Date: 10 December 2009
References: ESB-2009.1523 ESB-2012.0544
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2009.1622
Moderate: JBoss Enterprise Application Platform 4.3.0.CP07 update
10 December 2009
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: JBoss Enterprise Application Platform
Publisher: Red Hat
Operating System: Red Hat Enterprise Linux AS/ES/WS 4
Red Hat Enterprise Linux Server 5
Impact/Access: Unauthorised Access -- Remote with User Interaction
Denial of Service -- Remote with User Interaction
Cross-site Scripting -- Remote with User Interaction
Increased Privileges -- Remote with User Interaction
Access Privileged Data -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2009-3554 CVE-2009-2625 CVE-2009-2405
CVE-2009-1380 CVE-2009-0217
Reference: ESB-2009.1523
Original Bulletin:
https://rhn.redhat.com/errata/RHSA-2009-1636.html
https://rhn.redhat.com/errata/RHSA-2009-1637.html
https://rhn.redhat.com/errata/RHSA-2009-1649.html
https://rhn.redhat.com/errata/RHSA-2009-1650.html
Comment: This bulletin contains four (4) Red Hat security advisories.
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: JBoss Enterprise Application Platform 4.3.0.CP07 update
Advisory ID: RHSA-2009:1636-01
Product: JBoss Enterprise Application Platform
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1636.html
Issue date: 2009-12-09
CVE Names: CVE-2009-0217 CVE-2009-1380 CVE-2009-2405
CVE-2009-2625 CVE-2009-3554
=====================================================================
1. Summary:
Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix
multiple security issues, several bugs, and add enhancements are now
available for Red Hat Enterprise Linux 4 as JBEAP 4.3.0.CP07.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS - noarch
JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES - noarch
3. Description:
JBoss Enterprise Application Platform is the market leading platform for
innovative and scalable Java applications; integrating the JBoss
Application Server, with JBoss Hibernate and JBoss Seam into a complete,
simple enterprise solution.
This release of JBEAP for Red Hat Enterprise Linux 4 serves as a
replacement to JBEAP 4.3.0.CP06.
These updated packages include bug fixes and enhancements which are
detailed in the Release Notes, available shortly from:
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/
The following security issues are also fixed with this release:
A missing check for the recommended minimum length of the truncated form of
HMAC-based XML signatures was found in xml-security. An attacker could use
this flaw to create a specially-crafted XML file that forges an XML
signature, allowing the attacker to bypass authentication that is based on
the XML Signature specification. (CVE-2009-0217)
Swatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss
Application Server Web Console. An attacker could use these flaws to
present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-2405)
A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)
An information leak flaw was found in the twiddle command line client. The
JMX password was logged in plain text to "twiddle.log". (CVE-2009-3554)
An XSS flaw was found in the JMX Console. An attacker could use this flaw
to present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-1380)
Warning: Before applying this update, please backup the JBEAP
"server/[configuration]/deploy/" directory, and any other customized
configuration files.
All users of JBEAP 4.3 on Red Hat Enterprise Linux 4 are advised to upgrade
to these updated packages.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
510023 - CVE-2009-2405 JBoss Application Server Web Console XSS
511224 - CVE-2009-1380 jbossas JMX-Console cross-site-scripting in filter parameter
511915 - CVE-2009-0217 xmlsec1, mono, xml-security-c, xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass
512921 - CVE-2009-2625 OpenJDK: XML parsing Denial-Of-Service (6845701)
532117 - Tracker bug for the EAP 4.3.0.cp07 release.
539495 - CVE-2009-3554 JBoss EAP Twiddle logs the JMX password
6. Package List:
JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS:
Source:
glassfish-javamail-1.4.2-0jpp.ep1.5.el4.src.rpm
glassfish-jaxb-2.1.4-1.12.patch03.ep1.el4.src.rpm
glassfish-jsf-1.2_13-2.1.ep1.el4.src.rpm
hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src.rpm
hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.src.rpm
hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.src.rpm
jacorb-2.3.0-1jpp.ep1.9.el4.src.rpm
jakarta-commons-logging-jboss-1.1-9.ep1.el4.src.rpm
jboss-aop-1.5.5-3.CP04.2.ep1.el4.src.rpm
jboss-common-1.2.1-0jpp.ep1.3.el4.src.rpm
jboss-messaging-1.4.0-3.SP3_CP09.4.ep1.el4.src.rpm
jboss-remoting-2.2.3-3.SP1.ep1.el4.src.rpm
jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src.rpm
jboss-seam2-2.0.2.FP-1.ep1.21.el4.src.rpm
jbossas-4.3.0-6.GA_CP07.4.ep1.el4.src.rpm
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src.rpm
jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.src.rpm
jbossws-2.0.1-4.SP2_CP07.2.ep1.el4.src.rpm
jbossws-common-1.0.0-2.GA_CP05.1.ep1.el4.src.rpm
jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el4.src.rpm
jcommon-1.0.16-1.1.ep1.el4.src.rpm
jfreechart-1.0.13-2.3.1.ep1.el4.src.rpm
jgroups-2.4.7-1.ep1.el4.src.rpm
quartz-1.5.2-1jpp.patch01.ep1.4.el4.src.rpm
rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el4.src.rpm
xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.src.rpm
xml-security-1.3.0-1.3.patch01.ep1.2.el4.src.rpm
noarch:
glassfish-javamail-1.4.2-0jpp.ep1.5.el4.noarch.rpm
glassfish-jaxb-2.1.4-1.12.patch03.ep1.el4.noarch.rpm
glassfish-jaxb-javadoc-2.1.4-1.12.patch03.ep1.el4.noarch.rpm
glassfish-jsf-1.2_13-2.1.ep1.el4.noarch.rpm
hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm
hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm
hibernate3-annotations-javadoc-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm
hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm
hibernate3-entitymanager-javadoc-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm
hibernate3-javadoc-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm
jacorb-2.3.0-1jpp.ep1.9.el4.noarch.rpm
jakarta-commons-logging-jboss-1.1-9.ep1.el4.noarch.rpm
jboss-aop-1.5.5-3.CP04.2.ep1.el4.noarch.rpm
jboss-common-1.2.1-0jpp.ep1.3.el4.noarch.rpm
jboss-messaging-1.4.0-3.SP3_CP09.4.ep1.el4.noarch.rpm
jboss-remoting-2.2.3-3.SP1.ep1.el4.noarch.rpm
jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch.rpm
jboss-seam-docs-1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch.rpm
jboss-seam2-2.0.2.FP-1.ep1.21.el4.noarch.rpm
jboss-seam2-docs-2.0.2.FP-1.ep1.21.el4.noarch.rpm
jbossas-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm
jbossas-4.3.0.GA_CP07-bin-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm
jbossas-client-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch.rpm
jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.noarch.rpm
jbossws-2.0.1-4.SP2_CP07.2.ep1.el4.noarch.rpm
jbossws-common-1.0.0-2.GA_CP05.1.ep1.el4.noarch.rpm
jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el4.noarch.rpm
jbossws-native42-2.0.1-4.SP2_CP07.2.ep1.el4.noarch.rpm
jcommon-1.0.16-1.1.ep1.el4.noarch.rpm
jfreechart-1.0.13-2.3.1.ep1.el4.noarch.rpm
jgroups-2.4.7-1.ep1.el4.noarch.rpm
quartz-1.5.2-1jpp.patch01.ep1.4.el4.noarch.rpm
rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el4.noarch.rpm
rh-eap-docs-examples-4.3.0-6.GA_CP07.ep1.3.el4.noarch.rpm
xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch.rpm
xml-security-1.3.0-1.3.patch01.ep1.2.el4.noarch.rpm
JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES:
Source:
glassfish-javamail-1.4.2-0jpp.ep1.5.el4.src.rpm
glassfish-jaxb-2.1.4-1.12.patch03.ep1.el4.src.rpm
glassfish-jsf-1.2_13-2.1.ep1.el4.src.rpm
hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src.rpm
hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.src.rpm
hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.src.rpm
jacorb-2.3.0-1jpp.ep1.9.el4.src.rpm
jakarta-commons-logging-jboss-1.1-9.ep1.el4.src.rpm
jboss-aop-1.5.5-3.CP04.2.ep1.el4.src.rpm
jboss-common-1.2.1-0jpp.ep1.3.el4.src.rpm
jboss-messaging-1.4.0-3.SP3_CP09.4.ep1.el4.src.rpm
jboss-remoting-2.2.3-3.SP1.ep1.el4.src.rpm
jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src.rpm
jboss-seam2-2.0.2.FP-1.ep1.21.el4.src.rpm
jbossas-4.3.0-6.GA_CP07.4.ep1.el4.src.rpm
