Skip to navigation

Security Advisory Low: JBoss Enterprise Application Platform 5.1.0 security and bug fix update

Advisory: RHSA-2010:0960-1
Type: Security Advisory
Severity: Low
Issued on: 2010-12-08
Last updated on: 2010-12-08
Affected Products: JBoss Enterprise Application Platform 5 EL5
CVEs (cve.mitre.org): CVE-2010-3862

Details

Updated JBoss Enterprise Application Platform 5.1 packages that fix one
security issue and various bugs are now available for Red Hat Enterprise
Linux 5.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

JBoss Enterprise Application Platform is the market leading platform for
innovative and scalable Java applications; integrating the JBoss
Application Server, with JBoss Hibernate and JBoss Seam into a complete,
simple enterprise solution.

A flaw was found in the JBoss Remoting component. A remote attacker could
use specially-crafted input to cause the JBoss Remoting listeners to become
unresponsive, resulting in a denial of service condition for services
communicating via JBoss Remoting sockets. (CVE-2010-3862)

Red Hat would like to thank Ole Husgaard of eXerp.com for reporting this
issue.

These updated packages include multiple bug fixes. Documentation for these
bug fixes will be available shortly from the Release Notes, linked to in
the References section.

As well, this update adds a new jbossws-cxf package to JBoss Enterprise
Application Platform 5.1.0, to provide the sources for jbossws-cxf.
(BZ#645470)

Warning: Before applying this update, please backup the JBoss Enterprise
Application Platform "jboss-as/server/$PROFILE/deploy/" directory, along
with all other customized configuration files.

All users of JBoss Enterprise Application Platform 5.0 on Red Hat
Enterprise Linux 5 are advised to upgrade to these updated packages. The
JBoss server process must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

JBoss Enterprise Application Platform 5 EL5

SRPMS:
jboss-remoting-2.5.3-5.SP1.1.ep5.el5.src.rpm
File outdated by:  RHSA-2013:1369
    MD5: ab6b962f7f2ea4753e4b4455593171eb
SHA-256: 8fbf3a4c5fa6fc8fa2f479568e274d0d1ae30c92b36d278ad092a492589e0a92
jbossas-security-policy-cc-5.1.0-1.ep5.el5.src.rpm     MD5: 024cedb1ad40231cd0aeab156039073a
SHA-256: 0f45aff2eaa41915043f549832cf0734a3ec45f37d0e80ad82e4b72fd41aabed
jbossws-cxf-3.1.2-4.SP7.6.jdk6.ep5.el5.src.rpm     MD5: c1bfaccb15a65023c9ca9dc4f92c7b7c
SHA-256: ca42559a7d65a0257fedd342002faf58402425c1e6a06e0e59c3c0ee05d68562
jopr-embedded-1.3.4-16.SP1.7.ep5.el5.src.rpm
File outdated by:  RHSA-2013:0192
    MD5: 0dcae0ee28339e05cd31fbbceb63a792
SHA-256: 5470589fcf3bab0c3fd77eecc17008535103c8a45272f5971705bbddab2aa918
 
IA-32:
jboss-remoting-2.5.3-5.SP1.1.ep5.el5.noarch.rpm
File outdated by:  RHSA-2013:1369
    MD5: 929a88701c972ac9253a1bb7c6fafb79
SHA-256: 37a0fc33feacaa830cf3dc20bcab3c028fb714f84b92b2a73fb02f213ca19277
jbossas-security-policy-cc-5.1.0-1.ep5.el5.noarch.rpm     MD5: f221ed59e7b05e29d06ef0e98e20f9bf
SHA-256: 37087b71b1800bd6267a03868149925e13e7f2e8120b763e11fd96dc3d58c7d4
jbossws-cxf-3.1.2-4.SP7.6.jdk6.ep5.el5.noarch.rpm     MD5: 6de25aca1ad1b5ae77604506195db0eb
SHA-256: 28c7bfe1fea6a43e6708e75b1a81691c4b96d7865799b921c63947ec3225b17e
jopr-embedded-1.3.4-16.SP1.7.ep5.el5.noarch.rpm
File outdated by:  RHSA-2013:0192
    MD5: 37126c23fb82f4826da6a8dc6857dd59
SHA-256: 4476453cf630896269a53ad6a89e75880f1a89ffc7f2570f53a0d2f86479c431
 
x86_64:
jboss-remoting-2.5.3-5.SP1.1.ep5.el5.noarch.rpm
File outdated by:  RHSA-2013:1369
    MD5: 929a88701c972ac9253a1bb7c6fafb79
SHA-256: 37a0fc33feacaa830cf3dc20bcab3c028fb714f84b92b2a73fb02f213ca19277
jbossas-security-policy-cc-5.1.0-1.ep5.el5.noarch.rpm     MD5: f221ed59e7b05e29d06ef0e98e20f9bf
SHA-256: 37087b71b1800bd6267a03868149925e13e7f2e8120b763e11fd96dc3d58c7d4
jbossws-cxf-3.1.2-4.SP7.6.jdk6.ep5.el5.noarch.rpm     MD5: 6de25aca1ad1b5ae77604506195db0eb
SHA-256: 28c7bfe1fea6a43e6708e75b1a81691c4b96d7865799b921c63947ec3225b17e
jopr-embedded-1.3.4-16.SP1.7.ep5.el5.noarch.rpm
File outdated by:  RHSA-2013:0192
    MD5: 37126c23fb82f4826da6a8dc6857dd59
SHA-256: 4476453cf630896269a53ad6a89e75880f1a89ffc7f2570f53a0d2f86479c431
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

641389 - CVE-2010-3862 JBoss Remoting Denial-Of-Service
645470 - Tracker bug for the addition of jbossws-cxf to EAP 5.1.0 release for RHEL-5.


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/