[RHSA-2010:0964-01] Low: jboss-remoting security update

bugzilla at redhat.com bugzilla at redhat.com
Wed Dec 8 20:10:23 UTC 2010


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: jboss-remoting security update
Advisory ID:       RHSA-2010:0964-01
Product:           JBoss Enterprise Application Platform
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2010-0964.html
Issue date:        2010-12-08
CVE Names:         CVE-2010-4265 
=====================================================================

1. Summary:

An updated jboss-remoting package that fixes one security issue is now
available for JBoss Enterprise Application Platform 4.3 for Red Hat
Enterprise Linux 4 and 5.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS - noarch
JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES - noarch
JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server - noarch

3. Description:

JBoss Remoting is a framework for building distributed applications in
Java.

The JBoss Enterprise Application Platform 4.3.0.CP09 updates RHSA-2010:0937
and RHSA-2010:0938 did not, unlike the errata texts stated, provide a fix
for CVE-2010-3862. A remote attacker could use specially-crafted input to
cause the JBoss Remoting listeners to become unresponsive, resulting in a
denial of service condition for services communicating via JBoss Remoting
sockets. (CVE-2010-4265)

Red Hat would like to thank Ole Husgaard of eXerp.com for reporting this
issue.

Warning: Before applying this update, backup your existing JBoss Enterprise
Application Platform installation (including all applications and
configuration files).

Users of JBoss Enterprise Application Platform 4.3 on Red Hat Enterprise
Linux 4 and 5 should upgrade to this updated package, which contains a
backported patch to correct this issue. The JBoss server process must be
restarted for this update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

660623 - CVE-2010-4265 jboss-remoting: missing fix for CVE-2010-3862

6. Package List:

JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS:

Source:
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-remoting-2.2.3-4.SP3.ep1.1.el4.src.rpm

noarch:
jboss-remoting-2.2.3-4.SP3.ep1.1.el4.noarch.rpm

JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES:

Source:
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-remoting-2.2.3-4.SP3.ep1.1.el4.src.rpm

noarch:
jboss-remoting-2.2.3-4.SP3.ep1.1.el4.noarch.rpm

JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server:

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-remoting-2.2.3-4.SP3.ep1.1.el5.src.rpm

noarch:
jboss-remoting-2.2.3-4.SP3.ep1.1.el5.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2010-4265.html
https://access.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is <secalert at redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2010 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFM/+YEXlSAg2UNWIIRAqcdAJ9Nm4ktzkDp+EzXZiR6m15FWtDE9ACfZkUt
1Clx+txwJRhaSadVJ78R/1c=
=VtFr
-----END PGP SIGNATURE-----





More information about the Jboss-watch-list mailing list