From bugzilla at redhat.com Wed Feb 5 17:50:08 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 5 Feb 2014 17:50:08 +0000 Subject: [RHSA-2014:0140-01] Important: Apache Camel security update Message-ID: <201402051750.s15Ho822021844@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: Apache Camel security update Advisory ID: RHSA-2014:0140-01 Product: Red Hat JBoss Middleware Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0140.html Issue date: 2014-02-05 CVE Names: CVE-2013-4330 ===================================================================== 1. Summary: An update for the Apache Camel component that fixes one security issue is now available from the Red Hat Customer Portal for Red Hat JBoss BRMS 6.0.0, and Red Hat JBoss BPMS 6.0.0. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base score, which gives detailed severity rating, is available from the CVE link in the References section. 2. Description: Apache Camel is a versatile open-source integration framework based on known Enterprise Integration Patterns. A flaw was found in Apache Camel's parsing of the FILE_NAME header. A remote attacker able to submit messages to a Camel route, which would write the provided message to a file, could provide expression language (EL) expressions in the FILE_NAME header that would be evaluated on the server. This could lead to arbitrary remote code execution in the context of the Camel server process. (CVE-2013-4330) All users of the affected products as provided from the Red Hat Customer Portal are advised to apply this update. 3. Solution: The References section of this erratum contains download links (you must log in to download the updates). Before applying the updates, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. It is recommended to halt the server by stopping the JBoss Application Server process before installing this update, and then after installing the update, restart the server by starting the JBoss Application Server process. 4. Bugs fixed (https://bugzilla.redhat.com/): 1011726 - CVE-2013-4330 Camel: remote code execution via header field manipulation 5. References: https://www.redhat.com/security/data/cve/CVE-2013-4330.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms&downloadType=securityPatches&version=6.0.0 https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite&downloadType=securityPatches&version=6.0.0 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFS8nmBXlSAg2UNWIIRAv4lAJ92B71H12wb//F2z1DeCihtbZeZjQCgtn2p Rximu2TiChqlbZtrQuMwA/w= =koMj -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Feb 13 18:50:46 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 13 Feb 2014 18:50:46 +0000 Subject: [RHSA-2014:0170-01] Moderate: Red Hat JBoss Enterprise Application Platform 6.2.1 update Message-ID: <201402131850.s1DIoSuk023570@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 6.2.1 update Advisory ID: RHSA-2014:0170-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0170.html Issue date: 2014-02-13 CVE Names: CVE-2013-4517 CVE-2013-6440 CVE-2014-0018 ===================================================================== 1. Summary: Updated packages that provide Red Hat JBoss Enterprise Application Platform 6.2.1 and fix three security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat JBoss Enterprise Application Platform 6 for RHEL 5 Server - noarch Red Hat JBoss Enterprise Application Platform 6.2 for RHEL 5 Server - noarch 3. Description: Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was found that the ParserPool and Decrypter classes in the OpenSAML Java implementation resolved external entities, permitting XML External Entity (XXE) attacks. A remote attacker could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks. (CVE-2013-6440) It was discovered that the Apache Santuario XML Security for Java project allowed Document Type Definitions (DTDs) to be processed when applying Transforms even when secure validation was enabled. A remote attacker could use this flaw to exhaust all available memory on the system, causing a denial of service. (CVE-2013-4517) In Red Hat JBoss Enterprise Application Platform, when running under a security manager, it was possible for deployed code to get access to the Modular Service Container (MSC) service registry without any permission checks. This could allow malicious deployments to modify the internal state of the server in various ways. (CVE-2014-0018) The CVE-2013-6440 was discovered by David Illsley, Ron Gutierrez of Gotham Digital Science, and David Jorm of the Red Hat Security Response Team, and the CVE-2014-0018 issue was discovered by Stuart Douglas of Red Hat. This release serves as a replacement for JBoss Enterprise Application Platform 6.2.0, and includes bug fixes and enhancements. Documentation for these changes will be available shortly from the JBoss Enterprise Application Platform 6.2.1 Release Notes, linked to in the References. All users of Red Hat JBoss Enterprise Application Platform 6.2.0 on Red Hat Enterprise Linux 5 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Also, back up any customized Red Hat JBoss Enterprise Application Platform 6 configuration files. On update, the configuration files that have been locally modified will not be updated. The updated version of such files will be stored as the rpmnew files. Make sure to locate any such files after the update and merge any changes manually. For more details, refer to the Release Notes for Red Hat JBoss Enterprise Application Platform 6.2.1, available shortly from https://access.redhat.com/site/documentation/ This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1038643 - Tracker bug for the EAP 6.2.1 release for RHEL-5. 1043332 - CVE-2013-6440 XMLTooling-J/OpenSAML Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter 1045257 - CVE-2013-4517 Apache Santuario XML Security for Java: Java XML Signature DoS Attack 1052718 - RHEL5 RPMs: Upgrade jboss-logmanager to 1.5.2.Final-redhat-1 1052783 - CVE-2014-0018 jboss-as-server: Unchecked access to MSC Service Registry under JSM 1052989 - RHEL5 RPMs: Upgrade xml-security to 1.5.6.redhat-1 1053216 - RHEL5 RPMs: Upgrade hornetq to 2.3.14.Final-redhat-1 1053218 - RHEL5 RPMs: Upgrade jbossweb to 7.3.0.Final-redhat-1 1053224 - RHEL5 RPMs: Upgrade netty to 3.6.7.Final-redhat-1 1053229 - RHEL5 RPMs: Upgrade jboss-xnio-base to 3.0.9.GA-redhat-1 1053231 - RHEL5 RPMs: Upgrade jboss-marshalling to 1.4.3.Final-redhat-1 1053779 - RHEL5 RPMs: Upgrade weld-core to 1.1.17.Final-redhat-1 6. Package List: Red Hat JBoss Enterprise Application Platform 6 for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/hornetq-2.3.14-1.Final_redhat_1.