[RHSA-2013:0196-01] Important: JBoss Enterprise Web Platform 5.2.0 update

bugzilla at redhat.com bugzilla at redhat.com
Thu Jan 24 19:23:17 UTC 2013


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: JBoss Enterprise Web Platform 5.2.0 update
Advisory ID:       RHSA-2013:0196-01
Product:           JBoss Enterprise Web Platform
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2013-0196.html
Issue date:        2013-01-24
CVE Names:         CVE-2009-5066 CVE-2011-1096 CVE-2011-2487 
                   CVE-2011-2730 CVE-2011-2908 CVE-2011-4575 
                   CVE-2012-0034 CVE-2012-0874 CVE-2012-2377 
                   CVE-2012-2379 CVE-2012-3369 CVE-2012-3370 
                   CVE-2012-3546 CVE-2012-5478 
=====================================================================

1. Summary:

Updated JBoss Enterprise Web Platform 5.2.0 packages that fix multiple
security issues, various bugs, and add several enhancements are now
available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

This JBoss Enterprise Web Platform 5.2.0 release serves as a replacement
for JBoss Enterprise Web Platform 5.1.2, and includes bug fixes and
enhancements. As JBoss Enterprise Web Platform is a subset of JBoss
Enterprise Application Platform, refer to the JBoss Enterprise Application
Platform 5.2.0 Release Notes for information on the most significant of
these changes. The Release Notes will be available shortly from
https://access.redhat.com/knowledge/docs/

2. Relevant releases/architectures:

JBoss Enterprise Web Platform 5 for RHEL 5 Server - i386, noarch, x86_64

3. Description:

An attack technique against the W3C XML Encryption Standard when block
ciphers were used in CBC mode could allow a remote attacker to conduct
chosen-ciphertext attacks, leading to the recovery of the entire plain text
of a particular cryptogram. (CVE-2011-1096)

JBoss Web Services leaked side-channel data when distributing symmetric
keys (for XML encryption), allowing a remote attacker to recover the entire
plain text form of a symmetric key. (CVE-2011-2487)

Spring framework could possibly evaluate Expression Language (EL)
expressions twice, allowing a remote attacker to execute arbitrary code in
the context of the application server, or to obtain sensitive information
from the server. Manual action is required to apply this fix. Refer to the
Solution section. (CVE-2011-2730)

Apache CXF checked to ensure XML elements were signed or encrypted by a
Supporting Token, but not whether the correct token was used. A remote
attacker could transmit confidential information without the appropriate
security, and potentially circumvent access controls on web services
exposed via Apache CXF. Refer to the Solution section for details.
(CVE-2012-2379)

When an application used FORM authentication, along with another component
that calls request.setUserPrincipal() before the call to
FormAuthenticator#authenticate() (such as the Single-Sign-On valve), it was
possible to bypass the security constraint checks in the FORM authenticator
by appending "/j_security_check" to the end of a URL. (CVE-2012-3546)

The JMX Console was vulnerable to CSRF attacks, allowing a remote attacker
to hijack the authenticated JMX Console session of an administrator.
(CVE-2011-2908)

An XSS flaw allowed a remote attacker to perform an XSS attack against
victims using the JMX Console. (CVE-2011-4575)

SecurityAssociation.getCredential() returned the previous credential if
no security context was provided. Depending on the deployed applications,
this could possibly allow a remote attacker to hijack the credentials of a
previously-authenticated user. (CVE-2012-3370)

Configuring the JMX Invoker to restrict access to users with specific
roles did not actually restrict access, allowing remote attackers with
valid JMX Invoker credentials to perform JMX operations accessible to
roles they are not a member of. (CVE-2012-5478)

twiddle.sh accepted credentials as command line arguments, allowing local
users to view them via a process listing. (CVE-2009-5066)

NonManagedConnectionFactory logged the username and password in plain text
when an exception was thrown. This could lead to the exposure of
authentication credentials if local users had permissions to read the log
file. (CVE-2012-0034)

The JMXInvokerHAServlet and EJBInvokerHAServlet invoker servlets allow
unauthenticated access by default in some profiles. The security
interceptor's second layer of authentication prevented direct exploitation
of this flaw. If the interceptor was misconfigured or inadvertently
disabled, this flaw could lead to arbitrary code execution in the context
of the user running the JBoss server. (CVE-2012-0874)

The JGroups diagnostics service was enabled with no authentication when a
JGroups channel was started, allowing attackers on the adjacent network to
read diagnostic information. (CVE-2012-2377)

CallerIdentityLoginModule retained the password from the previous call if a
null password was provided. In non-default configurations this could
possibly lead to a remote attacker hijacking a previously-authenticated
user's session. (CVE-2012-3369)

Red Hat would like to thank Juraj Somorovsky of Ruhr-University Bochum for
reporting CVE-2011-1096 and CVE-2011-2487; the Apache CXF project for
reporting CVE-2012-2379; and Tyler Krpata for reporting CVE-2011-4575.
CVE-2012-3370 and CVE-2012-3369 were discovered by Carlo de Wolf of Red
Hat; CVE-2012-5478 discovered by Derek Horton of Red Hat; CVE-2012-0874
discovered by David Jorm of Red Hat; and CVE-2012-2377 was discovered by
Red Hat.

4. Solution:

Note: Manual action is required to apply the fix for CVE-2011-2730. If your
system has deployed applications which use Spring framework, the context
parameter "springJspExpressionSupport" must be set to "false" to mitigate
this flaw, for example, in the application's web.xml file. This will
prevent the double-evaluation of EL expressions that led to this flaw.

CVE-2012-2379 has been addressed by disabling the affected configuration in
this release. If you use the affected configuration, an exception will be
thrown and the relevant application will not deploy to the server. A patch
that allows the affected configuration to be used without this
vulnerability is available in JBoss Enterprise Application Platform 6.0.1.

Warning: Before applying this update, back up your existing JBoss
Enterprise Web Platform installation (including all applications and
configuration files).

All users of JBoss Enterprise Web Platform 5.1.2 on Red Hat Enterprise
Linux 5 are advised to upgrade to these updated packages. The JBoss server
process must be restarted for the update to take effect.

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

5. Bugs fixed (http://bugzilla.redhat.com/):

681916 - CVE-2011-1096 jbossws: Prone to character encoding pattern attack (XML Encryption flaw)
713539 - CVE-2011-2487 jbossws: Prone to Bleichenbacher attack against to be distributed symmetric key
730176 - CVE-2011-2908 CSRF on jmx-console allows invocation of operations on mbeans
737608 - CVE-2011-2730 Spring Framework: Information (internal server information, classpath, local working directories, session IDs) disclosure
760387 - CVE-2011-4575 JMX Console: XSS in invoke operation
772835 - CVE-2012-0034 JBoss Cache: NonManagedConnectionFactory will log password in clear text when an exception occurs
795645 - CVE-2012-0874 JBoss invoker servlets do not require authentication
823392 - CVE-2012-2377 JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started
826534 - CVE-2012-2379 jbossws-cxf, apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token
836451 - CVE-2012-3369 JBoss: CallerIdentityLoginModule retaining password from previous call if a null password is provided
836456 - CVE-2012-3370 JBoss: SecurityAssociation.getCredential() will return the previous credential if no security context is provided
842477 - CVE-2009-5066 JBoss: twiddle.sh accepts credentials as command line arguments, exposing them to other local users via a process listing
848854 - EWP: Tracker bug for the EWP 5.2.0 release for RHEL-5.
874349 - CVE-2012-5478 JBoss: AuthorizationInterceptor allows JMX operation to proceed despite authorization failure
883634 - CVE-2012-3546 Tomcat/JBoss Web: Bypass of security constraints

6. Package List:

JBoss Enterprise Web Platform 5 for RHEL 5 Server:

