[RHSA-2013:0191-01] Important: JBoss Enterprise Application Platform 5.2.0 update

bugzilla at redhat.com bugzilla at redhat.com
Thu Jan 24 19:19:01 UTC 2013


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: JBoss Enterprise Application Platform 5.2.0 update
Advisory ID:       RHSA-2013:0191-01
Product:           JBoss Enterprise Application Platform
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2013-0191.html
Issue date:        2013-01-24
CVE Names:         CVE-2009-5066 CVE-2011-1096 CVE-2011-2487 
                   CVE-2011-2730 CVE-2011-2908 CVE-2011-4575 
                   CVE-2012-0034 CVE-2012-0874 CVE-2012-2377 
                   CVE-2012-2379 CVE-2012-3369 CVE-2012-3370 
                   CVE-2012-3546 CVE-2012-5478 
=====================================================================

1. Summary:

Updated JBoss Enterprise Application Platform 5.2.0 packages that fix
multiple security issues, various bugs, and add several enhancements are
now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

This JBoss Enterprise Application Platform 5.2.0 release serves as a
replacement for JBoss Enterprise Application Platform 5.1.2, and includes
bug fixes and enhancements. Refer to the JBoss Enterprise Application
Platform 5.2.0 Release Notes for information on the most significant of
these changes. The Release Notes will be available shortly from
https://access.redhat.com/knowledge/docs/

2. Relevant releases/architectures:

JBoss Enterprise Application Platform 5 for RHEL 6 Server - i386, noarch, x86_64

3. Description:

An attack technique against the W3C XML Encryption Standard when block
ciphers were used in CBC mode could allow a remote attacker to conduct
chosen-ciphertext attacks, leading to the recovery of the entire plain text
of a particular cryptogram. (CVE-2011-1096)

JBoss Web Services leaked side-channel data when distributing symmetric
keys (for XML encryption), allowing a remote attacker to recover the entire
plain text form of a symmetric key. (CVE-2011-2487)

Spring framework could possibly evaluate Expression Language (EL)
expressions twice, allowing a remote attacker to execute arbitrary code in
the context of the application server, or to obtain sensitive information
from the server. Manual action is required to apply this fix. Refer to the
Solution section. (CVE-2011-2730)

Apache CXF checked to ensure XML elements were signed or encrypted by a
Supporting Token, but not whether the correct token was used. A remote
attacker could transmit confidential information without the appropriate
security, and potentially circumvent access controls on web services
exposed via Apache CXF. Refer to the Solution section for details.
(CVE-2012-2379)

When an application used FORM authentication, along with another component
that calls request.setUserPrincipal() before the call to
FormAuthenticator#authenticate() (such as the Single-Sign-On valve), it was
possible to bypass the security constraint checks in the FORM authenticator
by appending "/j_security_check" to the end of a URL. (CVE-2012-3546)

The JMX Console was vulnerable to CSRF attacks, allowing a remote attacker
to hijack the authenticated JMX Console session of an administrator.
(CVE-2011-2908)

An XSS flaw allowed a remote attacker to perform an XSS attack against
victims using the JMX Console. (CVE-2011-4575)

SecurityAssociation.getCredential() returned the previous credential if
no security context was provided. Depending on the deployed applications,
this could possibly allow a remote attacker to hijack the credentials of a
previously-authenticated user. (CVE-2012-3370)

Configuring the JMX Invoker to restrict access to users with specific
roles did not actually restrict access, allowing remote attackers with
valid JMX Invoker credentials to perform JMX operations accessible to
roles they are not a member of. (CVE-2012-5478)

twiddle.sh accepted credentials as command line arguments, allowing local
users to view them via a process listing. (CVE-2009-5066)

NonManagedConnectionFactory logged the username and password in plain text
when an exception was thrown. This could lead to the exposure of
authentication credentials if local users had permissions to read the log
file. (CVE-2012-0034)

The JMXInvokerHAServlet and EJBInvokerHAServlet invoker servlets allow
unauthenticated access by default in some profiles. The security
interceptor's second layer of authentication prevented direct exploitation
of this flaw. If the interceptor was misconfigured or inadvertently
disabled, this flaw could lead to arbitrary code execution in the context
of the user running the JBoss server. (CVE-2012-0874)

The JGroups diagnostics service was enabled with no authentication when a
JGroups channel was started, allowing attackers on the adjacent network to
read diagnostic information. (CVE-2012-2377)