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jacorb-jboss-2.3.2-13.redhat_6.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-appclient-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-cli-7.3.1-4.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-client-all-7.3.1-4.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-clustering-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-cmp-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-configadmin-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-connector-7.3.1-4.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-controller-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-controller-client-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-core-security-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-deployment-repository-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-deployment-scanner-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-domain-http-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-domain-management-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-ee-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-ee-deployment-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-ejb3-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-embedded-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-host-controller-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-jacorb-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-jaxr-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-jaxrs-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-jdr-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-jmx-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-jpa-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-jsf-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-jsr77-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-logging-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-mail-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-management-client-content-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-messaging-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-modcluster-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-naming-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-network-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-osgi-7.3.1-4.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-osgi-configadmin-7.3.1-4.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-osgi-service-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-platform-mbean-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-pojo-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-process-controller-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-protocol-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-remoting-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-sar-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-security-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-server-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-system-jmx-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-threads-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-transactions-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-version-7.3.1-4.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-web-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-webservices-7.3.1-3.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-weld-7.3.1-4.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-xts-7.3.1-2.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-logmanager-1.5.2-1.Final_redhat_1.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-marshalling-1.4.3-1.Final_redhat_1.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-xnio-base-3.0.9-1.GA_redhat_1.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossas-core-7.3.1-5.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossas-javadocs-7.3.1-3.Final_redhat_3.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossas-modules-eap-7.3.1-6.Final_redhat_3.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossweb-7.3.0-1.Final_redhat_1.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/netty-3.6.7-1.Final_redhat_1.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/picketbox-4.0.19-2.SP3_redhat_1.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/weld-core-1.1.17-1.Final_redhat_1.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/xml-security-1.5.6-1.redhat_1.1.ep6.el5.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/xmltooling-1.3.4-5.redhat_3.1.ep6.el5.src.rpm noarch: hornetq-2.3.14-1.Final_redhat_1.1.ep6.el5.noarch.rpm jacorb-jboss-2.3.2-13.redhat_6.1.ep6.el5.noarch.rpm jboss-as-appclient-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-cli-7.3.1-4.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-client-all-7.3.1-4.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-clustering-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-cmp-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-configadmin-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-connector-7.3.1-4.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-controller-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-controller-client-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-core-security-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-deployment-repository-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-deployment-scanner-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-domain-http-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-domain-management-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-ee-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-ee-deployment-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-ejb3-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-embedded-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-host-controller-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-jacorb-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-jaxr-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-jaxrs-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-jdr-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-jmx-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-jpa-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-jsf-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-jsr77-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-logging-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-mail-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-management-client-content-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-messaging-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-modcluster-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-naming-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-network-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-osgi-7.3.1-4.