08.5.ep1.el4.noarch.rpm jbossas-4.2.0.GA_CP08-bin-4.2.0-5.GA_CP08.5.ep1.el4.noarch.rpm jbossas-client-4.2.0-5.GA_CP08.5.ep1.el4.noarch.rpm jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch.rpm jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.noarch.rpm jcommon-1.0.16-1.1.ep1.el4.noarch.rpm jfreechart-1.0.13-2.3.1.ep1.el4.noarch.rpm jgroups-2.4.7-1.ep1.el4.noarch.rpm quartz-1.5.2-1jpp.patch01.ep1.4.el4.noarch.rpm rh-eap-docs-4.2.0-6.GA_CP08.ep1.3.el4.noarch.rpm rh-eap-docs-examples-4.2.0-6.GA_CP08.ep1.3.el4.noarch.rpm xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch.rpm xml-security-1.3.0-1.3.patch01.ep1.2.el4.noarch.rpm JBoss Enterprise Application Platform for RHEL 4 ES: Source: glassfish-javamail-1.4.2-0jpp.ep1.5.el4.src.rpm glassfish-jsf-1.2_13-2.1.ep1.el4.src.rpm hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src.rpm hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.src.rpm hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.src.rpm jacorb-2.3.0-1jpp.ep1.9.el4.src.rpm jakarta-commons-logging-jboss-1.1-9.ep1.el4.src.rpm jboss-aop-1.5.5-3.CP04.2.ep1.el4.src.rpm jboss-common-1.2.1-0jpp.ep1.3.el4.src.rpm jboss-remoting-2.2.3-3.SP1.ep1.el4.src.rpm jboss-seam-1.2.1-1.ep1.22.el4.src.rpm jbossas-4.2.0-5.GA_CP08.5.ep1.el4.src.rpm jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src.rpm jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.src.rpm jcommon-1.0.16-1.1.ep1.el4.src.rpm jfreechart-1.0.13-2.3.1.ep1.el4.src.rpm jgroups-2.4.7-1.ep1.el4.src.rpm quartz-1.5.2-1jpp.patch01.ep1.4.el4.src.rpm rh-eap-docs-4.2.0-6.GA_CP08.ep1.3.el4.src.rpm xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.src.rpm xml-security-1.3.0-1.3.patch01.ep1.2.el4.src.rpm noarch: glassfish-javamail-1.4.2-0jpp.ep1.5.el4.noarch.rpm glassfish-jsf-1.2_13-2.1.ep1.el4.noarch.rpm hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm hibernate3-annotations-javadoc-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm hibernate3-entitymanager-javadoc-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm hibernate3-javadoc-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm jacorb-2.3.0-1jpp.ep1.9.el4.noarch.rpm jakarta-commons-logging-jboss-1.1-9.ep1.el4.noarch.rpm jboss-aop-1.5.5-3.CP04.2.ep1.el4.noarch.rpm jboss-common-1.2.1-0jpp.ep1.3.el4.noarch.rpm jboss-remoting-2.2.3-3.SP1.ep1.el4.noarch.rpm jboss-seam-1.2.1-1.ep1.22.el4.noarch.rpm jboss-seam-docs-1.2.1-1.ep1.22.el4.noarch.rpm jbossas-4.2.0-5.GA_CP08.5.ep1.el4.noarch.rpm jbossas-4.2.0.GA_CP08-bin-4.2.0-5.GA_CP08.5.ep1.el4.noarch.rpm jbossas-client-4.2.0-5.GA_CP08.5.ep1.el4.noarch.rpm jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch.rpm jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.noarch.rpm jcommon-1.0.16-1.1.ep1.el4.noarch.rpm jfreechart-1.0.13-2.3.1.ep1.el4.noarch.rpm jgroups-2.4.7-1.ep1.el4.noarch.rpm quartz-1.5.2-1jpp.patch01.ep1.4.el4.noarch.rpm rh-eap-docs-4.2.0-6.GA_CP08.ep1.3.el4.noarch.rpm rh-eap-docs-examples-4.2.0-6.GA_CP08.ep1.3.el4.noarch.rpm xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch.rpm xml-security-1.3.0-1.3.patch01.ep1.2.el4.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0217 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1380 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2405 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3554 http://www.redhat.com/security/updates/classification/#moderate http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/ 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLID0LXlSAg2UNWIIRAn2pAKC6voVHatiO/bZlerinYdiJtfRyUACfZi2H yNeR7dwaGuOXGO60Gsm2F/A= =jgd1 -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Dec 10 00:13:39 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 9 Dec 2009 19:13:39 -0500 Subject: [RHSA-2009:1649-01] Moderate: JBoss Enterprise Application Platform 4.3.0.CP07 update Message-ID: <200912100013.nBA0DdqD028919@int-mx03.