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src.rpm
jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.src.rpm
jbossws-2.0.1-4.SP2_CP07.2.ep1.el4.src.rpm
jbossws-common-1.0.0-2.GA_CP05.1.ep1.el4.src.rpm
jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el4.src.rpm
jcommon-1.0.16-1.1.ep1.el4.src.rpm
jfreechart-1.0.13-2.3.1.ep1.el4.src.rpm
jgroups-2.4.7-1.ep1.el4.src.rpm
quartz-1.5.2-1jpp.patch01.ep1.4.el4.src.rpm
rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el4.src.rpm
xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.src.rpm
xml-security-1.3.0-1.3.patch01.ep1.2.el4.src.rpm
noarch:
glassfish-javamail-1.4.2-0jpp.ep1.5.el4.noarch.rpm
glassfish-jaxb-2.1.4-1.12.patch03.ep1.el4.noarch.rpm
glassfish-jaxb-javadoc-2.1.4-1.12.patch03.ep1.el4.noarch.rpm
glassfish-jsf-1.2_13-2.1.ep1.el4.noarch.rpm
hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm
hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm
hibernate3-annotations-javadoc-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm
hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm
hibernate3-entitymanager-javadoc-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm
hibernate3-javadoc-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm
jacorb-2.3.0-1jpp.ep1.9.el4.noarch.rpm
jakarta-commons-logging-jboss-1.1-9.ep1.el4.noarch.rpm
jboss-aop-1.5.5-3.CP04.2.ep1.el4.noarch.rpm
jboss-common-1.2.1-0jpp.ep1.3.el4.noarch.rpm
jboss-messaging-1.4.0-3.SP3_CP09.4.ep1.el4.noarch.rpm
jboss-remoting-2.2.3-3.SP1.ep1.el4.noarch.rpm
jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch.rpm
jboss-seam-docs-1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch.rpm
jboss-seam2-2.0.2.FP-1.ep1.21.el4.noarch.rpm
jboss-seam2-docs-2.0.2.FP-1.ep1.21.el4.noarch.rpm
jbossas-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm
jbossas-4.3.0.GA_CP07-bin-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm
jbossas-client-4.3.0-6.GA_CP07.4.ep1.el4.noarch.rpm
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch.rpm
jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.noarch.rpm
jbossws-2.0.1-4.SP2_CP07.2.ep1.el4.noarch.rpm
jbossws-common-1.0.0-2.GA_CP05.1.ep1.el4.noarch.rpm
jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el4.noarch.rpm
jbossws-native42-2.0.1-4.SP2_CP07.2.ep1.el4.noarch.rpm
jcommon-1.0.16-1.1.ep1.el4.noarch.rpm
jfreechart-1.0.13-2.3.1.ep1.el4.noarch.rpm
jgroups-2.4.7-1.ep1.el4.noarch.rpm
quartz-1.5.2-1jpp.patch01.ep1.4.el4.noarch.rpm
rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el4.noarch.rpm
rh-eap-docs-examples-4.3.0-6.GA_CP07.ep1.3.el4.noarch.rpm
xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch.rpm
xml-security-1.3.0-1.3.patch01.ep1.2.el4.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0217
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1380
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2405
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3554
http://www.redhat.com/security/updates/classification/#moderate
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2009 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFLIDzmXlSAg2UNWIIRAhhkAKDAj8v8w2aTwSgUIX1LpP2e6wRDhACfZ9Px
JmgS7lgaYnNRcG0z9ksCkMU=
=RaXE
- -----END PGP SIGNATURE-----
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: JBoss Enterprise Application Platform 4.2.0.CP08 update
Advisory ID: RHSA-2009:1637-01
Product: JBoss Enterprise Application Platform
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1637.html
Issue date: 2009-12-09
CVE Names: CVE-2009-0217 CVE-2009-1380 CVE-2009-2405
CVE-2009-2625 CVE-2009-3554
=====================================================================
1. Summary:
Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix
multiple security issues, several bugs, and add enhancements are now
available for Red Hat Enterprise Linux 4 as JBEAP 4.2.0.CP08.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
JBoss Enterprise Application Platform for RHEL 4 AS - noarch
JBoss Enterprise Application Platform for RHEL 4 ES - noarch
3. Description:
JBoss Enterprise Application Platform is the market leading platform for
innovative and scalable Java applications; integrating the JBoss
Application Server, with JBoss Hibernate and JBoss Seam into a complete,
simple enterprise solution.
This release of JBEAP for Red Hat Enterprise Linux 4 serves as a
replacement to JBEAP 4.2.0.CP07.
These updated packages include bug fixes and enhancements which are
detailed in the Release Notes, available shortly from:
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/
The following security issues are also fixed with this release:
A missing check for the recommended minimum length of the truncated form of
HMAC-based XML signatures was found in xml-security. An attacker could use
this flaw to create a specially-crafted XML file that forges an XML
signature, allowing the attacker to bypass authentication that is based on
the XML Signature specification. (CVE-2009-0217)
Swatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss
Application Server Web Console. An attacker could use these flaws to
present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-2405)
A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)
An information leak flaw was found in the twiddle command line client. The
JMX password was logged in plain text to "twiddle.log". (CVE-2009-3554)
An XSS flaw was found in the JMX Console. An attacker could use this flaw
to present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-1380)
Warning: Before applying this update, please backup the JBEAP
"server/[configuration]/deploy/" directory, and any other customized
configuration files.
All users of JBEAP 4.2 on Red Hat Enterprise Linux 4 are advised to upgrade
to these updated packages.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
510023 - CVE-2009-2405 JBoss Application Server Web Console XSS
511224 - CVE-2009-1380 jbossas JMX-Console cross-site-scripting in filter parameter
511915 - CVE-2009-0217 xmlsec1, mono, xml-security-c, xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass
512921 - CVE-2009-2625 OpenJDK: XML parsing Denial-Of-Service (6845701)
532116 - Tracker bug for the EAP 4.2.0.cp08 release.
539495 - CVE-2009-3554 JBoss EAP Twiddle logs the JMX password
6. Package List:
JBoss Enterprise Application Platform for RHEL 4 AS:
Source:
glassfish-javamail-1.4.2-0jpp.ep1.5.el4.src.rpm
glassfish-jsf-1.2_13-2.1.ep1.el4.src.rpm
hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src.rpm
hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.src.rpm
hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.src.rpm
jacorb-2.3.0-1jpp.ep1.9.el4.src.rpm
jakarta-commons-logging-jboss-1.1-9.ep1.el4.src.rpm
jboss-aop-1.5.5-3.CP04.2.ep1.el4.src.rpm
jboss-common-1.2.1-0jpp.ep1.3.el4.src.rpm
jboss-remoting-2.2.3-3.SP1.ep1.el4.src.rpm
jboss-seam-1.2.1-1.ep1.22.el4.src.rpm
jbossas-4.2.0-5.GA_CP08.5.ep1.el4.src.rpm
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src.rpm
jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.src.rpm
jcommon-1.0.16-1.1.ep1.el4.src.rpm
jfreechart-1.0.13-2.3.1.ep1.el4.src.rpm
jgroups-2.4.7-1.ep1.el4.src.rpm
quartz-1.5.2-1jpp.patch01.ep1.4.el4.src.rpm
rh-eap-docs-4.2.0-6.GA_CP08.ep1.3.el4.src.rpm
xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.src.rpm
xml-security-1.3.0-1.3.patch01.ep1.2.el4.src.rpm
noarch:
glassfish-javamail-1.4.2-0jpp.ep1.5.el4.noarch.rpm
glassfish-jsf-1.2_13-2.1.ep1.el4.noarch.rpm
hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm
hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm
hibernate3-annotations-javadoc-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm
hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm
hibernate3-entitymanager-javadoc-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm
hibernate3-javadoc-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm
jacorb-2.3.0-1jpp.ep1.9.el4.noarch.rpm
jakarta-commons-logging-jboss-1.1-9.ep1.el4.noarch.rpm
jboss-aop-1.5.5-3.CP04.2.ep1.el4.noarch.rpm
jboss-common-1.2.1-0jpp.ep1.3.el4.noarch.rpm
jboss-remoting-2.2.3-3.SP1.ep1.el4.noarch.rpm
jboss-seam-1.2.1-1.ep1.22.el4.noarch.rpm
jboss-seam-docs-1.2.1-1.ep1.22.el4.noarch.rpm
jbossas-4.2.0-5.GA_CP08.5.ep1.el4.noarch.rpm
jbossas-4.2.0.GA_CP08-bin-4.2.0-5.GA_CP08.5.ep1.el4.noarch.rpm
jbossas-client-4.2.0-5.GA_CP08.5.ep1.el4.noarch.rpm
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch.rpm
jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.noarch.rpm
jcommon-1.0.16-1.1.ep1.el4.noarch.rpm
jfreechart-1.0.13-2.3.1.ep1.el4.noarch.rpm
jgroups-2.4.7-1.ep1.el4.noarch.rpm
quartz-1.5.2-1jpp.patch01.ep1.4.el4.noarch.rpm
rh-eap-docs-4.2.0-6.GA_CP08.ep1.3.el4.noarch.rpm
rh-eap-docs-examples-4.2.0-6.GA_CP08.ep1.3.el4.noarch.rpm
xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch.rpm
xml-security-1.3.0-1.3.patch01.ep1.2.el4.noarch.rpm
JBoss Enterprise Application Platform for RHEL 4 ES:
Source:
glassfish-javamail-1.4.2-0jpp.ep1.5.el4.src.rpm
glassfish-jsf-1.2_13-2.1.ep1.el4.src.rpm
hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src.rpm
hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.src.rpm
hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.src.rpm
jacorb-2.3.0-1jpp.ep1.9.el4.src.rpm
jakarta-commons-logging-jboss-1.1-9.ep1.el4.src.rpm
jboss-aop-1.5.5-3.CP04.2.ep1.el4.src.rpm
jboss-common-1.2.1-0jpp.ep1.3.el4.src.rpm
jboss-remoting-2.2.3-3.SP1.ep1.el4.src.rpm
jboss-seam-1.2.1-1.ep1.22.el4.src.rpm
jbossas-4.2.0-5.GA_CP08.5.ep1.el4.src.rpm
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src.rpm
jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.src.rpm
jcommon-1.0.16-1.1.ep1.el4.src.rpm
jfreechart-1.0.13-2.3.1.ep1.el4.src.rpm
jgroups-2.4.7-1.ep1.el4.src.rpm
quartz-1.5.2-1jpp.patch01.ep1.4.el4.src.rpm
rh-eap-docs-4.2.0-6.GA_CP08.ep1.3.el4.src.rpm
xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.src.rpm
xml-security-1.3.0-1.3.patch01.ep1.2.el4.src.rpm
noarch:
glassfish-javamail-1.4.2-0jpp.ep1.5.el4.noarch.rpm
glassfish-jsf-1.2_13-2.1.ep1.el4.noarch.rpm
hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm
hibernate3-annotations-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm
hibernate3-annotations-javadoc-3.3.1-1.11.GA_CP02.ep1.el4.noarch.rpm
hibernate3-entitymanager-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm
hibernate3-entitymanager-javadoc-3.3.2-2.5.GA_CP01.ep1.el4.noarch.rpm
hibernate3-javadoc-3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch.rpm
jacorb-2.3.0-1jpp.ep1.9.el4.noarch.rpm
jakarta-commons-logging-jboss-1.1-9.ep1.el4.noarch.rpm
jboss-aop-1.5.5-3.CP04.2.ep1.el4.noarch.rpm
jboss-common-1.2.1-0jpp.ep1.3.el4.noarch.rpm
jboss-remoting-2.2.3-3.SP1.ep1.el4.noarch.rpm
jboss-seam-1.2.1-1.ep1.22.el4.noarch.rpm
jboss-seam-docs-1.2.1-1.ep1.22.el4.noarch.rpm
jbossas-4.2.0-5.GA_CP08.5.ep1.el4.noarch.rpm
jbossas-4.2.0.GA_CP08-bin-4.2.0-5.GA_CP08.5.ep1.el4.noarch.rpm
jbossas-client-4.2.0-5.GA_CP08.5.ep1.el4.noarch.rpm
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch.rpm
jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el4.noarch.rpm
jcommon-1.0.16-1.1.ep1.el4.noarch.rpm
jfreechart-1.0.13-2.3.1.ep1.el4.noarch.rpm
jgroups-2.4.7-1.ep1.el4.noarch.rpm
quartz-1.5.2-1jpp.patch01.ep1.4.el4.noarch.rpm
rh-eap-docs-4.2.0-6.GA_CP08.ep1.3.el4.noarch.rpm
rh-eap-docs-examples-4.2.0-6.GA_CP08.ep1.3.el4.noarch.rpm
xerces-j2-2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch.rpm
xml-security-1.3.0-1.3.patch01.ep1.2.el4.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0217
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1380
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2405
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3554
http://www.redhat.com/security/updates/classification/#moderate
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2009 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFLID0LXlSAg2UNWIIRAn2pAKC6voVHatiO/bZlerinYdiJtfRyUACfZi2H
yNeR7dwaGuOXGO60Gsm2F/A=
=jgd1
- -----END PGP SIGNATURE-----
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: JBoss Enterprise Application Platform 4.3.0.CP07 update
Advisory ID: RHSA-2009:1649-01
Product: JBoss Enterprise Application Platform
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1649.html
Issue date: 2009-12-09
CVE Names: CVE-2009-0217 CVE-2009-1380 CVE-2009-2405
CVE-2009-2625 CVE-2009-3554
=====================================================================
1. Summary:
Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix
multiple security issues, several bugs, and add enhancements are now
available for Red Hat Enterprise Linux 5 as JBEAP 4.3.0.CP07.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server - noarch
3. Description:
JBoss Enterprise Application Platform is the market leading platform for
innovative and scalable Java applications; integrating the JBoss
Application Server, with JBoss Hibernate and JBoss Seam into a complete,
simple enterprise solution.