Source:
aopalliance-1.0-5.2.jdk6.ep5.el5.src.rpm
apache-cxf-2.2.12-6.1.patch_04.ep5.el5.src.rpm
bsh2-2.0-0.b4.15.1.patch01.ep5.el5.src.rpm
glassfish-jaxb-2.1.12-12_patch_03.ep5.el5.src.rpm
google-guice-2.0-3.ep5.el5.src.rpm
hibernate3-3.3.2-1.5.GA_CP05.ep5.el5.src.rpm
hibernate3-annotations-3.4.0-3.3.GA_CP05.ep5.el5.src.rpm
hibernate3-entitymanager-3.4.0-4.4.GA_CP05.ep5.el5.src.rpm
hibernate3-search-3.1.1-2.4.GA_CP05.ep5.el5.src.rpm
jacorb-jboss-2.3.2-2.jboss_1.ep5.el5.src.rpm
javassist-3.12.0-6.SP1.ep5.el5.src.rpm
jboss-aop2-2.1.6-5.CP06.ep5.el5.src.rpm
jboss-bootstrap-1.0.2-1.ep5.el5.src.rpm
jboss-cache-core-3.2.11-1.GA.ep5.el5.src.rpm
jboss-cache-pojo-3.0.1-1.1.ep5.el5.src.rpm
jboss-cl-2.0.11-1.GA.ep5.el5.src.rpm
jboss-cluster-ha-server-api-1.2.1-2.ep5.el5.src.rpm
jboss-common-beans-1.0.1-2.1.Final.ep5.el5.src.rpm
jboss-common-core-2.2.21-1.ep5.el5.src.rpm
jboss-eap5-native-5.2.0-6.ep5.el5.src.rpm
jboss-ejb3-cache-1.0.0-4.ep5.el5.src.rpm
jboss-ejb3-core-1.3.9-0.4.ep5.el5.src.rpm
jboss-ejb3-ext-api-1.0.0-4.1.ep5.el5.src.rpm
jboss-ejb3-ext-api-impl-1.0.0-3.7.ep5.el5.src.rpm
jboss-ejb3-interceptors-1.0.9-0.1.ep5.el5.src.rpm
jboss-ejb3-metadata-1.0.0-3.ep5.el5.src.rpm
jboss-ejb3-metrics-deployer-1.1.1-0.1.ep5.el5.src.rpm
jboss-ejb3-security-1.0.2-0.5.ep5.el5.src.rpm
jboss-ejb3-timeout-0.1.1-0.5.ep5.el5.src.rpm
jboss-ejb3-transactions-1.0.2-1.4.ep5.el5.src.rpm
jboss-javaee-5.0.2-2.ep5.el5.src.rpm
jboss-jaxrpc-api_1.1_spec-1.0.0-16.ep5.el5.src.rpm
jboss-jpa-deployers-1.0.0-6.1SP2.ep5.el5.src.rpm
jboss-logmanager-1.1.2-6.GA_patch_01.ep5.el5.src.rpm
jboss-naming-5.0.3-5.1.CP02.ep5.el5.src.rpm
jboss-reflect-2.0.4-2.1.ep5.el5.src.rpm
jboss-remoting-2.5.4-10.SP4.1.ep5.el5.src.rpm
jboss-seam2-2.2.6.EAP5-10.ep5.el5.src.rpm
jboss-security-negotiation-2.1.3-1.GA.ep5.el5.src.rpm
jboss-security-spi-2.0.5-4.SP3_1.ep5.el5.src.rpm
jboss-vfs2-2.2.1-4.GA.ep5.el5.src.rpm
jbossas-web-5.2.0-8.ep5.el5.src.rpm
jbossas-web-tp-licenses-5.2.0-7.ep5.el5.src.rpm
jbossas-ws-cxf-ewp-5.2.0-7.ep5.el5.src.rpm
jbosssx2-2.0.5-8.SP3_1.ep5.el5.src.rpm
jbossts-4.6.1-12.CP13.8.ep5.el5.src.rpm
jbossweb-2.1.13-2_patch_01.ep5.el5.src.rpm
jbossws-3.1.2-13.SP15_patch_01.ep5.el5.src.rpm
jbossws-common-1.1.0-9.SP10.ep5.el5.src.rpm
jbossws-framework-3.1.2-9.SP13.ep5.el5.src.rpm
jbossws-spi-1.1.2-6.SP8.ep5.el5.src.rpm
jgroups-2.6.22-1.ep5.el5.src.rpm
jopr-embedded-1.3.4-19.SP6.9.ep5.el5.src.rpm
jopr-hibernate-plugin-3.0.0-14.EmbJopr5.ep5.el5.src.rpm
jopr-jboss-as-5-plugin-3.0.0-14.EmbJopr5.ep5.el5.src.rpm
jopr-jboss-cache-v3-plugin-3.0.0-15.EmbJopr5.ep5.el5.src.rpm
mod_cluster-1.0.10-12.2.GA_CP04.ep5.el5.src.rpm
mod_cluster-native-1.0.10-10.GA_CP04_patch01.ep5.el5.src.rpm
picketlink-federation-2.1.5-3.ep5.el5.src.rpm
picketlink-quickstarts-2.1.5-1.ep5.el5.src.rpm
resteasy-1.2.1-18.CP02_patch02.1.ep5.el5.src.rpm
rh-ewp-docs-5.2.0-6.ep5.el5.src.rpm
rhq-3.0.0-21.EmbJopr5.ep5.el5.src.rpm
rhq-jmx-plugin-3.0.0-21.EmbJopr5.ep5.el5.src.rpm
rhq-platform-plugin-3.0.0-14.EmbJopr5.ep5.el5.src.rpm
spring2-2.5.6-9.SEC03.1.ep5.el5.src.rpm
wss4j-1.5.12-4.1_patch_02.ep5.el5.src.rpm
xerces-j2-2.9.1-10.patch02.ep5.el5.src.rpm
xml-commons-1.3.04-8.2_patch_01.ep5.el5.src.rpm
xml-security-1.5.1-2.ep5.el5.src.rpm