CallerIdentityLoginModule retained the password from the previous call if a
null password was provided. In non-default configurations this could
possibly lead to a remote attacker hijacking a previously-authenticated
user's session. (CVE-2012-3369)

Red Hat would like to thank Juraj Somorovsky of Ruhr-University Bochum for
reporting CVE-2011-1096 and CVE-2011-2487; the Apache CXF project for
reporting CVE-2012-2379; and Tyler Krpata for reporting CVE-2011-4575.
CVE-2012-3370 and CVE-2012-3369 were discovered by Carlo de Wolf of Red
Hat; CVE-2012-5478 discovered by Derek Horton of Red Hat; CVE-2012-0874
discovered by David Jorm of Red Hat; and CVE-2012-2377 was discovered by
Red Hat.

4. Solution:

Note: Manual action is required to apply the fix for CVE-2011-2730. If your
system has deployed applications which use Spring framework, the context
parameter "springJspExpressionSupport" must be set to "false" to mitigate
this flaw, for example, in the application's web.xml file. This will
prevent the double-evaluation of EL expressions that led to this flaw.

CVE-2012-2379 has been addressed by disabling the affected configuration in
this release. If you use the affected configuration, an exception will be
thrown and the relevant application will not deploy to the server. A patch
that allows the affected configuration to be used without this
vulnerability is available in JBoss Enterprise Application Platform 6.0.1.

Warning: Before applying this update, back up your existing JBoss
Enterprise Application Platform installation (including all applications
and configuration files).

All users of JBoss Enterprise Application Platform 5.1.2 on Red Hat
Enterprise Linux 6 are advised to upgrade to these updated packages. The
JBoss server process must be restarted for the update to take effect.

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

5. Bugs fixed (http://bugzilla.redhat.com/):

681916 - CVE-2011-1096 jbossws: Prone to character encoding pattern attack (XML Encryption flaw)
713539 - CVE-2011-2487 jbossws: Prone to Bleichenbacher attack against to be distributed symmetric key
730176 - CVE-2011-2908 CSRF on jmx-console allows invocation of operations on mbeans
737608 - CVE-2011-2730 Spring Framework: Information (internal server information, classpath, local working directories, session IDs) disclosure
760387 - CVE-2011-4575 JMX Console: XSS in invoke operation
772835 - CVE-2012-0034 JBoss Cache: NonManagedConnectionFactory will log password in clear text when an exception occurs
795645 - CVE-2012-0874 JBoss invoker servlets do not require authentication
823392 - CVE-2012-2377 JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started
826534 - CVE-2012-2379 jbossws-cxf, apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token
836451 - CVE-2012-3369 JBoss: CallerIdentityLoginModule retaining password from previous call if a null password is provided
836456 - CVE-2012-3370 JBoss: SecurityAssociation.getCredential() will return the previous credential if no security context is provided
842477 - CVE-2009-5066 JBoss: twiddle.sh accepts credentials as command line arguments, exposing them to other local users via a process listing
848486 - Tracker bug for the EAP 5.2.0 release for RHEL-6.
874349 - CVE-2012-5478 JBoss: AuthorizationInterceptor allows JMX operation to proceed despite authorization failure
883634 - CVE-2012-3546 Tomcat/JBoss Web: Bypass of security constraints

6. Package List:

JBoss Enterprise Application Platform 5 for RHEL 6 Server:

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/aopalliance-1.0-5.3.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/apache-cxf-2.2.12-6.1.patch_04.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/bsh2-2.0-0.b4.15.patch01.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/glassfish-jaxb-2.1.12-12_patch_03.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/google-guice-2.0-3.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/hibernate3-3.3.2-1.9.GA_CP05.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/hibernate3-annotations-3.4.0-3.6.GA_CP05.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/hibernate3-entitymanager-3.4.0-4.5.GA_CP05.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/hibernate3-search-3.1.1-2.5.GA_CP05.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/hornetq-2.2.24-1.EAP.GA.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/hornetq-native-2.2.20-1.EAP.GA.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/hsqldb-1.8.0.10-11_patch_01.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jacorb-jboss-2.3.2-2.jboss_1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/javassist-3.12.0-6.SP1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-aop2-2.1.6-5.CP06.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-bootstrap-1.0.2-1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-cache-core-3.2.11-1.GA.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-cache-pojo-3.0.1-1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-cl-2.0.11-4.GA.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-cluster-ha-server-api-1.2.1-2.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-common-beans-1.0.1-2.Final.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-common-core-2.2.21-1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-eap5-native-5.2.0-6.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-ejb3-cache-1.0.0-4.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-ejb3-core-1.3.9-0.4.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-ejb3-ext-api-1.0.0-4.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-ejb3-ext-api-impl-1.0.0-3.7.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-ejb3-interceptors-1.0.9-0.2.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-ejb3-metadata-1.0.0-3.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-ejb3-metrics-deployer-1.1.1-0.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-ejb3-security-1.0.2-0.5.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-ejb3-timeout-0.1.1-0.8.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-ejb3-transactions-1.0.2-1.6.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-javaee-5.0.2-2.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-jaxrpc-api_1.1_spec-1.0.0-16.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-jpa-deployers-1.0.0-6.SP2.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-logmanager-1.1.2-6.GA_patch_01.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-messaging-1.4.8-12.SP9.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-naming-5.0.3-5.CP02.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-reflect-2.0.4-2.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-remoting-2.5.4-10.SP4.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-seam2-2.2.6.EAP5-14.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-security-negotiation-2.1.3-1.GA.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-security-spi-2.0.5-4.SP3_1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-vfs2-2.2.1-4.GA.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossas-5.2.0-16.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossas-hornetq-5.2.0-7.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossas-tp-licenses-5.2.0-8.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossas-ws-cxf-5.2.0-10.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbosssx2-2.0.5-8.3.SP3_1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossts-4.6.1-12.CP13.7.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossweb-2.1.13-2_patch_01.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossws-3.1.2-13.SP15_patch_01.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossws-common-1.1.0-9.SP10.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossws-framework-3.1.2-9.SP13.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossws-spi-1.1.2-6.SP8.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jgroups-2.6.22-1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jopr-embedded-1.3.4-19.SP6.9.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jopr-hibernate-plugin-3.0.0-14.EmbJopr5.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jopr-jboss-as-5-plugin-3.0.0-16.EmbJopr5.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jopr-jboss-cache-v3-plugin-3.0.0-15.EmbJopr5.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/mod_cluster-1.0.10-12.2.GA_CP04.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/mod_cluster-native-1.0.10-10.GA_CP04_patch01.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/netty-3.2.5-6.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/picketlink-federation-2.1.5-3.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/picketlink-quickstarts-2.1.5-1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/resteasy-1.2.1-17.CP02_patch02.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/rh-eap-docs-5.2.0-10.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/rhq-3.0.0-21.EmbJopr5.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/rhq-jmx-plugin-3.0.0-21.EmbJopr5.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/rhq-platform-plugin-3.0.0-14.EmbJopr5.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/spring2-2.5.6-9.SEC03.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/wss4j-1.5.12-4_patch_02.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/xerces-j2-2.9.1-10.patch02.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/xml-commons-1.3.04-8.2_patch_01.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/xml-security-1.5.1-2.ep5.el6.src.rpm

i386:
hornetq-native-2.2.20-1.EAP.GA.ep5.el6.i386.rpm
hornetq-native-debuginfo-2.2.20-1.EAP.GA.ep5.el6.i386.rpm
jboss-eap5-native-5.2.0-6.ep5.el6.i386.rpm
mod_cluster-native-1.0.10-10.GA_CP04_patch01.ep5.el6.i386.rpm
mod_cluster-native-debuginfo-1.0.10-10.GA_CP04_patch01.ep5.el6.i386.rpm

