- Issued:
- 2009-03-06
- Updated:
- 2009-03-06
RHSA-2009:0349 - Security Advisory
Synopsis
Moderate: JBoss Enterprise Application Platform 4.3.0CP04 update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated JBoss Enterprise Application Platform (JBoss EAP) 4.3 packages that
fix various issues are now available for Red Hat Enterprise Linux 5 as
JBEAP 4.3.0.CP04.
This update has been rated as having moderate security impact by the Red Hat
Security Response Team.
Description
JBoss Enterprise Application Platform (JBoss EAP) is the market-leading
platform for innovative and scalable Java applications. JBoss EAP
integrates the JBoss Application Server with JBoss Hibernate and JBoss Seam
into a complete, simple enterprise solution.
This release of JBoss EAP for Red Hat Enterprise Linux 5 serves as a
replacement for JBEAP 4.3.0.CP03.
These updated packages include bug fixes and enhancements which are
detailed in the release notes. The link to the release notes is available
in the References section of this errata.
The following security issue is also fixed with this release:
The request handler in JBossWS did not correctly verify the resource path
when serving WSDL files for custom web service endpoints. This allowed
remote attackers to read arbitrary XML files with the permissions of the
EAP process. (CVE-2009-0027)
Warning: before applying this update, please back up the JBoss EAP
"server/[configuration]/deploy/" directory, as well as any other customized
configuration files.
All users of JBoss EAP 4.3 on Red Hat Enterprise Linux 5 are advised to
upgrade to these updated packages, which resolve these issues.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- JBoss Enterprise Application Platform 4.3.0 x86_64
- JBoss Enterprise Application Platform 4.3.0 i386
Fixes
- BZ - 475258 - Tracker bug for the EAP 4.3.0.cp04 release for RHEL-5.
- BZ - 479668 - CVE-2009-0027 JBoss EAP unprivileged local xml file access
CVEs
JBoss Enterprise Application Platform 4.3.0
SRPM | |
---|---|
glassfish-jaxb-2.1.4-1.6.1.ep1.el5.src.rpm | SHA-256: 275840737036ac149bff363aac587920521180a2beec43048bd9b61619a92905 |
glassfish-jsf-1.2_10-0jpp.ep1.5.ep5.el5.src.rpm | SHA-256: 3ba2080f7e1f648fac991b894c4a3f9188b2d430547a88ed31368c5731eef74f |
hibernate3-3.2.4-1.SP1_CP07.0jpp.ep1.14.1.el5.src.rpm | SHA-256: ad6531be52b79cf325d6dcc7593b5435cabeee222ee744510eb58f65b4de1268 |
jacorb-2.3.0-1jpp.ep1.7.1.el5.src.rpm | SHA-256: 7b418519302f76aa28ce5dd87a1f1cf97e7b24e079d480b1b2742c76e35d752f |
jakarta-commons-logging-jboss-1.1-4.1.ep1.el5.src.rpm | SHA-256: e0af78d05e124c9d929653636466567255f70aadd584fbc68442923a8490ef3a |
jboss-cache-1.4.1-6.SP11.1.ep1.el5.src.rpm | SHA-256: 4159e70c3c530c793ee440a34ab713b9045dd721af1ad1acae8f329e52cc98b3 |
jboss-jaxr-1.2.0-SP2.0jpp.ep1.3.2.el5.src.rpm | SHA-256: 843c2ad98903687e6a5016e098475476335e9c9be6f2e0eb0a7c129aa8059adf |
jboss-messaging-1.4.0-2.SP3_CP07.1.ep1.el5.src.rpm | SHA-256: 6355121af706f5b1bb92ee81e426fff2e77169c41de6a080ac13eae708628b40 |
jboss-remoting-2.2.2-3.SP11.0jpp.ep1.1.el5.src.rpm | SHA-256: 97e518d54b4808f453c33a5583ee3269ccaa0704a6f8bf562dfd67172db96161 |
jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el5.1.src.rpm | SHA-256: 852d05274063c62cdf6fa8d3a7fe57add8e6ccc791072a32bf4b8d0a1bb06d34 |
jboss-vfs-1.0.0-1.ep1.el5.src.rpm | SHA-256: 647f87ec480acc2be2173c05492d047ab94eee4f2a42f88709c2d009682da9dd |
jbossas-4.3.0-3.GA_CP04.2.1.ep1.el5.src.rpm | SHA-256: b22a2a06460deb9ed28d558a49a7aa41be904731e4f068c5024cc9b87809324f |
jbossts-4.2.3-1.SP5_CP04.1jpp.ep1.2.el5.src.rpm | SHA-256: 2c3ef44cc01d21c72ce29a19ef5640897752692220237d5e8c114d16bc35ad2d |
jbossweb-2.0.0-6.CP09.0jpp.ep1.1.el5.src.rpm | SHA-256: 4f03e11b844354e508a5f8fb807659bbf0149ae21961024c48cd358778d5df10 |
jbossws-2.0.1-3.SP2_CP05.3.1.ep1.el5.src.rpm | SHA-256: ec684a7705f567dff4c3c8c7bc033e52885fe40a6bdc62e16c2c5397d1328019 |
jbossws-common-1.0.0-2.GA_CP03.1.ep1.el5.src.rpm | SHA-256: 5e86226de2e6029d6a3999434a92327ded80e3c401d504c925ac86cf2293504d |
jbossws-framework-2.0.1-1.GA_CP03.2.ep1.el5.src.rpm | SHA-256: 4d2011e78cbbb507d2b72f9a92b213e380aab805052f8eb77ed409be1fa27099 |
jgroups-2.4.5-2.1.ep1.el5.src.rpm | SHA-256: daab27bc3917e730cb37c96d51298623ebd75bc230ba5c1aeb52890d1d6ec5c6 |
rh-eap-docs-4.3.0-4.GA_CP04.ep1.3.1.el5.src.rpm | SHA-256: 3b641f821fe1fa8d84a0386c9d9ec2901b369e4e0c3f612d555ac3f913486358 |
tanukiwrapper-3.2.1-2jpp.ep1.2.el5.src.rpm | SHA-256: 2e18cc9e47a1c2da516de9966201dd0724243922fdddbad2c3a9c968e96329ee |
ws-commons-policy-1.0-2jpp.ep1.7.el5.src.rpm | SHA-256: aea42f4edf06276cb33d30328b9e573f9eb7a1ad4824c60dba991463fdb4263b |
ws-scout0-0.7-0.rc2.4.el5.src.rpm | SHA-256: 83c3525bd64d583510919cc90cf0c914db42b4439d9836c5e8c91eccefe39043 |
x86_64 | |
glassfish-jaxb-2.1.4-1.6.1.ep1.el5.noarch.rpm | SHA-256: e0cfb54991ba64a7e28f8971c6406b4d6773cd8ce036867086d968b2ec66cf8d |