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-osgi-configadmin-7.3.1-4.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-osgi-service-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-platform-mbean-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-pojo-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-process-controller-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-protocol-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-remoting-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-sar-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-security-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-server-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-system-jmx-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-threads-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-transactions-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-version-7.3.1-4.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-web-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-webservices-7.3.1-3.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-weld-7.3.1-4.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-as-xts-7.3.1-2.Final_redhat_3.1.ep6.el5.noarch.rpm jboss-logmanager-1.5.2-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-marshalling-1.4.3-1.Final_redhat_1.1.ep6.el5.noarch.rpm jboss-xnio-base-3.0.9-1.GA_redhat_1.1.ep6.el5.noarch.rpm jbossas-core-7.3.1-5.Final_redhat_3.1.ep6.el5.noarch.rpm jbossas-javadocs-7.3.1-3.Final_redhat_3.ep6.el5.noarch.rpm jbossas-modules-eap-7.3.1-6.Final_redhat_3.1.ep6.el5.noarch.rpm jbossweb-7.3.0-1.Final_redhat_1.1.ep6.el5.noarch.rpm netty-3.6.7-1.Final_redhat_1.1.ep6.el5.noarch.rpm picketbox-4.0.19-2.SP3_redhat_1.1.ep6.el5.noarch.rpm weld-core-1.1.17-1.Final_redhat_1.1.ep6.el5.noarch.rpm xml-security-1.5.6-1.redhat_1.1.ep6.el5.noarch.rpm xmltooling-1.3.4-5.redhat_3.1.ep6.el5.noarch.rpm Red Hat JBoss Enterprise Application Platform 6.2 for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossas-javadocs-7.3.1-3.Final_redhat_3.ep6.el5.src.rpm noarch: jbossas-javadocs-7.3.1-3.Final_redhat_3.ep6.el5.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-4517.html https://www.redhat.com/security/data/cve/CVE-2013-6440.html https://www.redhat.com/security/data/cve/CVE-2014-0018.html https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Application_Platform/6.2/html/6.2.1_Release_Notes/index.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFS/RPDXlSAg2UNWIIRAg4PAKCn1rO0JY407dzANPFYV/LlxtopQACfW04r EOMYVYblj/wWpTgJTCcpMLE= =s46+ -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Feb 13 18:52:03 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 13 Feb 2014 18:52:03 +0000 Subject: [RHSA-2014:0171-01] Moderate: Red Hat JBoss Enterprise Application Platform 6.2.1 update Message-ID: <201402131851.s1DIpjMp022718@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 6.2.1 update Advisory ID: RHSA-2014:0171-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0171.html Issue date: 2014-02-13 CVE Names: CVE-2013-4517 CVE-2013-6440 CVE-2014-0018 ===================================================================== 1. Summary: Updated packages that provide Red Hat JBoss Enterprise Application Platform 6.2.1 and fix three security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Relevant releases/architectures: Red Hat JBoss Enterprise Application Platform 6 for RHEL 6 Server - noarch Red Hat JBoss Enterprise Application Platform 6.2 for RHEL 6 Server - noarch 3. Description: Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was found that the ParserPool and Decrypter classes in the OpenSAML Java implementation resolved external entities, permitting XML External Entity (XXE) attacks. A remote attacker could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks. (CVE-2013-6440) It was discovered that the Apache Santuario XML Security for Java project allowed Document Type Definitions (DTDs) to be processed when applying Transforms even when secure validation was enabled. A remote attacker could use this flaw to exhaust all available memory on the system, causing a denial of service. (CVE-2013-4517) In Red Hat JBoss Enterprise Application Platform, when running under a security manager, it was possible for deployed code to get access to the Modular Service Container (MSC) service registry without any permission checks. This could allow malicious deployments to modify the internal state of the server in various ways. (CVE-2014-0018) The CVE-2013-6440 was discovered by David Illsley, Ron Gutierrez of Gotham Digital Science, and David Jorm of the Red Hat Security Response Team, and the CVE-2014-0018 issue was discovered by Stuart Douglas of Red Hat. This release serves as a replacement for JBoss Enterprise Application Platform 6.2.0, and includes bug fixes and enhancements. Documentation for these changes will be available shortly from the JBoss Enterprise Application Platform 6.2.1 Release Notes, linked to in the References. All users of Red Hat JBoss Enterprise Application Platform 6.2.0 on Red Hat Enterprise Linux 6 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Also, back up any customized Red Hat JBoss Enterprise Application Platform 6 configuration files. On update, the configuration files that have been locally modified will not be updated. The updated version of such files will be stored as the rpmnew files. Make sure to locate any such files after the update and merge any changes manually. For more details, refer to the Release Notes for Red Hat JBoss Enterprise Application Platform 6.2.1, available shortly from https://access.redhat.com/site/documentation/ This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1038647 - Tracker bug for the EAP 6.2.1 release for RHEL-6. 