noarch:
aopalliance-1.0-5.3.ep5.el6.noarch.rpm
apache-cxf-2.2.12-6.1.patch_04.ep5.el6.noarch.rpm
bsh2-2.0-0.b4.15.patch01.ep5.el6.noarch.rpm
bsh2-bsf-2.0-0.b4.15.patch01.ep5.el6.noarch.rpm
glassfish-jaxb-2.1.12-12_patch_03.ep5.el6.noarch.rpm
google-guice-2.0-3.ep5.el6.noarch.rpm
hibernate3-3.3.2-1.9.GA_CP05.ep5.el6.noarch.rpm
hibernate3-annotations-3.4.0-3.6.GA_CP05.ep5.el6.noarch.rpm
hibernate3-annotations-javadoc-3.4.0-3.6.GA_CP05.ep5.el6.noarch.rpm
hibernate3-entitymanager-3.4.0-4.5.GA_CP05.ep5.el6.noarch.rpm
hibernate3-entitymanager-javadoc-3.4.0-4.5.GA_CP05.ep5.el6.noarch.rpm
hibernate3-javadoc-3.3.2-1.9.GA_CP05.ep5.el6.noarch.rpm
hibernate3-search-3.1.1-2.5.GA_CP05.ep5.el6.noarch.rpm
hibernate3-search-javadoc-3.1.1-2.5.GA_CP05.ep5.el6.noarch.rpm
hornetq-2.2.24-1.EAP.GA.ep5.el6.noarch.rpm
hsqldb-1.8.0.10-11_patch_01.1.ep5.el6.noarch.rpm
jacorb-jboss-2.3.2-2.jboss_1.ep5.el6.noarch.rpm
javassist-3.12.0-6.SP1.ep5.el6.noarch.rpm
jboss-aop2-2.1.6-5.CP06.ep5.el6.noarch.rpm
jboss-bootstrap-1.0.2-1.ep5.el6.noarch.rpm
jboss-cache-core-3.2.11-1.GA.ep5.el6.noarch.rpm
jboss-cache-pojo-3.0.1-1.ep5.el6.noarch.rpm
jboss-cl-2.0.11-4.GA.ep5.el6.noarch.rpm
jboss-cluster-ha-server-api-1.2.1-2.ep5.el6.noarch.rpm
jboss-common-beans-1.0.1-2.Final.ep5.el6.noarch.rpm
jboss-common-core-2.2.21-1.ep5.el6.noarch.rpm
jboss-ejb-3.0-api-5.0.2-2.ep5.el6.noarch.rpm
jboss-ejb3-cache-1.0.0-4.ep5.el6.noarch.rpm
jboss-ejb3-core-1.3.9-0.4.ep5.el6.noarch.rpm
jboss-ejb3-ext-api-1.0.0-4.1.ep5.el6.noarch.rpm
jboss-ejb3-ext-api-impl-1.0.0-3.7.ep5.el6.noarch.rpm
jboss-ejb3-interceptors-1.0.9-0.2.ep5.el6.noarch.rpm
jboss-ejb3-metadata-1.0.0-3.ep5.el6.noarch.rpm
jboss-ejb3-metrics-deployer-1.1.1-0.1.ep5.el6.noarch.rpm
jboss-ejb3-security-1.0.2-0.5.ep5.el6.noarch.rpm
jboss-ejb3-timeout-0.1.1-0.8.ep5.el6.noarch.rpm
jboss-ejb3-timeout-3.0-api-0.1.1-0.8.ep5.el6.noarch.rpm
jboss-ejb3-timeout-spi-0.1.1-0.8.ep5.el6.noarch.rpm
jboss-ejb3-transactions-1.0.2-1.6.ep5.el6.noarch.rpm
jboss-jacc-1.1-api-5.0.2-2.ep5.el6.noarch.rpm
jboss-jad-1.2-api-5.0.2-2.ep5.el6.noarch.rpm
jboss-jaspi-1.0-api-5.0.2-2.ep5.el6.noarch.rpm
jboss-javaee-5.0.2-2.ep5.el6.noarch.rpm
jboss-javaee-poms-5.0.2-2.ep5.el6.noarch.rpm
jboss-jaxrpc-api_1.1_spec-1.0.0-16.ep5.el6.noarch.rpm
jboss-jca-1.5-api-5.0.2-2.ep5.el6.noarch.rpm
jboss-jms-1.1-api-5.0.2-2.ep5.el6.noarch.rpm
jboss-jpa-deployers-1.0.0-6.SP2.ep5.el6.noarch.rpm
jboss-logmanager-1.1.2-6.GA_patch_01.ep5.el6.noarch.rpm
jboss-messaging-1.4.8-12.SP9.1.ep5.el6.noarch.rpm
jboss-naming-5.0.3-5.CP02.ep5.el6.noarch.rpm
jboss-reflect-2.0.4-2.ep5.el6.noarch.rpm
jboss-remoting-2.5.4-10.SP4.1.ep5.el6.noarch.rpm
jboss-seam2-2.2.6.EAP5-14.ep5.el6.noarch.rpm
jboss-seam2-docs-2.2.6.EAP5-14.ep5.el6.noarch.rpm
jboss-seam2-examples-2.2.6.EAP5-14.ep5.el6.noarch.rpm
jboss-seam2-runtime-2.2.6.EAP5-14.ep5.el6.noarch.rpm
jboss-security-negotiation-2.1.3-1.GA.ep5.el6.noarch.rpm
jboss-security-spi-2.0.5-4.SP3_1.ep5.el6.noarch.rpm
jboss-transaction-1.0.1-api-5.0.2-2.ep5.el6.noarch.rpm
jboss-vfs2-2.2.1-4.GA.ep5.el6.noarch.rpm
jbossas-5.2.0-16.ep5.el6.noarch.rpm
jbossas-client-5.2.0-16.ep5.el6.noarch.rpm
jbossas-hornetq-5.2.0-7.ep5.el6.noarch.rpm
jbossas-messaging-5.2.0-16.ep5.el6.noarch.rpm
jbossas-tp-licenses-5.2.0-8.ep5.el6.noarch.rpm
jbossas-ws-cxf-5.2.0-10.ep5.el6.noarch.rpm
jbossas-ws-native-5.2.0-16.ep5.el6.noarch.rpm
jbosssx2-2.0.5-8.3.SP3_1.ep5.el6.noarch.rpm
jbossts-4.6.1-12.CP13.7.ep5.el6.noarch.rpm
jbossts-javadoc-4.6.1-12.CP13.7.ep5.el6.noarch.rpm
jbossweb-2.1.13-2_patch_01.ep5.el6.noarch.rpm
jbossweb-el-1.0-api-2.1.13-2_patch_01.ep5.el6.noarch.rpm
jbossweb-jsp-2.1-api-2.1.13-2_patch_01.ep5.el6.noarch.rpm
jbossweb-lib-2.1.13-2_patch_01.ep5.el6.noarch.rpm
jbossweb-servlet-2.5-api-2.1.13-2_patch_01.ep5.el6.noarch.rpm
jbossws-3.1.2-13.SP15_patch_01.ep5.el6.noarch.rpm
jbossws-common-1.1.0-9.SP10.ep5.el6.noarch.rpm
jbossws-framework-3.1.2-9.SP13.ep5.el6.noarch.rpm
jbossws-spi-1.1.2-6.SP8.ep5.el6.noarch.rpm