i386:
jboss-eap5-native-5.2.0-6.ep5.el5.i386.rpm
mod_cluster-native-1.0.10-10.GA_CP04_patch01.ep5.el5.i386.rpm
mod_cluster-native-debuginfo-1.0.10-10.GA_CP04_patch01.ep5.el5.i386.rpm

noarch:
aopalliance-1.0-5.2.jdk6.ep5.el5.noarch.rpm
apache-cxf-2.2.12-6.1.patch_04.ep5.el5.noarch.rpm
bsh2-2.0-0.b4.15.1.patch01.ep5.el5.noarch.rpm
bsh2-bsf-2.0-0.b4.15.1.patch01.ep5.el5.noarch.rpm
glassfish-jaxb-2.1.12-12_patch_03.ep5.el5.noarch.rpm
google-guice-2.0-3.ep5.el5.noarch.rpm
hibernate3-3.3.2-1.5.GA_CP05.ep5.el5.noarch.rpm
hibernate3-annotations-3.4.0-3.3.GA_CP05.ep5.el5.noarch.rpm
hibernate3-annotations-javadoc-3.4.0-3.3.GA_CP05.ep5.el5.noarch.rpm
hibernate3-entitymanager-3.4.0-4.4.GA_CP05.ep5.el5.noarch.rpm
hibernate3-entitymanager-javadoc-3.4.0-4.4.GA_CP05.ep5.el5.noarch.rpm
hibernate3-javadoc-3.3.2-1.5.GA_CP05.ep5.el5.noarch.rpm
hibernate3-search-3.1.1-2.4.GA_CP05.ep5.el5.noarch.rpm
hibernate3-search-javadoc-3.1.1-2.4.GA_CP05.ep5.el5.noarch.rpm
jacorb-jboss-2.3.2-2.jboss_1.ep5.el5.noarch.rpm
javassist-3.12.0-6.SP1.ep5.el5.noarch.rpm
jboss-aop2-2.1.6-5.CP06.ep5.el5.noarch.rpm
jboss-bootstrap-1.0.2-1.ep5.el5.noarch.rpm
jboss-cache-core-3.2.11-1.GA.ep5.el5.noarch.rpm
jboss-cache-pojo-3.0.1-1.1.ep5.el5.noarch.rpm
jboss-cl-2.0.11-1.GA.ep5.el5.noarch.rpm
jboss-cluster-ha-server-api-1.2.1-2.ep5.el5.noarch.rpm
jboss-common-beans-1.0.1-2.1.Final.ep5.el5.noarch.rpm
jboss-common-core-2.2.21-1.ep5.el5.noarch.rpm
jboss-ejb-3.0-api-5.0.2-2.ep5.el5.noarch.rpm
jboss-ejb3-cache-1.0.0-4.ep5.el5.noarch.rpm
jboss-ejb3-core-1.3.9-0.4.ep5.el5.noarch.rpm
jboss-ejb3-ext-api-1.0.0-4.1.ep5.el5.noarch.rpm
jboss-ejb3-ext-api-impl-1.0.0-3.7.ep5.el5.noarch.rpm
jboss-ejb3-interceptors-1.0.9-0.1.ep5.el5.noarch.rpm
jboss-ejb3-metadata-1.0.0-3.ep5.el5.noarch.rpm
jboss-ejb3-metrics-deployer-1.1.1-0.1.ep5.el5.noarch.rpm
jboss-ejb3-security-1.0.2-0.5.ep5.el5.noarch.rpm
jboss-ejb3-timeout-0.1.1-0.5.ep5.el5.noarch.rpm
jboss-ejb3-timeout-3.0-api-0.1.1-0.5.ep5.el5.noarch.rpm
jboss-ejb3-timeout-spi-0.1.1-0.5.ep5.el5.noarch.rpm
jboss-ejb3-transactions-1.0.2-1.4.ep5.el5.noarch.rpm
jboss-jacc-1.1-api-5.0.2-2.ep5.el5.noarch.rpm
jboss-jad-1.2-api-5.0.2-2.ep5.el5.noarch.rpm
jboss-jaspi-1.0-api-5.0.2-2.ep5.el5.noarch.rpm
jboss-javaee-5.0.2-2.ep5.el5.noarch.rpm
jboss-javaee-poms-5.0.2-2.ep5.el5.noarch.rpm
jboss-jaxrpc-api_1.1_spec-1.0.0-16.ep5.el5.noarch.rpm