1043332 - CVE-2013-6440 XMLTooling-J/OpenSAML Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter 1045257 - CVE-2013-4517 Apache Santuario XML Security for Java: Java XML Signature DoS Attack 1052717 - RHEL6 RPMs: Upgrade jboss-logmanager to 1.5.2.Final-redhat-1 1052783 - CVE-2014-0018 jboss-as-server: Unchecked access to MSC Service Registry under JSM 1052988 - RHEL6 RPMs: Upgrade xml-security to 1.5.6.redhat-1 1053215 - RHEL6 RPMs: Upgrade hornetq to 2.3.14.Final-redhat-1 1053217 - RHEL6 RPMs: Upgrade jbossweb to 7.3.0.Final-redhat-1 1053223 - RHEL6 RPMs: Upgrade netty to 3.6.7.Final-redhat-1 1053228 - RHEL6 RPMs: Upgrade jboss-xnio-base to 3.0.9.GA-redhat-1 1053230 - RHEL6 RPMs: Upgrade jboss-marshalling to 1.4.3.Final-redhat-1 1053778 - RHEL6 RPMs: Upgrade weld-core to 1.1.17.Final-redhat-1 6. Package List: Red Hat JBoss Enterprise Application Platform 6 for RHEL 6 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/hornetq-2.3.14-1.Final_redhat_1.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jacorb-jboss-2.3.2-13.redhat_6.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-appclient-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-cli-7.3.1-4.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-client-all-7.3.1-4.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-clustering-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-cmp-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-configadmin-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-connector-7.3.1-4.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-controller-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-controller-client-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-core-security-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-deployment-repository-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-deployment-scanner-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-domain-http-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-domain-management-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-ee-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-ee-deployment-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-ejb3-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-embedded-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-host-controller-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-jacorb-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-jaxr-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-jaxrs-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-jdr-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-jmx-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-jpa-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-jsf-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-jsr77-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-logging-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-mail-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-management-client-content-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-messaging-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-modcluster-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-naming-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-network-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-osgi-7.3.1-4.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-osgi-configadmin-7.3.1-4.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-osgi-service-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-platform-mbean-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-pojo-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-process-controller-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-protocol-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-remoting-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-sar-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-security-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-server-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-system-jmx-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-threads-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-transactions-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-version-7.3.1-4.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-web-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-webservices-7.3.1-3.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-weld-7.3.1-4.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-xts-7.3.1-2.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-logmanager-1.5.2-1.Final_redhat_1.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-marshalling-1.4.3-1.Final_redhat_1.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-xnio-base-3.0.9-1.GA_redhat_1.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossas-core-7.3.1-5.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossas-javadocs-7.3.1-3.Final_redhat_3.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossas-modules-eap-7.3.1-6.Final_redhat_3.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossweb-7.3.0-1.Final_redhat_1.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/netty-3.6.7-1.Final_redhat_1.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/picketbox-4.0.19-2.SP3_redhat_1.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/weld-core-1.1.17-1.Final_redhat_1.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/xml-security-1.5.6-1.redhat_1.1.ep6.el6.src.rpm ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/xmltooling-1.3.4-5.redhat_3.1.ep6.el6.src.rpm noarch: hornetq-2.3.14-1.Final_redhat_1.1.ep6.el6.noarch.rpm jacorb-jboss-2.3.2-13.redhat_6.1.ep6.el6.noarch.rpm jboss-as-appclient-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-cli-7.3.1-4.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-client-all-7.3.1-4.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-clustering-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-cmp-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-configadmin-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-connector-7.3.1-4.