[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[RHSA-2009:0348-01] Moderate: JBoss Enterprise Application Platform 4.2.0CP06 update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: JBoss Enterprise Application Platform 4.2.0CP06 update
Advisory ID:       RHSA-2009:0348-01
Product:           JBoss Enterprise Application Platform
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2009-0348.html
Issue date:        2009-03-06
CVE Names:         CVE-2009-0027 
=====================================================================

1. Summary:

Updated JBoss Enterprise Application Platform (JBoss EAP) 4.2 packages that
fix various issues are now available for Red Hat Enterprise Linux 5 as
JBEAP 4.2.0.CP06.

This update has been rated as having moderate security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

JBoss Enterprise Application Platform for RHEL 5 Server - i386, noarch, x86_64

3. Description:

JBoss Enterprise Application Platform (JBoss EAP) is the market-leading
platform for innovative and scalable Java applications. JBoss EAP
integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam
into a complete, simple enterprise solution.

This release of JBoss EAP for Red Hat Enterprise Linux 5 serves as a
replacement for JBEAP 4.2.0.CP05.

These updated packages include bug fixes and enhancements which are
detailed in the release notes. The link to the release notes is available
below in the References section.

The following security issue is also fixed with this release:

The request handler in JBossWS did not correctly verify the resource path
when serving WSDL files for custom web service endpoints. This allowed
remote attackers to read arbitrary XML files with the permissions of the
EAP process. (CVE-2009-0027)

Warning: before applying this update, make sure to back up the JBEAP
"server/[configuration]/deploy/" directory, as well as any other customized
configuration files.

All users of JBoss EAP 4.2 on Red Hat Enterprise Linux 5 are advised to
upgrade to these updated packages, which resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

475211 - Tracker bug for the EAP 4.2.0.cp06 release for RHEL-5.
479668 - CVE-2009-0027 JBoss EAP unprivileged local xml file access

6. Package List:

JBoss Enterprise Application Platform for RHEL 5 Server:

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/glassfish-jsf-1.2_10-0jpp.ep1.5.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/hibernate3-3.2.4-1.SP1_CP07.0jpp.ep1.14.1.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jacorb-2.3.0-1jpp.ep1.7.1.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jakarta-commons-logging-jboss-1.1-4.1.ep1.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-cache-1.4.1-6.SP11.1.ep1.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-jaxr-1.2.0-SP2.0jpp.ep1.3.2.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-remoting-2.2.2-3.SP11.0jpp.ep1.1.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-seam-1.2.1-1.ep1.12.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-vfs-1.0.0-1.ep1.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossas-4.2.0-4.GA_CP06.3.1.ep1.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossts-4.2.3-1.SP5_CP04.1jpp.ep1.2.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossweb-2.0.0-6.CP09.0jpp.ep1.1.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossws-jboss42-1.2.1-1.1.ep1.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jgroups-2.4.5-2.1.ep1.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/rh-eap-docs-4.2.0-5.GA_CP06.ep1.3.1.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/tanukiwrapper-3.2.1-2jpp.ep1.2.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/ws-commons-policy-1.0-2jpp.ep1.7.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/ws-scout0-0.7-0.rc2.4.el5.src.rpm

i386:
tanukiwrapper-3.2.1-2jpp.ep1.2.el5.i386.rpm
tanukiwrapper-debuginfo-3.2.1-2jpp.ep1.2.el5.i386.rpm

noarch:
glassfish-jsf-1.2_10-0jpp.ep1.5.ep5.el5.noarch.rpm
hibernate3-3.2.4-1.SP1_CP07.0jpp.ep1.14.1.el5.noarch.rpm
hibernate3-javadoc-3.2.4-1.SP1_CP07.0jpp.ep1.14.1.el5.noarch.rpm
jacorb-2.3.0-1jpp.ep1.7.1.el5.noarch.rpm
jakarta-commons-logging-jboss-1.1-4.1.ep1.el5.noarch.rpm
jboss-cache-1.4.1-6.SP11.1.ep1.el5.noarch.rpm
jboss-jaxr-1.2.0-SP2.0jpp.ep1.3.2.el5.noarch.rpm
jboss-remoting-2.2.2-3.SP11.0jpp.ep1.1.el5.noarch.rpm
jboss-seam-1.2.1-1.ep1.12.el5.noarch.rpm
jboss-seam-docs-1.2.1-1.ep1.12.el5.noarch.rpm
jboss-vfs-1.0.0-1.ep1.el5.noarch.rpm
jbossas-4.2.0-4.GA_CP06.3.1.ep1.el5.noarch.rpm
jbossas-4.2.0.GA_CP06-bin-4.2.0-4.GA_CP06.3.1.ep1.el5.noarch.rpm
jbossas-client-4.2.0-4.GA_CP06.3.1.ep1.el5.noarch.rpm
jbossts-4.2.3-1.SP5_CP04.1jpp.ep1.2.el5.noarch.rpm
jbossweb-2.0.0-6.CP09.0jpp.ep1.1.el5.noarch.rpm
jbossws-jboss42-1.2.1-1.1.ep1.el5.noarch.rpm
jgroups-2.4.5-2.1.ep1.el5.noarch.rpm
rh-eap-docs-4.2.0-5.GA_CP06.ep1.3.1.el5.noarch.rpm
rh-eap-docs-examples-4.2.0-5.GA_CP06.ep1.3.1.el5.noarch.rpm
ws-commons-policy-1.0-2jpp.ep1.7.el5.noarch.rpm
ws-scout0-0.7-0.rc2.4.el5.noarch.rpm

x86_64:
tanukiwrapper-3.2.1-2jpp.ep1.2.el5.x86_64.rpm
tanukiwrapper-debuginfo-3.2.1-2jpp.ep1.2.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0027
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp06/html-single/readme/index.html

8. Contact:

The Red Hat security contact is <secalert redhat com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2009 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFJsXWwXlSAg2UNWIIRAjQPAKCEnkJwSc2UOWTdVko/zDvVOxNupACfUunK
JSPoLuXwvMEg2kAo8uM0c3I=
=BbXt
-----END PGP SIGNATURE-----



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]