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: JBoss Enterprise Application Platform 4.3.0.CP07 update Advisory ID: RHSA-2009:1649-01 Product: JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1649.html Issue date: 2009-12-09 CVE Names: CVE-2009-0217 CVE-2009-1380 CVE-2009-2405 CVE-2009-2625 CVE-2009-3554 ===================================================================== 1. Summary: Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix multiple security issues, several bugs, and add enhancements are now available for Red Hat Enterprise Linux 5 as JBEAP 4.3.0.CP07. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server - noarch 3. Description: JBoss Enterprise Application Platform is the market leading platform for innovative and scalable Java applications; integrating the JBoss Application Server, with JBoss Hibernate and JBoss Seam into a complete, simple enterprise solution. This release of JBEAP for Red Hat Enterprise Linux 5 serves as a replacement to JBEAP 4.3.0.CP06. These updated packages include bug fixes and enhancements which are detailed in the Release Notes, available shortly from: http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/ The following security issues are also fixed with this release: A missing check for the recommended minimum length of the truncated form of HMAC-based XML signatures was found in xml-security. An attacker could use this flaw to create a specially-crafted XML file that forges an XML signature, allowing the attacker to bypass authentication that is based on the XML Signature specification. (CVE-2009-0217) Swatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss Application Server Web Console. An attacker could use these flaws to present misleading data to an authenticated user, or execute arbitrary scripting code in the context of the authenticated user's browser session. (CVE-2009-2405) A flaw was found in the way the Apache Xerces2 Java Parser processed the SYSTEM identifier in DTDs. A remote attacker could provide a specially-crafted XML file, which once parsed by an application using the Apache Xerces2 Java Parser, would lead to a denial of service (application hang due to excessive CPU use). (CVE-2009-2625) An information leak flaw was found in the twiddle command line client. The JMX password was logged in plain text to "twiddle.log". (CVE-2009-3554) An XSS flaw was found in the JMX Console. An attacker could use this flaw to present misleading data to an authenticated user, or execute arbitrary scripting code in the context of the authenticated user's browser session. (CVE-2009-1380) Warning: Before applying this update, please backup the JBEAP "server/[configuration]/deploy/" directory, and any other customized configuration files. All users of JBEAP 4.3 on Red Hat Enterprise Linux 5 are advised to upgrade to these updated packages. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 510023 - CVE-2009-2405 JBoss Application Server Web Console XSS 511224 - CVE-2009-1380 jbossas JMX-Console cross-site-scripting in filter parameter 511915 - CVE-2009-0217 xmlsec1, mono, xml-security-c, xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass 512921 - CVE-2009-2625 OpenJDK: XML parsing Denial-Of-Service (6845701) 532113 - Tracker bug for the EAP 4.3.0.cp07 release. 