glassfish-jaxb-javadoc-2.1.4-1.6.1.ep1.el5.noarch.rpm | SHA-256: 068607f0509c7d11a84b86121d53e4bb1d0059620c29f090145b3f8924701f9c |
glassfish-jsf-1.2_10-0jpp.ep1.5.ep5.el5.noarch.rpm | SHA-256: 610f453277f63a7e688f788db65887b9fc3917c1c2014715ceacd9d4678b7a3b |
hibernate3-3.2.4-1.SP1_CP07.0jpp.ep1.14.1.el5.noarch.rpm | SHA-256: c3305d521b7828e8536fcb509a3c81155ee338a8d28c1ae36f79993de87fe378 |
hibernate3-javadoc-3.2.4-1.SP1_CP07.0jpp.ep1.14.1.el5.noarch.rpm | SHA-256: fa9cb62a445091c60488a5be705e501965089da5a6ba8b69a18c4373b0d8389e |
jacorb-2.3.0-1jpp.ep1.7.1.el5.noarch.rpm | SHA-256: 283b1c40f86a256532719abfc5dade65cc27fa6b082eb00fafce1667c2258b16 |
jakarta-commons-logging-jboss-1.1-4.1.ep1.el5.noarch.rpm | SHA-256: 76510efa71ea1a6ab171d4e58a82f1cfda2c8e2c2fae731d2de0f26d9922efdf |
jboss-cache-1.4.1-6.SP11.1.ep1.el5.noarch.rpm | SHA-256: a740d065ca802513335c18c17b5c34a3dc5235c113ee31b5f432d1f19edd0b4b |
jboss-jaxr-1.2.0-SP2.0jpp.ep1.3.2.el5.noarch.rpm | SHA-256: 23fa05aba76dab316bd5c7ec28f070aac8a26ea8ac054f69dffa583a9dbecb02 |
jboss-messaging-1.4.0-2.SP3_CP07.1.ep1.el5.noarch.rpm | SHA-256: b0cb5f234389537da165bc48a781aaeb9914b5b11744da7f72f90dcbb09c2cb4 |
jboss-remoting-2.2.2-3.SP11.0jpp.ep1.1.el5.noarch.rpm | SHA-256: 4558ec99958911a0b7da5d0cd9c462d5c9ee46982d905c59f3d59d1ed9e00e33 |
jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el5.1.noarch.rpm | SHA-256: 0d27a9bfdf16218a004c154a1b2fd18ad1442f10b9c092ef5b140cbf0e3530c0 |
jboss-seam-docs-1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el5.1.noarch.rpm | SHA-256: 9fd1a5726595df4a5a5f00915568a5f8a79b0ebbf163ffc6035e8de4dc291798 |
jboss-vfs-1.0.0-1.ep1.el5.noarch.rpm | SHA-256: fe2e574cb747cdf0ff6abea42c43d824b7255ca4bffd9bba2370d989b56695d5 |
jbossas-4.3.0-3.GA_CP04.2.1.ep1.el5.noarch.rpm | SHA-256: fda0396b08f2353f22b481c856c512c63b45b3714f36f8fac87b6aca205952a1 |
jbossas-4.3.0.GA_CP04-bin-4.3.0-3.GA_CP04.2.1.ep1.el5.noarch.rpm | SHA-256: accc24cf69afc8fc543685589de5aedb37952d020ac814167340f05d475c3e09 |
jbossas-client-4.3.0-3.GA_CP04.2.1.ep1.el5.noarch.rpm | SHA-256: de8b3644581e23d47157f6b1470aa5cd3aebb4ecc98982d9c5b64c8ae3495d09 |
jbossts-4.2.3-1.SP5_CP04.1jpp.ep1.2.el5.noarch.rpm | SHA-256: 7f54552c5d3aae2bc3ed4f01f8cf1b9b9a069057f700a5470821581b7c0cfe59 |
jbossweb-2.0.0-6.CP09.0jpp.ep1.1.el5.noarch.rpm | SHA-256: 19d1d258c8ca31b13efef2dccf702269b00fb5e5f55fc33bb3188e88d6e2980c |