jgroups-2.6.22-1.ep5.el6.noarch.rpm
jopr-embedded-1.3.4-19.SP6.9.ep5.el6.noarch.rpm
jopr-hibernate-plugin-3.0.0-14.EmbJopr5.ep5.el6.noarch.rpm
jopr-jboss-as-5-plugin-3.0.0-16.EmbJopr5.ep5.el6.noarch.rpm
jopr-jboss-cache-v3-plugin-3.0.0-15.EmbJopr5.ep5.el6.noarch.rpm
mod_cluster-demo-1.0.10-12.2.GA_CP04.ep5.el6.noarch.rpm
mod_cluster-jbossas-1.0.10-12.2.GA_CP04.ep5.el6.noarch.rpm
mod_cluster-jbossweb2-1.0.10-12.2.GA_CP04.ep5.el6.noarch.rpm
mod_cluster-tomcat6-1.0.10-12.2.GA_CP04.ep5.el6.noarch.rpm
netty-3.2.5-6.ep5.el6.noarch.rpm
picketlink-federation-2.1.5-3.ep5.el6.noarch.rpm
picketlink-quickstarts-2.1.5-1.ep5.el6.noarch.rpm
picketlink-quickstarts-idp-2.1.5-1.ep5.el6.noarch.rpm
picketlink-quickstarts-pdp-2.1.5-1.ep5.el6.noarch.rpm
picketlink-quickstarts-sts-2.1.5-1.ep5.el6.noarch.rpm
resteasy-1.2.1-17.CP02_patch02.1.ep5.el6.noarch.rpm
resteasy-examples-1.2.1-17.CP02_patch02.1.ep5.el6.noarch.rpm
resteasy-javadoc-1.2.1-17.CP02_patch02.1.ep5.el6.noarch.rpm
resteasy-manual-1.2.1-17.CP02_patch02.1.ep5.el6.noarch.rpm
rh-eap-docs-5.2.0-10.ep5.el6.noarch.rpm
rh-eap-docs-examples-5.2.0-10.ep5.el6.noarch.rpm
rhq-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-ant-bundle-common-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-common-parent-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-core-client-api-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-core-comm-api-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-core-dbutils-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-core-domain-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-core-gui-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-core-native-system-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-core-parent-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-core-plugin-api-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-core-plugin-container-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-core-plugindoc-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-core-util-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-filetemplate-bundle-common-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-helpers-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-jboss-as-common-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-jmx-plugin-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-modules-parent-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-parent-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-platform-plugin-3.0.0-14.EmbJopr5.ep5.el6.noarch.rpm
rhq-plugin-validator-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-pluginAnnotations-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-pluginGen-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-plugins-parent-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
rhq-rtfilter-3.0.0-21.EmbJopr5.ep5.el6.noarch.rpm
spring2-2.5.6-9.SEC03.1.ep5.el6.noarch.rpm
spring2-agent-2.5.6-9.SEC03.1.ep5.el6.noarch.rpm
spring2-all-2.5.6-9.SEC03.1.ep5.el6.noarch.rpm
spring2-aop-2.5.6-9.SEC03.1.ep5.el6.noarch.rpm
spring2-beans-2.5.6-9.SEC03.1.ep5.el6.noarch.rpm
spring2-context-2.5.6-9.SEC03.1.ep5.el6.noarch.rpm
spring2-core-2.5.6-9.SEC03.1.ep5.el6.noarch.rpm
wss4j-1.5.12-4_patch_02.ep5.el6.noarch.rpm
xerces-j2-2.9.1-10.patch02.ep5.el6.noarch.rpm
xerces-j2-scripts-2.9.1-10.patch02.ep5.el6.noarch.rpm
xml-commons-1.3.04-8.2_patch_01.ep5.el6.noarch.rpm
xml-commons-jaxp-1.1-apis-1.3.04-8.2_patch_01.ep5.el6.noarch.rpm
xml-commons-jaxp-1.2-apis-1.3.04-8.2_patch_01.ep5.el6.noarch.rpm
xml-commons-jaxp-1.3-apis-1.3.04-8.2_patch_01.ep5.el6.noarch.rpm
xml-commons-resolver10-1.3.04-8.2_patch_01.ep5.el6.noarch.rpm
xml-commons-resolver11-1.3.04-8.2_patch_01.ep5.el6.noarch.rpm
xml-commons-resolver12-1.3.04-8.2_patch_01.ep5.el6.noarch.rpm
xml-commons-which10-1.3.04-8.2_patch_01.ep5.el6.noarch.rpm
xml-commons-which11-1.3.04-8.2_patch_01.ep5.el6.noarch.rpm
xml-security-1.5.1-2.ep5.el6.noarch.rpm