This release of JBEAP for Red Hat Enterprise Linux 5 serves as a
replacement to JBEAP 4.3.0.CP06.
These updated packages include bug fixes and enhancements which are
detailed in the Release Notes, available shortly from:
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/
The following security issues are also fixed with this release:
A missing check for the recommended minimum length of the truncated form of
HMAC-based XML signatures was found in xml-security. An attacker could use
this flaw to create a specially-crafted XML file that forges an XML
signature, allowing the attacker to bypass authentication that is based on
the XML Signature specification. (CVE-2009-0217)
Swatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss
Application Server Web Console. An attacker could use these flaws to
present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-2405)
A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)
An information leak flaw was found in the twiddle command line client. The
JMX password was logged in plain text to "twiddle.log". (CVE-2009-3554)
An XSS flaw was found in the JMX Console. An attacker could use this flaw
to present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-1380)
Warning: Before applying this update, please backup the JBEAP
"server/[configuration]/deploy/" directory, and any other customized
configuration files.
All users of JBEAP 4.3 on Red Hat Enterprise Linux 5 are advised to upgrade
to these updated packages.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
510023 - CVE-2009-2405 JBoss Application Server Web Console XSS
511224 - CVE-2009-1380 jbossas JMX-Console cross-site-scripting in filter parameter
511915 - CVE-2009-0217 xmlsec1, mono, xml-security-c, xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass
512921 - CVE-2009-2625 OpenJDK: XML parsing Denial-Of-Service (6845701)
532113 - Tracker bug for the EAP 4.3.0.cp07 release.
539495 - CVE-2009-3554 JBoss EAP Twiddle logs the JMX password
6. Package List:
JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server:
Source:
glassfish-jaxb-2.1.4-1.12.patch03.1.ep1.el5.src.rpm
glassfish-jsf-1.2_13-2.1.ep1.el5.src.rpm
hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src.rpm
hibernate3-annotations-3.3.1-1.11GA_CP02.ep1.el5.src.rpm
hibernate3-entitymanager-3.3.2-2.5.1.ep1.el5.src.rpm
jacorb-2.3.0-1jpp.ep1.9.1.el5.src.rpm
jboss-aop-1.5.5-3.CP04.2.ep1.el5.src.rpm
jboss-common-1.2.1-0jpp.ep1.3.el5.1.src.rpm
jboss-messaging-1.4.0-3.SP3_CP09.4.ep1.el5.src.rpm
jboss-remoting-2.2.3-3.SP1.ep1.el5.src.rpm
jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src.rpm
jboss-seam2-2.0.2.FP-1.ep1.18.el5.src.rpm
jbossas-4.3.0-6.GA_CP07.4.2.ep1.el5.src.rpm
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src.rpm
jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el5.src.rpm
jbossws-2.0.1-4.SP2_CP07.2.1.ep1.el5.src.rpm
jbossws-common-1.0.0-2.GA_CP05.1.ep1.el5.src.rpm
jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el5.src.rpm
jcommon-1.0.16-1.1.ep1.el5.src.rpm
jfreechart-1.0.13-2.3.1.ep1.el5.src.rpm
jgroups-2.4.7-1.ep1.el5.src.rpm
quartz-1.5.2-1jpp.patch01.ep1.4.1.el5.src.rpm
rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el5.src.rpm
xml-security-1.3.0-1.3.patch01.ep1.2.1.el5.src.rpm
noarch:
glassfish-jaxb-2.1.4-1.12.patch03.1.ep1.el5.noarch.rpm
glassfish-jaxb-javadoc-2.1.4-1.12.patch03.1.ep1.el5.noarch.rpm
glassfish-jsf-1.2_13-2.1.ep1.el5.noarch.rpm
hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch.rpm
hibernate3-annotations-3.3.1-1.11GA_CP02.ep1.el5.noarch.rpm
hibernate3-annotations-javadoc-3.3.1-1.11GA_CP02.ep1.el5.noarch.rpm
hibernate3-entitymanager-3.3.2-2.5.1.ep1.el5.noarch.rpm
hibernate3-entitymanager-javadoc-3.3.2-2.5.1.ep1.el5.noarch.rpm
hibernate3-javadoc-3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch.rpm
jacorb-2.3.0-1jpp.ep1.9.1.el5.noarch.rpm
jboss-aop-1.5.5-3.CP04.2.ep1.el5.noarch.rpm
jboss-common-1.2.1-0jpp.ep1.3.el5.1.noarch.rpm
jboss-messaging-1.4.0-3.SP3_CP09.4.ep1.el5.noarch.rpm
jboss-remoting-2.2.3-3.SP1.ep1.el5.noarch.rpm
jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch.rpm
jboss-seam-docs-1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch.rpm
jboss-seam2-2.0.2.FP-1.ep1.18.el5.noarch.rpm
jboss-seam2-docs-2.0.2.FP-1.ep1.18.el5.noarch.rpm
jbossas-4.3.0-6.GA_CP07.4.2.ep1.el5.noarch.rpm
jbossas-4.3.0.GA_CP07-bin-4.3.0-6.GA_CP07.4.2.ep1.el5.noarch.rpm
jbossas-client-4.3.0-6.GA_CP07.4.2.ep1.el5.noarch.rpm
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch.rpm
jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el5.noarch.rpm
jbossws-2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch.rpm
jbossws-common-1.0.0-2.GA_CP05.1.ep1.el5.noarch.rpm
jbossws-framework-2.0.1-1.GA_CP05.1.ep1.el5.noarch.rpm
jbossws-native42-2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch.rpm
jcommon-1.0.16-1.1.ep1.el5.noarch.rpm
jfreechart-1.0.13-2.3.1.ep1.el5.noarch.rpm
jgroups-2.4.7-1.ep1.el5.noarch.rpm
quartz-1.5.2-1jpp.patch01.ep1.4.1.el5.noarch.rpm
rh-eap-docs-4.3.0-6.GA_CP07.ep1.3.el5.noarch.rpm
rh-eap-docs-examples-4.3.0-6.GA_CP07.ep1.3.el5.noarch.rpm
xml-security-1.3.0-1.3.patch01.ep1.2.1.el5.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0217
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1380
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2405
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3554
http://www.redhat.com/security/updates/classification/#moderate
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2009 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFLID0pXlSAg2UNWIIRAhC3AJ4sa9pslMmMeqakNNqmniOdBm2jgACfYc43
kAdhZnEh5S+JpI+B8Xjpjq4=
=XE/m
- -----END PGP SIGNATURE-----
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=====================================================================
Red Hat Security Advisory
Synopsis: Moderate: JBoss Enterprise Application Platform 4.2.0.CP08 update
Advisory ID: RHSA-2009:1650-01
Product: JBoss Enterprise Application Platform
Advisory URL: https://rhn.redhat.com/errata/RHSA-2009-1650.html
Issue date: 2009-12-09
CVE Names: CVE-2009-0217 CVE-2009-1380 CVE-2009-2405
CVE-2009-2625 CVE-2009-3554
=====================================================================
1. Summary:
Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix
multiple security issues, several bugs, and add enhancements are now
available for Red Hat Enterprise Linux 5 as JBEAP 4.2.0.CP08.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
2. Relevant releases/architectures:
JBoss Enterprise Application Platform for RHEL 5 Server - noarch
3. Description:
JBoss Enterprise Application Platform is the market leading platform for
innovative and scalable Java applications; integrating the JBoss
Application Server, with JBoss Hibernate and JBoss Seam into a complete,
simple enterprise solution.
This release of JBEAP for Red Hat Enterprise Linux 5 serves as a
replacement to JBEAP 4.2.0.CP07.
These updated packages include bug fixes and enhancements which are
detailed in the Release Notes, available shortly from:
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/
The following security issues are also fixed with this release:
A missing check for the recommended minimum length of the truncated form of
HMAC-based XML signatures was found in xml-security. An attacker could use
this flaw to create a specially-crafted XML file that forges an XML
signature, allowing the attacker to bypass authentication that is based on
the XML Signature specification. (CVE-2009-0217)
Swatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss
Application Server Web Console. An attacker could use these flaws to
present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-2405)
A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)
An information leak flaw was found in the twiddle command line client. The
JMX password was logged in plain text to "twiddle.log". (CVE-2009-3554)
An XSS flaw was found in the JMX Console. An attacker could use this flaw
to present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-1380)
Warning: Before applying this update, please backup the JBEAP
"server/[configuration]/deploy/" directory, and any other customized
configuration files.
All users of JBEAP 4.2 on Red Hat Enterprise Linux 5 are advised to upgrade
to these updated packages.
4. Solution:
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
5. Bugs fixed (http://bugzilla.redhat.com/):
510023 - CVE-2009-2405 JBoss Application Server Web Console XSS
511224 - CVE-2009-1380 jbossas JMX-Console cross-site-scripting in filter parameter
511915 - CVE-2009-0217 xmlsec1, mono, xml-security-c, xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass
512921 - CVE-2009-2625 OpenJDK: XML parsing Denial-Of-Service (6845701)
532111 - Tracker bug for the EAP 4.2.0.cp08 release for RHEL-5.
539495 - CVE-2009-3554 JBoss EAP Twiddle logs the JMX password
6. Package List:
JBoss Enterprise Application Platform for RHEL 5 Server:
Source:
glassfish-jsf-1.2_13-2.1.ep1.el5.src.rpm
hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src.rpm
hibernate3-annotations-3.3.1-1.11GA_CP02.ep1.el5.src.rpm
hibernate3-entitymanager-3.3.2-2.5.1.ep1.el5.src.rpm
jacorb-2.3.0-1jpp.ep1.9.1.el5.src.rpm
jboss-aop-1.5.5-3.CP04.2.ep1.el5.src.rpm
jboss-common-1.2.1-0jpp.ep1.3.el5.1.src.rpm
jboss-remoting-2.2.3-3.SP1.ep1.el5.src.rpm
jboss-seam-1.2.1-1.ep1.14.el5.src.rpm
jbossas-4.2.0-5.GA_CP08.5.2.ep1.el5.src.rpm
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src.rpm
jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el5.src.rpm
jcommon-1.0.16-1.1.ep1.el5.src.rpm
jfreechart-1.0.13-2.3.1.ep1.el5.src.rpm
jgroups-2.4.7-1.ep1.el5.src.rpm
quartz-1.5.2-1jpp.patch01.ep1.4.1.el5.src.rpm
rh-eap-docs-4.2.0-6.GA_CP08.ep1.3.el5.src.rpm
xml-security-1.3.0-1.3.patch01.ep1.2.1.el5.src.rpm
noarch:
glassfish-jsf-1.2_13-2.1.ep1.el5.noarch.rpm
hibernate3-3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch.rpm
hibernate3-annotations-3.3.1-1.11GA_CP02.ep1.el5.noarch.rpm
hibernate3-annotations-javadoc-3.3.1-1.11GA_CP02.ep1.el5.noarch.rpm
hibernate3-entitymanager-3.3.2-2.5.1.ep1.el5.noarch.rpm
hibernate3-entitymanager-javadoc-3.3.2-2.5.1.ep1.el5.noarch.rpm
hibernate3-javadoc-3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch.rpm
jacorb-2.3.0-1jpp.ep1.9.1.el5.noarch.rpm
jboss-aop-1.5.5-3.CP04.2.ep1.el5.noarch.rpm
jboss-common-1.2.1-0jpp.ep1.3.el5.1.noarch.rpm
jboss-remoting-2.2.3-3.SP1.ep1.el5.noarch.rpm
jboss-seam-1.2.1-1.ep1.14.el5.noarch.rpm
jboss-seam-docs-1.2.1-1.ep1.14.el5.noarch.rpm
jbossas-4.2.0-5.GA_CP08.5.2.ep1.el5.noarch.rpm
jbossas-4.2.0.GA_CP08-bin-4.2.0-5.GA_CP08.5.2.ep1.el5.noarch.rpm
jbossas-client-4.2.0-5.GA_CP08.5.2.ep1.el5.noarch.rpm
jbossts-4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch.rpm
jbossweb-2.0.0-6.CP12.0jpp.ep1.2.el5.noarch.rpm
jcommon-1.0.16-1.1.ep1.el5.noarch.rpm
jfreechart-1.0.13-2.3.1.ep1.el5.noarch.rpm
jgroups-2.4.7-1.ep1.el5.noarch.rpm
quartz-1.5.2-1jpp.patch01.ep1.4.1.el5.noarch.rpm
rh-eap-docs-4.2.0-6.GA_CP08.ep1.3.el5.noarch.rpm
rh-eap-docs-examples-4.2.0-6.GA_CP08.ep1.3.el5.noarch.rpm
xml-security-1.3.0-1.3.patch01.ep1.2.1.el5.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package
7. References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0217
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1380
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2405
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3554
http://www.redhat.com/security/updates/classification/#moderate
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://www.redhat.com/security/team/contact/
Copyright 2009 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFLID04XlSAg2UNWIIRAonRAJ4mQnC0YMPnQHQ1qeBYrkKkVU/d/gCgrQTW
2W2lojTMV1aP2aOzFtXZRrA=
=YwY8
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
iD8DBQFLIFD9NVH5XJJInbgRAjCaAKCEF67lbGpujeVUR9NHPuPhqZv5EgCgiHc9
3wusQ4C3oIFuoSoClPfftLo=
=rvT+
-----END PGP SIGNATURE-----
|