539495 - CVE-2009-3554 JBoss EAP Twiddle logs the JMX password 6. Package List: JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server: Source: glassfish-jaxb-2.1.4-1.12.patch03.1.ep1.el5.src.rpm glassfish-jsf-1.2_13-2.1.ep1.el5.src.rpm hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src.rpm hibernate3-annotations-3.3.1-1.11GA_CP02.ep1.el5.src.rpm hibernate3-entitymanager-3.3.2-2.5.1.ep1.el5.src.rpm jacorb-2.3.0-1jpp.ep1.9.1.el5.src.rpm jboss-aop-1.5.5-3.CP04.2.ep1.el5.src.rpm jboss-common-1.2.1-0jpp.ep1.3.el5.1.src.rpm jboss-messaging-1.4.0-3.SP3_CP09.4.ep1.el5.src.rpm jboss-remoting-2.2.3-3.SP1.ep1.el5.src.rpm jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src.rpm jboss-seam2-2.0.2.FP-1.ep1.18.el5.src.rpm jbossas-4.3.0-6.GA_CP07.4.2.ep1.el5.src.rpm jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src.rpm jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el5.src.rpm jbossws-2.0.1-4.SP2_CP07.2.1.ep1.el5.src.rpm jbossws-common-1.0.0-2.GA_CP05.1.ep1.el5.src.rpm jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el5.src.rpm jcommon-1.0.16-1.1.ep1.el5.src.rpm jfreechart-1.0.13-2.3.1.ep1.el5.src.rpm jgroups-2.4.7-1.ep1.el5.src.rpm quartz-1.5.2-1jpp.patch01.ep1.4.1.el5.src.rpm rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el5.src.rpm xml-security-1.3.0-1.3.patch01.ep1.2.1.el5.src.rpm noarch: glassfish-jaxb-2.1.4-1.12.patch03.1.ep1.el5.noarch.rpm glassfish-jaxb-javadoc-2.1.4-1.12.patch03.1.ep1.el5.noarch.rpm glassfish-jsf-1.2_13-2.1.ep1.el5.noarch.rpm hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch.rpm hibernate3-annotations-3.3.1-1.11GA_CP02.ep1.el5.noarch.rpm hibernate3-annotations-javadoc-3.3.1-1.11GA_CP02.ep1.el5.noarch.rpm hibernate3-entitymanager-3.3.2-2.5.1.ep1.el5.noarch.rpm hibernate3-entitymanager-javadoc-3.3.2-2.5.1.ep1.el5.noarch.rpm hibernate3-javadoc-3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch.rpm jacorb-2.3.0-1jpp.ep1.9.1.el5.noarch.rpm jboss-aop-1.5.5-3.CP04.2.ep1.el5.noarch.rpm jboss-common-1.2.1-0jpp.ep1.3.el5.1.noarch.rpm jboss-messaging-1.4.0-3.SP3_CP09.4.ep1.el5.noarch.rpm jboss-remoting-2.2.3-3.SP1.ep1.el5.noarch.rpm jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch.rpm jboss-seam-docs-1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch.rpm jboss-seam2-2.0.2.FP-1.ep1.18.el5.noarch.rpm jboss-seam2-docs-2.0.2.FP-1.ep1.18.el5.noarch.rpm jbossas-4.3.0-6.GA_CP07.4.2.ep1.el5.noarch.rpm jbossas-4.3.0.GA_CP07-bin-4.3.0-6.GA_CP07.4.2.ep1.el5.noarch.rpm jbossas-client-4.3.0-6.GA_CP07.4.2.ep1.el5.noarch.rpm jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch.rpm jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el5.noarch.rpm jbossws-2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch.rpm jbossws-common-1.0.0-2.GA_CP05.1.ep1.el5.noarch.rpm jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el5.noarch.rpm jbossws-native42-2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch.rpm jcommon-1.0.16-1.1.ep1.el5.noarch.rpm jfreechart-1.0.13-2.3.1.ep1.el5.noarch.rpm jgroups-2.4.7-1.ep1.el5.noarch.rpm quartz-1.5.2-1jpp.patch01.ep1.4.1.el5.noarch.rpm rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el5.noarch.rpm rh-eap-docs-examples-4.3.0-6.GA_CP07.ep1.3.el5.noarch.rpm xml-security-1.3.0-1.3.patch01.ep1.2.1.el5.