x86_64:
hornetq-native-2.2.20-1.EAP.GA.ep5.el6.x86_64.rpm
hornetq-native-debuginfo-2.2.20-1.EAP.GA.ep5.el6.x86_64.rpm
jboss-eap5-native-5.2.0-6.ep5.el6.x86_64.rpm
mod_cluster-native-1.0.10-10.GA_CP04_patch01.ep5.el6.x86_64.rpm
mod_cluster-native-debuginfo-1.0.10-10.GA_CP04_patch01.ep5.el6.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2009-5066.html
https://www.redhat.com/security/data/cve/CVE-2011-1096.html
https://www.redhat.com/security/data/cve/CVE-2011-2487.html
https://www.redhat.com/security/data/cve/CVE-2011-2730.html
https://www.redhat.com/security/data/cve/CVE-2011-2908.html
https://www.redhat.com/security/data/cve/CVE-2011-4575.html
https://www.redhat.com/security/data/cve/CVE-2012-0034.html
https://www.redhat.com/security/data/cve/CVE-2012-0874.html
https://www.redhat.com/security/data/cve/CVE-2012-2377.html
https://www.redhat.com/security/data/cve/CVE-2012-2379.html
https://www.redhat.com/security/data/cve/CVE-2012-3369.html
https://www.redhat.com/security/data/cve/CVE-2012-3370.html
https://www.redhat.com/security/data/cve/CVE-2012-3546.html
https://www.redhat.com/security/data/cve/CVE-2012-5478.html
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/knowledge/docs/

8. Contact:

The Red Hat security contact is <secalert at redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2013 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFRAYkRXlSAg2UNWIIRAo5EAJ42aCh8vOh6C1MOsyGjnkHCE0ziKwCfX5lU
6nT04dDpdE9Atf6KHO2XtWQ=
=TnvZ
-----END PGP SIGNATURE-----





More information about the Jboss-watch-list mailing list