jboss-jca-1.5-api-5.0.2-2.ep5.el5.noarch.rpm
jboss-jms-1.1-api-5.0.2-2.ep5.el5.noarch.rpm
jboss-jpa-deployers-1.0.0-6.1SP2.ep5.el5.noarch.rpm
jboss-logmanager-1.1.2-6.GA_patch_01.ep5.el5.noarch.rpm
jboss-naming-5.0.3-5.1.CP02.ep5.el5.noarch.rpm
jboss-reflect-2.0.4-2.1.ep5.el5.noarch.rpm
jboss-remoting-2.5.4-10.SP4.1.ep5.el5.noarch.rpm
jboss-seam2-2.2.6.EAP5-10.ep5.el5.noarch.rpm
jboss-seam2-docs-2.2.6.EAP5-10.ep5.el5.noarch.rpm
jboss-seam2-examples-2.2.6.EAP5-10.ep5.el5.noarch.rpm
jboss-seam2-runtime-2.2.6.EAP5-10.ep5.el5.noarch.rpm
jboss-security-negotiation-2.1.3-1.GA.ep5.el5.noarch.rpm
jboss-security-spi-2.0.5-4.SP3_1.ep5.el5.noarch.rpm
jboss-transaction-1.0.1-api-5.0.2-2.ep5.el5.noarch.rpm
jboss-vfs2-2.2.1-4.GA.ep5.el5.noarch.rpm
jbossas-web-5.2.0-8.ep5.el5.noarch.rpm
jbossas-web-client-5.2.0-8.ep5.el5.noarch.rpm
jbossas-web-tp-licenses-5.2.0-7.ep5.el5.noarch.rpm
jbossas-web-ws-native-5.2.0-8.ep5.el5.noarch.rpm
jbossas-ws-cxf-ewp-5.2.0-7.ep5.el5.noarch.rpm
jbosssx2-2.0.5-8.SP3_1.ep5.el5.noarch.rpm
jbossts-4.6.1-12.CP13.8.ep5.el5.noarch.rpm
jbossts-javadoc-4.6.1-12.CP13.8.ep5.el5.noarch.rpm
jbossweb-2.1.13-2_patch_01.ep5.el5.noarch.rpm
jbossweb-el-1.0-api-2.1.13-2_patch_01.ep5.el5.noarch.rpm
jbossweb-jsp-2.1-api-2.1.13-2_patch_01.ep5.el5.noarch.rpm
jbossweb-lib-2.1.13-2_patch_01.ep5.el5.noarch.rpm
jbossweb-servlet-2.5-api-2.1.13-2_patch_01.ep5.el5.noarch.rpm
jbossws-3.1.2-13.SP15_patch_01.ep5.el5.noarch.rpm
jbossws-common-1.1.0-9.SP10.ep5.el5.noarch.rpm
jbossws-framework-3.1.2-9.SP13.ep5.el5.noarch.rpm
jbossws-spi-1.1.2-6.SP8.ep5.el5.noarch.rpm
jgroups-2.6.22-1.ep5.el5.noarch.rpm
jopr-embedded-1.3.4-19.SP6.9.ep5.el5.noarch.rpm
jopr-hibernate-plugin-3.0.0-14.EmbJopr5.ep5.el5.noarch.rpm
jopr-jboss-as-5-plugin-3.0.0-14.EmbJopr5.ep5.el5.noarch.rpm
jopr-jboss-cache-v3-plugin-3.0.0-15.EmbJopr5.ep5.el5.noarch.rpm
mod_cluster-demo-1.0.10-12.2.GA_CP04.ep5.el5.noarch.rpm
mod_cluster-jbossas-1.0.10-12.2.GA_CP04.ep5.el5.noarch.rpm
mod_cluster-jbossweb2-1.0.10-12.2.GA_CP04.ep5.el5.noarch.rpm
mod_cluster-tomcat6-1.0.10-12.2.GA_CP04.ep5.el5.noarch.rpm
picketlink-federation-2.1.5-3.ep5.el5.noarch.rpm
picketlink-quickstarts-2.1.5-1.ep5.el5.noarch.rpm
picketlink-quickstarts-idp-2.1.5-1.ep5.el5.noarch.rpm
picketlink-quickstarts-pdp-2.1.5-1.ep5.el5.noarch.rpm
picketlink-quickstarts-sts-2.1.5-1.ep5.el5.noarch.rpm