jbossws-2.0.1-3.SP2_CP05.3.1.ep1.el5.noarch.rpm | SHA-256: b52eefd7c3f59e222bce5319ddd60c142dd4fd8434814e1eab97e0c87e1b7e89 |
jbossws-common-1.0.0-2.GA_CP03.1.ep1.el5.noarch.rpm | SHA-256: 97ea30a3ca0a17675620c7e0831a8b28376c77446ac4b0239a6052ab9c39dc22 |
jbossws-framework-2.0.1-1.GA_CP03.2.ep1.el5.noarch.rpm | SHA-256: ab9137764244e4b0e14d79773d386f51ccac3f0fbf16eb4b1db6764ccef3e5c3 |
jgroups-2.4.5-2.1.ep1.el5.noarch.rpm | SHA-256: 50d3b60dc8a2ff45673d1f6d7394478c23d053ad33598e9c036ea52b3f3bdb4c |
rh-eap-docs-4.3.0-4.GA_CP04.ep1.3.1.el5.noarch.rpm | SHA-256: 16965486e14f478dd62e3d7afa746aadf74c47a195f3be14b23e693004f5c804 |
rh-eap-docs-examples-4.3.0-4.GA_CP04.ep1.3.1.el5.noarch.rpm | SHA-256: d2471bb53b258a27a7dcbb24ed3fede5319ff28a00883ebec355f9dcb54485bf |
tanukiwrapper-3.2.1-2jpp.ep1.2.el5.x86_64.rpm | SHA-256: f81b521bb0fb9345715f607f008b5d334df9dd43795def90d02fd1fc24dd7f62 |
ws-commons-policy-1.0-2jpp.ep1.7.el5.noarch.rpm | SHA-256: 4462d35dced5feebf80cb900f0e1b712f721346d3dabd6effcf369847335b085 |
ws-scout0-0.7-0.rc2.4.el5.noarch.rpm | SHA-256: 3e75c7f6c543751d499576c21e57a4d4090462c611a7de3c629b951f23b291c0 |
i386 | |
glassfish-jaxb-2.1.4-1.6.1.ep1.el5.noarch.rpm | SHA-256: e0cfb54991ba64a7e28f8971c6406b4d6773cd8ce036867086d968b2ec66cf8d |
glassfish-jaxb-javadoc-2.1.4-1.6.1.ep1.el5.noarch.rpm | SHA-256: 068607f0509c7d11a84b86121d53e4bb1d0059620c29f090145b3f8924701f9c |
glassfish-jsf-1.2_10-0jpp.ep1.5.ep5.el5.noarch.rpm | SHA-256: 610f453277f63a7e688f788db65887b9fc3917c1c2014715ceacd9d4678b7a3b |
hibernate3-3.2.4-1.SP1_CP07.0jpp.ep1.14.1.el5.noarch.rpm | SHA-256: c3305d521b7828e8536fcb509a3c81155ee338a8d28c1ae36f79993de87fe378 |
hibernate3-javadoc-3.2.4-1.SP1_CP07.0jpp.ep1.14.1.el5.noarch.rpm | SHA-256: fa9cb62a445091c60488a5be705e501965089da5a6ba8b69a18c4373b0d8389e |
jacorb-2.3.0-1jpp.ep1.7.1.el5.noarch.rpm | SHA-256: 283b1c40f86a256532719abfc5dade65cc27fa6b082eb00fafce1667c2258b16 |
jakarta-commons-logging-jboss-1.1-4.1.ep1.el5.noarch.rpm | SHA-256: 76510efa71ea1a6ab171d4e58a82f1cfda2c8e2c2fae731d2de0f26d9922efdf |
jboss-cache-1.4.1-6.SP11.1.ep1.el5.noarch.rpm | SHA-256: a740d065ca802513335c18c17b5c34a3dc5235c113ee31b5f432d1f19edd0b4b |
jboss-jaxr-1.2.0-SP2.0jpp.ep1.3.2.el5.noarch.rpm | SHA-256: 23fa05aba76dab316bd5c7ec28f070aac8a26ea8ac054f69dffa583a9dbecb02 |
jboss-messaging-1.4.0-2.SP3_CP07.1.ep1.el5.noarch.rpm | SHA-256: b0cb5f234389537da165bc48a781aaeb9914b5b11744da7f72f90dcbb09c2cb4 |