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0217 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1380 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2405 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3554 http://www.redhat.com/security/updates/classification/#moderate http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/ 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLID0pXlSAg2UNWIIRAhC3AJ4sa9pslMmMeqakNNqmniOdBm2jgACfYc43 kAdhZnEh5S+JpI+B8Xjpjq4= =XE/m -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Dec 10 00:13:55 2009 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 9 Dec 2009 19:13:55 -0500 Subject: [RHSA-2009:1650-01] Moderate: JBoss Enterprise Application Platform 4.2.0.CP08 update Message-ID: <200912100013.nBA0Dt0m012290@int-mx01.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: JBoss Enterprise Application Platform 4.2.0.CP08 update Advisory ID: RHSA-2009:1650-01 Product: JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1650.html Issue date: 2009-12-09 CVE Names: CVE-2009-0217 CVE-2009-1380 CVE-2009-2405 CVE-2009-2625 CVE-2009-3554 ===================================================================== 1. Summary: Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix multiple security issues, several bugs, and add enhancements are now available for Red Hat Enterprise Linux 5 as JBEAP 4.2.0.CP08. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: JBoss Enterprise Application Platform for RHEL 5 Server - noarch 3. Description: JBoss Enterprise Application Platform is the market leading platform for innovative and scalable Java applications; integrating the JBoss Application Server, with JBoss Hibernate and JBoss Seam into a complete, simple enterprise solution. This release of JBEAP for Red Hat Enterprise Linux 5 serves as a replacement to JBEAP 4.2.0.CP07. These updated packages include bug fixes and enhancements which are detailed in the Release Notes, available shortly from: http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/ The following security issues are also fixed with this release: A missing check for the recommended minimum length of the truncated form of HMAC-based XML signatures was found in xml-security. An attacker could use this flaw to create a specially-crafted XML file that forges an XML signature, allowing the attacker to bypass authentication that is based on the XML Signature specification. (CVE-2009-0217) Swatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss Application Server Web Console. An attacker could use these flaws to present misleading data to an authenticated user, or execute arbitrary scripting code in the context of the authenticated user's browser session. (CVE-2009-2405) A flaw was found in the way the Apache Xerces2 Java Parser processed the SYSTEM identifier in DTDs. A remote attacker could provide a specially-crafted XML file, which once parsed by an application using the Apache Xerces2 Java Parser, would lead to a denial of service (application hang due to excessive CPU use). (CVE-2009-2625) An information leak flaw was found in the twiddle command line client. The JMX password was logged in plain text to "twiddle.log". (CVE-2009-3554) An XSS flaw was found in the JMX Console. An attacker could use this flaw to present misleading data to an authenticated user, or execute arbitrary scripting code in the context of the authenticated user's browser session. (CVE-2009-1380) Warning: Before applying this update, please backup the JBEAP "server/[configuration]/deploy/" directory, and any other customized configuration files. All users of JBEAP 4.2 on Red Hat Enterprise Linux 5 are advised to upgrade to these updated packages. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 510023 - CVE-2009-2405 JBoss Application Server Web Console XSS 511224 - CVE-2009-1380 jbossas JMX-Console cross-site-scripting in filter parameter 511915 - CVE-2009-0217 xmlsec1, mono, xml-security-c, xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass 512921 - CVE-2009-2625 OpenJDK: XML parsing Denial-Of-Service (6845701) 532111 - Tracker bug for the EAP 4.2.0.cp08 release for RHEL-5. 539495 - CVE-2009-3554 JBoss EAP Twiddle logs the JMX password 6. Package List: JBoss Enterprise Application Platform for RHEL 5 Server: Source: glassfish-jsf-1.2_13-2.1.ep1.el5.src.rpm hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src.rpm hibernate3-annotations-3.3.1-1.11GA_CP02.ep1.el5.src.rpm hibernate3-entitymanager-3.3.2-2.5.1.ep1.el5.src.rpm jacorb-2.3.0-1jpp.ep1.9.1.el5.src.rpm jboss-aop-1.5.5-3.CP04.2.ep1.el5.src.rpm jboss-common-1.2.1-0jpp.ep1.3.el5.1.src.rpm jboss-remoting-2.2.3-3.SP1.ep1.el5.src.rpm jboss-seam-1.2.1-1.ep1.14.el5.src.rpm jbossas-4.2.0-5.GA_CP08.5.2.ep1.el5.src.rpm jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src.rpm jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el5.src.rpm jcommon-1.0.16-1.1.ep1.el5.src.rpm jfreechart-1.0.13-2.3.1.ep1.el5.src.rpm jgroups-2.4.7-1.ep1.el5.src.rpm quartz-1.5.2-1jpp.patch01.ep1.4.1.el5.src.rpm rh-eap-docs-4.2.0-6.GA_CP08.ep1.3.el5.src.rpm xml-security-1.3.0-1.3.patch01.ep1.2.1.el5.src.rpm noarch: glassfish-jsf-1.2_13-2.1.ep1.el5.noarch.rpm hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch.rpm hibernate3-annotations-3.3.1-1.11GA_CP02.ep1.el5.noarch.rpm hibernate3-annotations-javadoc-3.3.1-1.11GA_CP02.ep1.el5.noarch.rpm hibernate3-entitymanager-3.3.2-2.5.1.ep1.el5.noarch.rpm hibernate3-entitymanager-javadoc-3.3.2-2.5.1.ep1.el5.noarch.rpm hibernate3-javadoc-3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch.rpm jacorb-2.3.0-1jpp.ep1.9.1.el5.noarch.rpm jboss-aop-1.5.5-3.CP04.2.ep1.el5.noarch.rpm jboss-common-1.2.1-0jpp.ep1.3.el5.1.noarch.rpm jboss-remoting-2.2.3-3.SP1.ep1.el5.noarch.rpm jboss-seam-1.2.1-1.ep1.14.el5.noarch.rpm jboss-seam-docs-1.2.1-1.ep1.14.el5.noarch.rpm jbossas-4.2.0-5.GA_CP08.5.2.ep1.el5.noarch.rpm jbossas-4.2.0.GA_CP08-bin-4.2.0-5.GA_CP08.5.2.ep1.el5.noarch.rpm jbossas-client-4.2.0-5.GA_CP08.5.2.ep1.el5.noarch.rpm jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch.rpm jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el5.noarch.rpm jcommon-1.0.16-1.1.ep1.el5.noarch.rpm jfreechart-1.0.13-2.3.1.ep1.el5.noarch.rpm jgroups-2.4.7-1.ep1.el5.noarch.rpm quartz-1.5.2-1jpp.patch01.ep1.4.1.el5.noarch.rpm rh-eap-docs-4.2.0-6.GA_CP08.ep1.3.el5.noarch.rpm rh-eap-docs-examples-4.2.0-6.GA_CP08.ep1.3.el5.noarch.rpm xml-security-1.3.0-1.3.patch01.ep1.2.1.el5.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0217 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1380 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2405 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3554 http://www.redhat.com/security/updates/classification/#moderate http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/ 8. Contact: The Red Hat security contact is . More contact details at https://www.redhat.com/security/team/contact/ Copyright 2009 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFLID04XlSAg2UNWIIRAonRAJ4mQnC0YMPnQHQ1qeBYrkKkVU/d/gCgrQTW 2W2lojTMV1aP2aOzFtXZRrA= =YwY8 -----END PGP SIGNATURE-----