resteasy-1.2.1-18.CP02_patch02.1.ep5.el5.noarch.rpm
resteasy-examples-1.2.1-18.CP02_patch02.1.ep5.el5.noarch.rpm
resteasy-javadoc-1.2.1-18.CP02_patch02.1.ep5.el5.noarch.rpm
resteasy-manual-1.2.1-18.CP02_patch02.1.ep5.el5.noarch.rpm
rh-ewp-docs-5.2.0-6.ep5.el5.noarch.rpm
rh-ewp-docs-examples-5.2.0-6.ep5.el5.noarch.rpm
rhq-3.0.0-21.EmbJopr5.ep5.el5.noarch.rpm
rhq-common-parent-3.0.0-21.EmbJopr5.ep5.el5.noarch.rpm
rhq-core-client-api-3.0.0-21.EmbJopr5.ep5.el5.noarch.rpm
rhq-core-comm-api-3.0.0-21.EmbJopr5.ep5.el5.noarch.rpm
rhq-core-domain-3.0.0-21.EmbJopr5.ep5.el5.noarch.rpm
rhq-core-gui-3.0.0-21.EmbJopr5.ep5.el5.noarch.rpm
rhq-core-native-system-3.0.0-21.EmbJopr5.ep5.el5.noarch.rpm
rhq-core-parent-3.0.0-21.EmbJopr5.ep5.el5.noarch.rpm
rhq-core-plugin-api-3.0.0-21.EmbJopr5.ep5.el5.noarch.rpm
rhq-core-plugin-container-3.0.0-21.EmbJopr5.ep5.el5.noarch.rpm
rhq-core-util-3.0.0-21.EmbJopr5.ep5.el5.noarch.rpm
rhq-jboss-as-common-3.0.0-21.EmbJopr5.ep5.el5.noarch.rpm
rhq-jmx-plugin-3.0.0-21.EmbJopr5.ep5.el5.noarch.rpm
rhq-modules-parent-3.0.0-21.EmbJopr5.ep5.el5.noarch.rpm
rhq-parent-3.0.0-21.EmbJopr5.ep5.el5.noarch.rpm
rhq-platform-plugin-3.0.0-14.EmbJopr5.ep5.el5.noarch.rpm
rhq-plugins-parent-3.0.0-21.EmbJopr5.ep5.el5.noarch.rpm
spring2-2.5.6-9.SEC03.1.ep5.el5.noarch.rpm
spring2-agent-2.5.6-9.SEC03.1.ep5.el5.noarch.rpm
spring2-all-2.5.6-9.SEC03.1.ep5.el5.noarch.rpm
spring2-aop-2.5.6-9.SEC03.1.ep5.el5.noarch.rpm
spring2-beans-2.5.6-9.SEC03.1.ep5.el5.noarch.rpm
spring2-context-2.5.6-9.SEC03.1.ep5.el5.noarch.rpm
spring2-core-2.5.6-9.SEC03.1.ep5.el5.noarch.rpm
wss4j-1.5.12-4.1_patch_02.ep5.el5.noarch.rpm
xerces-j2-2.9.1-10.patch02.ep5.el5.noarch.rpm
xerces-j2-scripts-2.9.1-10.patch02.ep5.el5.noarch.rpm
xml-commons-1.3.04-8.2_patch_01.ep5.el5.noarch.rpm
xml-commons-jaxp-1.1-apis-1.3.04-8.2_patch_01.ep5.el5.noarch.rpm
xml-commons-jaxp-1.2-apis-1.3.04-8.2_patch_01.ep5.el5.noarch.rpm
xml-commons-jaxp-1.3-apis-1.3.04-8.2_patch_01.ep5.el5.noarch.rpm
xml-commons-resolver10-1.3.04-8.2_patch_01.ep5.el5.noarch.rpm
xml-commons-resolver11-1.3.04-8.2_patch_01.ep5.el5.noarch.rpm
xml-commons-resolver12-1.3.04-8.2_patch_01.ep5.el5.noarch.rpm
xml-commons-which10-1.3.04-8.2_patch_01.ep5.el5.noarch.rpm
xml-commons-which11-1.3.04-8.2_patch_01.ep5.el5.noarch.rpm
xml-security-1.5.1-2.ep5.el5.noarch.rpm