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-controller-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-controller-client-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-core-security-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-deployment-repository-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-deployment-scanner-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-domain-http-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-domain-management-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-ee-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-ee-deployment-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-ejb3-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-embedded-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-host-controller-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-jacorb-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-jaxr-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-jaxrs-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-jdr-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-jmx-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-jpa-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-jsf-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-jsr77-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-logging-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-mail-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-management-client-content-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-messaging-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-modcluster-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-naming-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-network-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-osgi-7.3.1-4.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-osgi-configadmin-7.3.1-4.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-osgi-service-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-platform-mbean-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-pojo-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-process-controller-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-protocol-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-remoting-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-sar-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-security-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-server-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-system-jmx-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-threads-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-transactions-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-version-7.3.1-4.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-web-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-webservices-7.3.1-3.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-weld-7.3.1-4.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-as-xts-7.3.1-2.Final_redhat_3.1.ep6.el6.noarch.rpm jboss-logmanager-1.5.2-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-marshalling-1.4.3-1.Final_redhat_1.1.ep6.el6.noarch.rpm jboss-xnio-base-3.0.9-1.GA_redhat_1.1.ep6.el6.noarch.rpm jbossas-core-7.3.1-5.Final_redhat_3.1.ep6.el6.noarch.rpm jbossas-javadocs-7.3.1-3.Final_redhat_3.ep6.el6.noarch.rpm jbossas-modules-eap-7.3.1-6.Final_redhat_3.1.ep6.el6.noarch.rpm jbossweb-7.3.0-1.Final_redhat_1.1.ep6.el6.noarch.rpm netty-3.6.7-1.Final_redhat_1.1.ep6.el6.noarch.rpm picketbox-4.0.19-2.SP3_redhat_1.1.ep6.el6.noarch.rpm weld-core-1.1.17-1.Final_redhat_1.1.ep6.el6.noarch.rpm xml-security-1.5.6-1.redhat_1.1.ep6.el6.noarch.rpm xmltooling-1.3.4-5.redhat_3.1.ep6.el6.noarch.rpm Red Hat JBoss Enterprise Application Platform 6.2 for RHEL 6 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossas-javadocs-7.3.1-3.Final_redhat_3.ep6.el6.src.rpm noarch: jbossas-javadocs-7.3.1-3.Final_redhat_3.ep6.el6.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2013-4517.html https://www.redhat.com/security/data/cve/CVE-2013-6440.html https://www.redhat.com/security/data/cve/CVE-2014-0018.html https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Application_Platform/6.2/html/6.2.1_Release_Notes/index.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFS/RQGXlSAg2UNWIIRAtl6AJ4kmnSghHREIZAIq3BZo0kWePUvbwCfTAXa 0h2lwGhO6aZc+yH/cc97RkU= =81eP -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Feb 13 18:52:38 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 13 Feb 2014 18:52:38 +0000 Subject: [RHSA-2014:0172-01] Moderate: Red Hat JBoss Enterprise Application Platform 6.2.1 update Message-ID: <201402131852.s1DIqKaG024663@int-mx11.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss Enterprise Application Platform 6.2.1 update Advisory ID: RHSA-2014:0172-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0172.html Issue date: 2014-02-13 CVE Names: CVE-2013-4517 CVE-2013-6440 CVE-2014-0018 ===================================================================== 1. Summary: An update for Red Hat JBoss Enterprise Application Platform 6.2.0, which fixes three security issues, several bugs, and adds various enhancements, is now available from the Red Hat Customer Portal. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Description: Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was found that the ParserPool and Decrypter classes in the OpenSAML Java implementation resolved external entities, permitting XML External Entity (XXE) attacks. A remote attacker could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks. (CVE-2013-6440) It was discovered that the Apache Santuario XML Security for Java project allowed Document Type Definitions (DTDs) to be processed when applying Transforms even when secure validation was enabled. A remote attacker could use this flaw to exhaust all available memory on the system, causing a denial of service. (CVE-2013-4517) In Red Hat JBoss Enterprise Application Platform, when running under a security manager, it was possible for deployed code to get access to the Modular Service Container (MSC) service registry without any permission checks. This could allow malicious deployments to modify the internal state of the server in various ways. (CVE-2014-0018) The CVE-2013-6440 was discovered by David Illsley, Ron Gutierrez of Gotham Digital Science, and David Jorm of the Red Hat Security Response Team, and the CVE-2014-0018 issue was discovered by Stuart Douglas of Red Hat. This release serves as a replacement for JBoss Enterprise Application Platform 6.2.0, and includes bug fixes and enhancements. Documentation for these changes will be available shortly from the JBoss Enterprise Application Platform 6.2.1 Release Notes, linked to in the References. All users of Red Hat JBoss Enterprise Application Platform 6.2.0 as provided from the Red Hat Customer Portal are advised to apply this update. The JBoss server process must be restarted for the update to take effect. 