jboss-remoting-2.2.2-3.SP11.0jpp.ep1.1.el5.noarch.rpm | SHA-256: 4558ec99958911a0b7da5d0cd9c462d5c9ee46982d905c59f3d59d1ed9e00e33 |
jboss-seam-1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el5.1.noarch.rpm | SHA-256: 0d27a9bfdf16218a004c154a1b2fd18ad1442f10b9c092ef5b140cbf0e3530c0 |
jboss-seam-docs-1.2.1-3.JBPAPP_4_3_0_GA.ep1.10.el5.1.noarch.rpm | SHA-256: 9fd1a5726595df4a5a5f00915568a5f8a79b0ebbf163ffc6035e8de4dc291798 |
jboss-vfs-1.0.0-1.ep1.el5.noarch.rpm | SHA-256: fe2e574cb747cdf0ff6abea42c43d824b7255ca4bffd9bba2370d989b56695d5 |
jbossas-4.3.0-3.GA_CP04.2.1.ep1.el5.noarch.rpm | SHA-256: fda0396b08f2353f22b481c856c512c63b45b3714f36f8fac87b6aca205952a1 |
jbossas-4.3.0.GA_CP04-bin-4.3.0-3.GA_CP04.2.1.ep1.el5.noarch.rpm | SHA-256: accc24cf69afc8fc543685589de5aedb37952d020ac814167340f05d475c3e09 |
jbossas-client-4.3.0-3.GA_CP04.2.1.ep1.el5.noarch.rpm | SHA-256: de8b3644581e23d47157f6b1470aa5cd3aebb4ecc98982d9c5b64c8ae3495d09 |
jbossts-4.2.3-1.SP5_CP04.1jpp.ep1.2.el5.noarch.rpm | SHA-256: 7f54552c5d3aae2bc3ed4f01f8cf1b9b9a069057f700a5470821581b7c0cfe59 |
jbossweb-2.0.0-6.CP09.0jpp.ep1.1.el5.noarch.rpm | SHA-256: 19d1d258c8ca31b13efef2dccf702269b00fb5e5f55fc33bb3188e88d6e2980c |
jbossws-2.0.1-3.SP2_CP05.3.1.ep1.el5.noarch.rpm | SHA-256: b52eefd7c3f59e222bce5319ddd60c142dd4fd8434814e1eab97e0c87e1b7e89 |
jbossws-common-1.0.0-2.GA_CP03.1.ep1.el5.noarch.rpm | SHA-256: 97ea30a3ca0a17675620c7e0831a8b28376c77446ac4b0239a6052ab9c39dc22 |
jbossws-framework-2.0.1-1.GA_CP03.2.ep1.el5.noarch.rpm | SHA-256: ab9137764244e4b0e14d79773d386f51ccac3f0fbf16eb4b1db6764ccef3e5c3 |
jgroups-2.4.5-2.1.ep1.el5.noarch.rpm | SHA-256: 50d3b60dc8a2ff45673d1f6d7394478c23d053ad33598e9c036ea52b3f3bdb4c |
rh-eap-docs-4.3.0-4.GA_CP04.ep1.3.1.el5.noarch.rpm | SHA-256: 16965486e14f478dd62e3d7afa746aadf74c47a195f3be14b23e693004f5c804 |
rh-eap-docs-examples-4.3.0-4.GA_CP04.ep1.3.1.el5.noarch.rpm | SHA-256: d2471bb53b258a27a7dcbb24ed3fede5319ff28a00883ebec355f9dcb54485bf |
tanukiwrapper-3.2.1-2jpp.ep1.2.el5.i386.rpm | SHA-256: fabf4687ea6d9685240e34dfaf8e9f0dcabd10913fffff0b903f0ab0f14575ea |
ws-commons-policy-1.0-2jpp.ep1.7.el5.noarch.rpm | SHA-256: 4462d35dced5feebf80cb900f0e1b712f721346d3dabd6effcf369847335b085 |
ws-scout0-0.7-0.rc2.4.el5.noarch.rpm | SHA-256: 3e75c7f6c543751d499576c21e57a4d4090462c611a7de3c629b951f23b291c0 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.