x86_64:
jboss-eap5-native-5.2.0-6.ep5.el5.x86_64.rpm
mod_cluster-native-1.0.10-10.GA_CP04_patch01.ep5.el5.x86_64.rpm
mod_cluster-native-debuginfo-1.0.10-10.GA_CP04_patch01.ep5.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2009-5066.html
https://www.redhat.com/security/data/cve/CVE-2011-1096.html
https://www.redhat.com/security/data/cve/CVE-2011-2487.html
https://www.redhat.com/security/data/cve/CVE-2011-2730.html
https://www.redhat.com/security/data/cve/CVE-2011-2908.html
https://www.redhat.com/security/data/cve/CVE-2011-4575.html
https://www.redhat.com/security/data/cve/CVE-2012-0034.html
https://www.redhat.com/security/data/cve/CVE-2012-0874.html
https://www.redhat.com/security/data/cve/CVE-2012-2377.html
https://www.redhat.com/security/data/cve/CVE-2012-2379.html
https://www.redhat.com/security/data/cve/CVE-2012-3369.html
https://www.redhat.com/security/data/cve/CVE-2012-3370.html
https://www.redhat.com/security/data/cve/CVE-2012-3546.html
https://www.redhat.com/security/data/cve/CVE-2012-5478.html
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/knowledge/docs/

8. Contact:

The Red Hat security contact is <secalert at redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2013 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFRAYoQXlSAg2UNWIIRAvY8AJ97zi/JZdyHLPeoIn6zec+5dbCSCQCdESlL
CY27LFeFZfKZ+BzhHM3bGsc=
=2VcP
-----END PGP SIGNATURE-----





More information about the Jboss-watch-list mailing list