- Issued:
- 2009-07-29
- Updated:
- 2009-07-29
RHBA-2009:1183 - Bug Fix Advisory
Synopsis
JBoss Enterprise Application Platform 4.3.0CP06 update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix
an important issue are now available for Red Hat Enterprise Linux 5 as
JBEAP 4.3.0.CP06.
Description
JBoss Enterprise Application Platform is the market leading platform for
innovative and scalable Java applications; integrating the JBoss
Application Server, with JBoss Hibernate and JBoss Seam into a complete,
simple enterprise solution.
This release of JBEAP for Red Hat Enterprise Linux 5 serves as a
replacement to JBEAP 4.3.0.CP05.
These updated packages include a bug fix which is
detailed in the release notes. The link to the release notes is available
below in the References section.
Warning: before applying this update, please backup the JBEAP
"server/[configuration]/deploy/" directory, and any other customized
configuration files.
All users of JBEAP 4.3 on Red Hat Enterprise Linux 5 are advised to upgrade
to these updated packages.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- JBoss Enterprise Application Platform 4.3.0 x86_64
- JBoss Enterprise Application Platform 4.3.0 i386
Fixes
- BZ - 511373 - Tracker bug for the EAP 4.3.0.cp06 release.
CVEs
(none)
JBoss Enterprise Application Platform 4.3.0
SRPM | |
---|---|
jboss-messaging-1.4.0-3.SP3_CP08.patch01.1.ep1.el5.src.rpm | SHA-256: 0e613d464085ddb2f855fe05ddbb8723f19a94b32041dcc3ffe3ff65bd7c9751 |
jbossas-4.3.0-5.GA_CP06.1.1.ep1.el5.src.rpm | SHA-256: dc621355867d8fe0cfef4e650c1c3dc219e58742b49c0612f6d34145d9473b5f |
rh-eap-docs-4.3.0-5.GA_CP06.ep1.2.1.el5.src.rpm | SHA-256: 29674862d2abd232a8dd58145564a26f91a52eed5b7da0af51e93840f7819b72 |
x86_64 | |
jboss-messaging-1.4.0-3.SP3_CP08.patch01.1.ep1.el5.noarch.rpm | SHA-256: e67114a30ad82577feb755369ba4533fe9965e64f2a17a800d85e03ce1d57558 |
jbossas-4.3.0-5.GA_CP06.1.1.ep1.el5.noarch.rpm | SHA-256: 9e3e399ee0653e68cf68b62db5e7956b65d3bbde43a37e0ea355d89d1da5eea0 |
jbossas-client-4.3.0-5.GA_CP06.1.1.ep1.el5.noarch.rpm | SHA-256: 3846ab99690fb5a7b9cc22a95d660631939ff0b68295132053672cc500d91a35 |
rh-eap-docs-4.3.0-5.GA_CP06.ep1.2.1.el5.noarch.rpm | SHA-256: d7429dc4e8203a566f151d29bf89a138981b081028ef7b58b1ab1384729ee320 |
rh-eap-docs-examples-4.3.0-5.GA_CP06.ep1.2.1.el5.noarch.rpm | SHA-256: c4ed58f2a364cb82fdc939b1f7be881ed5a6c8e1ec93d0663ef8df66374282ab |
i386 | |
jboss-messaging-1.4.0-3.SP3_CP08.patch01.1.ep1.el5.noarch.rpm | SHA-256: e67114a30ad82577feb755369ba4533fe9965e64f2a17a800d85e03ce1d57558 |
jbossas-4.3.0-5.GA_CP06.1.1.ep1.el5.noarch.rpm | SHA-256: 9e3e399ee0653e68cf68b62db5e7956b65d3bbde43a37e0ea355d89d1da5eea0 |
jbossas-client-4.3.0-5.GA_CP06.1.1.ep1.el5.noarch.rpm | SHA-256: 3846ab99690fb5a7b9cc22a95d660631939ff0b68295132053672cc500d91a35 |
rh-eap-docs-4.3.0-5.GA_CP06.ep1.2.1.el5.noarch.rpm | SHA-256: d7429dc4e8203a566f151d29bf89a138981b081028ef7b58b1ab1384729ee320 |
rh-eap-docs-examples-4.3.0-5.GA_CP06.ep1.2.1.el5.noarch.rpm | SHA-256: c4ed58f2a364cb82fdc939b1f7be881ed5a6c8e1ec93d0663ef8df66374282ab |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.