3. Solution: The References section of this erratum contains a download link (you must log in to download the update). Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications. For more details, refer to the JBoss Enterprise Application Platform 6.2.1 Release Notes, linked to in the References. 4. Bugs fixed (https://bugzilla.redhat.com/): 1043332 - CVE-2013-6440 XMLTooling-J/OpenSAML Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter 1045257 - CVE-2013-4517 Apache Santuario XML Security for Java: Java XML Signature DoS Attack 1052783 - CVE-2014-0018 jboss-as-server: Unchecked access to MSC Service Registry under JSM 5. References: https://www.redhat.com/security/data/cve/CVE-2013-4517.html https://www.redhat.com/security/data/cve/CVE-2013-6440.html https://www.redhat.com/security/data/cve/CVE-2014-0018.html https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.2.0 https://access.redhat.com/site/documentation/en-US/JBoss_Enterprise_Application_Platform/6.2/html/6.2.1_Release_Notes/index.html 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFS/RRIXlSAg2UNWIIRAmqtAJsHeRIolSkItQ8bz0EvjspItLHJGACdFZqa uuHuHxrHX0pD8jy5Th4xVAw= =mI3L -----END PGP SIGNATURE----- From bugzilla at redhat.com Thu Feb 20 17:31:41 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Thu, 20 Feb 2014 17:31:41 +0000 Subject: [RHSA-2014:0195-01] Moderate: Red Hat JBoss Portal 6.1.1 update Message-ID: <201402201731.s1KHVfSf029115@int-mx09.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss Portal 6.1.1 update Advisory ID: RHSA-2014:0195-01 Product: Red Hat JBoss Portal Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0195.html Issue date: 2014-02-20 CVE Names: CVE-2013-4517 CVE-2013-6440 ===================================================================== 1. Summary: Red Hat JBoss Portal 6.1.1, which fixes two security issues and various bugs, is now available from the Red Hat Customer Portal. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Description: Red Hat JBoss Portal is the open source implementation of the Java EE suite of services and Portal services running atop Red Hat JBoss Enterprise Application Platform. This Red Hat JBoss Portal 6.1.1 release serves as a replacement for 6.1.0. Refer to the 6.1.1 Release Notes for further information, available shortly from https://access.redhat.com/site/documentation/en-US/ It was found that the ParserPool and Decrypter classes in the OpenSAML Java implementation resolved external entities, permitting XML External Entity (XXE) attacks. A remote attacker could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks. (CVE-2013-6440) It was discovered that the Apache Santuario XML Security for Java project allowed Document Type Definitions (DTDs) to be processed when applying Transforms even when secure validation was enabled. A remote attacker could use this flaw to exhaust all available memory on the system, causing a denial of service. (CVE-2013-4517) All users of Red Hat JBoss Portal 6.1.0 as provided from the Red Hat Customer Portal are advised to upgrade to Red Hat JBoss Portal 6.1.1. 3. Solution: The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up all applications deployed on JBoss Enterprise Portal Platform, along with all customized configuration files, and any databases and database settings. 4. Bugs fixed (https://bugzilla.redhat.com/): 1043332 - CVE-2013-6440 XMLTooling-J/OpenSAML Java: XML eXternal Entity (XXE) flaw in ParserPool and Decrypter 1045257 - CVE-2013-4517 Apache Santuario XML Security for Java: Java XML Signature DoS Attack 5. References: https://www.redhat.com/security/data/cve/CVE-2013-4517.html https://www.redhat.com/security/data/cve/CVE-2013-6440.html https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal&downloadType=distributions https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_Portal/ 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTBjvfXlSAg2UNWIIRAkYnAKCTIxhZ4lhxXU+rqb05KM456wW6PACeKk3I wRRzvCvkza82sIuR1avyiXQ= =2ILE -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Feb 24 20:35:06 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 24 Feb 2014 20:35:06 +0000 Subject: [RHSA-2014:0204-01] Low: Red Hat JBoss Enterprise Application Platform 6.2.1 security update Message-ID: <201402242035.s1OKZ5QG012037@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: Red Hat JBoss Enterprise Application Platform 6.2.1 security update Advisory ID: RHSA-2014:0204-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0204.html Issue date: 2014-02-24 CVE Names: CVE-2014-0058 ===================================================================== 1. Summary: Updated Red Hat JBoss Enterprise Application Platform 6.2.1 packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having Low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat JBoss Enterprise Application Platform 6.2 for RHEL 5 Server - noarch Red Hat JBoss Enterprise Application Platform 6.2 for RHEL 6 Server - noarch 3. Description: Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was found that the security audit functionality, as provided by Red Hat JBoss Enterprise Application Platform 6, logged request parameters in plain text. This may have caused passwords to be included in the audit log files when using BASIC or FORM-based authentication. A local attacker with access to audit log files could possibly use this flaw to obtain application or server authentication credentials. (CVE-2014-0058) The provided patch to fix CVE-2014-0058 also allows greater control over which of the following components of web requests are captured in audit logs: - parameters - cookies - headers - attributes It is also possible to selectively mask some elements of headers, parameters, cookies, and attributes using masks. This capability is provided by two system properties, which are introduced by this patch: 1) org.jboss.security.web.audit Description: This property controls the granularity of the security auditing of web requests. Possible values: off = Disables auditing of web requests headers = Audits only the headers of web requests cookies = Audits only the cookies of web requests parameters = Audits only the parameters of web requests attributes = Audits only the attributes of web requests headers,cookies,parameters = Audits the headers, cookies, and parameters of web requests headers,cookies = Audits the headers and cookies of web requests Default Value: headers, parameters Examples: Setting "org.jboss.security.web.audit=off" disables security auditing of web requests entirely. Setting "org.jboss.security.web.audit=headers" enables security auditing of only headers in web requests. 2) org.jboss.security.web.audit.mask Description: This property can be used to specify a list of strings to be matched against headers, parameters, cookies, and attributes of web requests. Any element matching the specified masks will be excluded from security audit logging. Possible values: Any comma separated string indicating keys of headers, parameters, cookies, and attributes. Default Value: j_password, authorization Note that currently the matching of the masks is fuzzy rather than strict. For example, a mask of "authorization" will mask both the header called authorization and the parameter called "custom_authorization". A future release may introduce strict masks. Warning: Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications. All users of Red Hat JBoss Enterprise Application Platform 6.2.1 on Red Hat Enterprise Linux 5 and 6 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Also, back up any customized Red Hat JBoss Enterprise Application Platform 6 configuration files. On update, the configuration files that have been locally modified will not be updated. The updated version of such files will be stored as the rpmnew files. Make sure to locate any such files after the update and merge any changes manually. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1063641 - CVE-2014-0058 Red Hat JBoss EAP6: Plain text password logging during security audit 6. Package List: Red Hat JBoss Enterprise Application Platform 6.2 for RHEL 5 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-as-web-7.3.1-4.Final_redhat_4.1.ep6.el5.src.rpm noarch: jboss-as-web-7.3.1-4.Final_redhat_4.1.ep6.el5.noarch.rpm Red Hat JBoss Enterprise Application Platform 6.2 for RHEL 6 Server: Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-as-web-7.3.1-4.Final_redhat_4.1.ep6.el6.src.rpm noarch: jboss-as-web-7.3.1-4.Final_redhat_4.1.ep6.el6.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2014-0058.html https://access.redhat.com/security/updates/classification/#low 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTC6zlXlSAg2UNWIIRAqsdAJ4z490doXjbmk6XktEBzqUSYvCwcQCgt68E Sq7itDstpUqFXaATfejV7gU= =MYex -----END PGP SIGNATURE----- From bugzilla at redhat.com Mon Feb 24 20:35:44 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Mon, 24 Feb 2014 20:35:44 +0000 Subject: [RHSA-2014:0205-01] Low: Red Hat JBoss Enterprise Application Platform 6.2.1 security update Message-ID: <201402242035.s1OKZhqF012672@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Low: Red Hat JBoss Enterprise Application Platform 6.2.1 security update Advisory ID: RHSA-2014:0205-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0205.html Issue date: 2014-02-24 CVE Names: CVE-2014-0058 ===================================================================== 1. Summary: An update for Red Hat JBoss Enterprise Application Platform 6.2.1 that fixes one security issue is now available from the Red Hat Customer Portal. The Red Hat Security Response Team has rated this update as having Low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Description: Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. It was found that the security audit functionality, as provided by Red Hat JBoss Enterprise Application Platform 6, logged request parameters in plain text. This may have caused passwords to be included in the audit log files when using BASIC or FORM-based authentication. A local attacker with access to audit log files could possibly use this flaw to obtain application or server authentication credentials. (CVE-2014-0058) The provided patch to fix CVE-2014-0058 also allows greater control over which of the following components of web requests are captured in audit logs: - parameters - cookies - headers - attributes It is also possible to selectively mask some elements of headers, parameters, cookies, and attributes using masks. This capability is provided by two system properties, which are introduced by this patch: 1) org.jboss.security.web.audit Description: This property controls the granularity of the security auditing of web requests. Possible values: off = Disables auditing of web requests headers = Audits only the headers of web requests cookies = Audits only the cookies of web requests parameters = Audits only the parameters of web requests attributes = Audits only the attributes of web requests headers,cookies,parameters = Audits the headers, cookies, and parameters of web requests headers,cookies = Audits the headers and cookies of web requests Default Value: headers, parameters Examples: Setting "org.jboss.security.web.audit=off" disables security auditing of web requests entirely. Setting "org.jboss.security.web.audit=headers" enables security auditing of only headers in web requests. 2) org.jboss.security.web.audit.mask Description: This property can be used to specify a list of strings to be matched against headers, parameters, cookies, and attributes of web requests. Any element matching the specified masks will be excluded from security audit logging. Possible values: Any comma separated string indicating keys of headers, parameters, cookies, and attributes. Default Value: j_password, authorization Note that currently the matching of the masks is fuzzy rather than strict. For example, a mask of "authorization" will mask both the header called authorization and the parameter called "custom_authorization". A future release may introduce strict masks. All users of Red Hat JBoss Enterprise Application Platform 6.2.1 as provided from the Red Hat Customer Portal are advised to apply this update. The JBoss server process must be restarted for the update to take effect. 3. Solution: The References section of this erratum contains a download link (you must log in to download the update). Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications. If you have a native ZIP file installation on top of your Red Hat JBoss Enterprise Application Platform installation, refer to https://access.redhat.com/site/solutions/731123 to apply the patch provided in this erratum. 4. Bugs fixed (https://bugzilla.redhat.com/): 1063641 - CVE-2014-0058 Red Hat JBoss EAP6: Plain text password logging during security audit 5. References: https://www.redhat.com/security/data/cve/CVE-2014-0058.html https://access.redhat.com/security/updates/classification/#low https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=6.2.0 https://access.redhat.com/site/solutions/625683 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTC60MXlSAg2UNWIIRAqZaAJ4j3Kd6soXK8ZgmFbbQj6meWU0tBwCePm7K zTO2V/4z/mwUiD3RCgDoW+A= =7GUq -----END PGP SIGNATURE----- From bugzilla at redhat.com Tue Feb 25 16:44:51 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Tue, 25 Feb 2014 16:44:51 +0000 Subject: [RHSA-2014:0212-01] Moderate: Red Hat JBoss SOA Platform 5.3.1 update Message-ID: <201402251644.s1PGiqYN014689@int-mx02.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat JBoss SOA Platform 5.3.1 update Advisory ID: RHSA-2014:0212-01 Product: Red Hat JBoss SOA Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0212.html Issue date: 2014-02-25 CVE Names: CVE-2013-2172 CVE-2013-4152 ===================================================================== 1. Summary: Red Hat JBoss SOA Platform 5.3.1 roll up patch 4, which fixes two security issues and various bugs, is now available from the Red Hat Customer Portal. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. 2. Description: Red Hat JBoss SOA Platform is the next-generation ESB and business process automation infrastructure. Red Hat JBoss SOA Platform allows IT to leverage existing (MoM and EAI), modern (SOA and BPM-Rules), and future (EDA and CEP) integration methodologies to dramatically improve business process execution speed and quality. This roll up patch serves as a cumulative upgrade for Red Hat JBoss SOA Platform 5.3.1. It includes various bug fixes. The following security issues are also fixed with this release: A flaw was found in the way Apache Santuario XML Security for Java validated XML signatures. Santuario allowed a signature to specify an arbitrary canonicalization algorithm, which would be applied to the SignedInfo XML fragment. A remote attacker could exploit this to spoof an XML signature via a specially-crafted XML signature block. (CVE-2013-2172) It was discovered that the Spring OXM wrapper did not expose any property for disabling entity resolution when using the JAXB unmarshaller. A remote attacker could use this flaw to conduct XML External Entity (XXE) attacks on web sites, and read files in the context of the user running the application server. The patch for this flaw disables external entity processing by default, and provides a configuration directive to re-enable it. (CVE-2013-4152) Warning: Before applying the update, back up your existing Red Hat JBoss SOA Platform installation (including its databases, applications, configuration files, and so on). All users of Red Hat JBoss SOA Platform 5.3.1 as provided from the Red Hat Customer Portal are advised to apply this roll up patch. 3. Solution: The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss SOA Platform installation (including its databases, applications, configuration files, and so on). Note that it is recommended to halt the Red Hat JBoss SOA Platform server by stopping the JBoss Application Server process before installing this update, and then after installing the update, restart the Red Hat JBoss SOA Platform server by starting the JBoss Application Server process. 4. Bugs fixed (https://bugzilla.redhat.com/): 999263 - CVE-2013-2172 Apache Santuario XML Security for Java: XML signature spoofing 1000186 - CVE-2013-4152 Spring Framework: XML External Entity (XXE) injection flaw 5. References: https://www.redhat.com/security/data/cve/CVE-2013-2172.html https://www.redhat.com/security/data/cve/CVE-2013-4152.html https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform&downloadType=securityPatches&version=5.3.1+GA 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTDMhqXlSAg2UNWIIRAhZXAJ9Qp4fwXtuBuq5p4AXH0WKen1vROQCggrJz qPOkOVNaOkpRR3nJGRIcCt0= =FNkH -----END PGP SIGNATURE----- From bugzilla at redhat.com Wed Feb 26 20:38:42 2014 From: bugzilla at redhat.com (bugzilla at redhat.com) Date: Wed, 26 Feb 2014 20:38:42 +0000 Subject: [RHSA-2014:0216-01] Important: XStream security update Message-ID: <201402262038.s1QKcgUf030610@int-mx12.intmail.prod.int.phx2.redhat.com> -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: XStream security update Advisory ID: RHSA-2014:0216-01 Product: Red Hat JBoss Fuse Service Works Advisory URL: https://rhn.redhat.com/errata/RHSA-2014-0216.html Issue date: 2014-02-26 CVE Names: CVE-2013-7285 ===================================================================== 1. Summary: An update for the XStream component that fixes one security issue is now available from the Red Hat Customer Portal for Red Hat JBoss Fuse Service Works 6.0.0. The Red Hat Security Response Team has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base score, which gives detailed severity rating, is available from the CVE link in the References section. 2. Description: XStream is a simple library to serialize and de-serialize objects to and from XML. It was found that XStream could deserialize arbitrary user-supplied XML content, representing objects of any type. A remote attacker able to pass XML to XStream could use this flaw to perform a variety of attacks, including remote code execution in the context of the server running the XStream application. (CVE-2013-7285) All users of Red Hat JBoss Fuse Service Works 6.0.0 as provided from the Red Hat Customer Portal are advised to apply this update. 3. Solution: The References section of this erratum contains a download link (you must log in to download the updates). Before applying the updates, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. It is recommended to halt the server by stopping the JBoss Application Server process before installing this update, and then after installing the update, restart the server by starting the JBoss Application Server process. 4. Bugs fixed (https://bugzilla.redhat.com/): 1051277 - CVE-2013-7285 XStream: remote code execution due to insecure XML deserialization 5. References: https://www.redhat.com/security/data/cve/CVE-2013-7285.html https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse.serviceworks&downloadType=securityPatches&version=6.0.0 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2014 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFTDlCfXlSAg2UNWIIRAvsEAJ9weTDtJboAa5k8cgXUx5L9+C9cXwCgr4aL F+x7gQL0lyMpOcPv4OdUhjY= =VDRf -----END PGP SIGNATURE-----