Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:0035 - Security Advisory
Issued:
2012-01-18
Updated:
2012-01-18

RHSA-2012:0035 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: mod_cluster-native security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated mod_cluster packages that fix one security issue are now available
for JBoss Enterprise Web Server 1.0.2 for Red Hat Enterprise Linux 4, 5,
and 6.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

mod_cluster-native provides a native build of mod_cluster for the Apache
HTTP Server (httpd). mod_cluster is an httpd-based load balancer. Like
mod_jk, it uses a communication channel to forward requests from httpd to
an application server node.

It was found that mod_cluster allowed worker nodes to register on any
virtual host (vhost), regardless of the security constraints applied to
other vhosts. In a typical environment, there will be one vhost configured
internally for worker nodes, and another configured externally for serving
content. A remote attacker could use this flaw to register an
attacker-controlled worker node via an external vhost that is not
configured to apply security constraints, then use that worker node to
serve malicious content, intercept credentials, and hijack user sessions.
(CVE-2011-4608)

This update also upgrades mod_cluster to version 1.0.10.GA_CP02.

Users of mod_cluster should upgrade to these updated packages, which
resolve this issue. After installing the updated packages, Red Hat
Enterprise Linux 4 users must restart the httpd22 service, and Red Hat
Enterprise Linux 5 and 6 users must restart the httpd service, for the
update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • JBoss Enterprise Web Server 1 for RHEL 6 x86_64
  • JBoss Enterprise Web Server 1 for RHEL 6 i386
  • JBoss Enterprise Web Server 1 for RHEL 5 x86_64
  • JBoss Enterprise Web Server 1 for RHEL 5 i386

Fixes

  • BZ - 767020 - CVE-2011-4608 mod_cluster: malicious worker nodes can register on any vhost

CVEs

  • CVE-2011-4608

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

JBoss Enterprise Web Server 1 for RHEL 6

SRPM
mod_cluster-1.0.10-3.2.GA_CP02.ep5.el6.src.rpm SHA-256: 4f999cc7976563be1fcdc099666b40d0477cfd4a27ee473804f6eefbc83cc5e4
mod_cluster-native-1.0.10-4.1.1.GA_CP02.ep5.el6.src.rpm SHA-256: a29f819ba5548aeb571b479db2536dec70eb43dabdaba44e32ddd5f7c5ce84ed
x86_64
mod_cluster-demo-1.0.10-3.2.GA_CP02.ep5.el6.noarch.rpm SHA-256: 881912d50cd2ecbf8a546df30cb01309915693d54697fea77d0ca9f6abc317da
mod_cluster-jbossas-1.0.10-3.2.GA_CP02.ep5.el6.noarch.rpm SHA-256: 9b676cc70d0fda1e0102b3e23e6ed075ff809ceece0b45ba1ddd3d29891bf160
mod_cluster-jbossweb2-1.0.10-3.2.GA_CP02.ep5.el6.noarch.rpm SHA-256: d4790dd70350f3e818d615b1cf57e8ea5553aafa73673c206f625545e738273b
mod_cluster-native-1.0.10-4.1.1.GA_CP02.ep5.el6.x86_64.rpm SHA-256: c02ea6d1425df0788009bf0eb059bb0b76914da45c27ca3a3f795806fcc06240
mod_cluster-tomcat6-1.0.10-3.2.GA_CP02.ep5.el6.noarch.rpm SHA-256: 350a1ba0f92391aefaec9f8b7f5d6641c39b80fffeaeabda06c3787c92eee14b
i386
mod_cluster-demo-1.0.10-3.2.GA_CP02.ep5.el6.noarch.rpm SHA-256: 881912d50cd2ecbf8a546df30cb01309915693d54697fea77d0ca9f6abc317da
mod_cluster-jbossas-1.0.10-3.2.GA_CP02.ep5.el6.noarch.rpm SHA-256: 9b676cc70d0fda1e0102b3e23e6ed075ff809ceece0b45ba1ddd3d29891bf160
mod_cluster-jbossweb2-1.0.10-3.2.GA_CP02.ep5.el6.noarch.rpm SHA-256: d4790dd70350f3e818d615b1cf57e8ea5553aafa73673c206f625545e738273b
mod_cluster-native-1.0.10-4.1.1.GA_CP02.ep5.el6.i386.rpm SHA-256: 193aa152112b252ec2f9d51e1257ba48a022c5f7e2f294c0967e8bc631934cd0
mod_cluster-tomcat6-1.0.10-3.2.GA_CP02.ep5.el6.noarch.rpm SHA-256: 350a1ba0f92391aefaec9f8b7f5d6641c39b80fffeaeabda06c3787c92eee14b

JBoss Enterprise Web Server 1 for RHEL 5

SRPM
mod_cluster-1.0.10-3.1.GA_CP02.ep5.el5.src.rpm SHA-256: 0a14cd25d373547655ef1b34fc0ef48e6b04941087919a122b15a69178a7bc5a
mod_cluster-native-1.0.10-4.1.GA_CP02.ep5.el5.src.rpm SHA-256: d458c037f6b2025aa5f95553f1fab702de356493ebf2e910197edf5bdd2eb7c7
x86_64
mod_cluster-demo-1.0.10-3.1.GA_CP02.ep5.el5.noarch.rpm SHA-256: 0d94d914c5441481c44da28f68fcceae83a376cdaa3cd74ea9d8ef5da39da490
mod_cluster-jbossas-1.0.10-3.1.GA_CP02.ep5.el5.noarch.rpm SHA-256: 72358ff7541f035bed4e5f600d3567a97b360579518d2d9522ff9c684ae84f45
mod_cluster-jbossweb2-1.0.10-3.1.GA_CP02.ep5.el5.noarch.rpm SHA-256: 86e8bdcb17a15fb4cba726709f27a5fae91aa7b89368a1c4bfb5e4c499901318
mod_cluster-native-1.0.10-4.1.GA_CP02.ep5.el5.x86_64.rpm SHA-256: 0398b06bb8833ba9a6e706f6db46076af732deca3b3a55dcabc6419c79cd95d5
mod_cluster-tomcat6-1.0.10-3.1.GA_CP02.ep5.el5.noarch.rpm SHA-256: 068599c45827ef97879b49027c74d23b24b724bbde5b8fb953a428d0a96cbf8f
i386
mod_cluster-demo-1.0.10-3.1.GA_CP02.ep5.el5.noarch.rpm SHA-256: 0d94d914c5441481c44da28f68fcceae83a376cdaa3cd74ea9d8ef5da39da490
mod_cluster-jbossas-1.0.10-3.1.GA_CP02.ep5.el5.noarch.rpm SHA-256: 72358ff7541f035bed4e5f600d3567a97b360579518d2d9522ff9c684ae84f45
mod_cluster-jbossweb2-1.0.10-3.1.GA_CP02.ep5.el5.noarch.rpm SHA-256: 86e8bdcb17a15fb4cba726709f27a5fae91aa7b89368a1c4bfb5e4c499901318
mod_cluster-native-1.0.10-4.1.GA_CP02.ep5.el5.i386.rpm SHA-256: 66277573c36980270ae291c655d9459f31ec047b381c8348f7d6392ce6b5d008
mod_cluster-tomcat6-1.0.10-3.1.GA_CP02.ep5.el5.noarch.rpm SHA-256: 068599c45827ef97879b49027c74d23b24b724bbde5b8fb953a428d0a96cbf8f

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility