- Issued:
- 2015-08-11
- Updated:
- 2015-08-11
RHEA-2015:1584 - Product Enhancement Advisory
Synopsis
Red Hat JBoss Web Server 2.1.0 enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for Red Hat JBoss Web Server 2.1.0 that adds one enhancement is now available for Red Hat Enterprise Linux 5, 6, and 7.
Description
Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.
Red Hat JBoss Web Server is now able to use Diffie-Hellman parameters of size up to 8192 bits, depending on the server key size. It is also possible to use custom generated DH parameters (specified in the SSLCertificateFile file), which can be used in addition to the hard-coded ones. (BZ#1238084)
All users of Red Hat JBoss Web Server 2.1.0 as provided from the Red Hat Customer Portal are advised to apply this update. The Red Hat JBoss Web Server process must be restarted for the update to take effect.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied, and back up your existing Red
Hat JBoss Web Server installation (including all applications and
configuration files).
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- JBoss Enterprise Web Server 2 for RHEL 7 x86_64
- JBoss Enterprise Web Server 2 for RHEL 6 x86_64
- JBoss Enterprise Web Server 2 for RHEL 6 i386
- JBoss Enterprise Web Server 2 for RHEL 5 x86_64
- JBoss Enterprise Web Server 2 for RHEL 5 i386
Fixes
(none)CVEs
(none)
References
JBoss Enterprise Web Server 2 for RHEL 7
SRPM | |
---|---|
httpd22-2.2.26-41.ep6.el7.src.rpm | SHA-256: f91a10ac68a3f30c276f4c4aa1a9d316f5a59eeec32d4622bfdb138c05b746cf |
x86_64 | |
httpd22-2.2.26-41.ep6.el7.x86_64.rpm | SHA-256: 7679d7ae55884d3fe0b71d34a5de06d823829650ec8ebc0663f5c4a94ac8aa57 |
httpd22-debuginfo-2.2.26-41.ep6.el7.x86_64.rpm | SHA-256: 828b6b717942153b4e95a068faf7cf6b4acfbe0e30df46dd5a1a2d803aaa21b3 |
httpd22-devel-2.2.26-41.ep6.el7.x86_64.rpm | SHA-256: 0bed6969101faa37215dc7a9adb50537e4875cdf6615d4d1dbfc895b7f5aecd5 |
httpd22-manual-2.2.26-41.ep6.el7.x86_64.rpm | SHA-256: a1f9b4ae08cb7cf13acbe9ba458d26d9980287364e20550ddeaf1965272b5e6c |
httpd22-tools-2.2.26-41.ep6.el7.x86_64.rpm | SHA-256: 07b7d5c7f6d3e9c0f9c55e3fa4a038ff52545672afc15cdecf2dda2175e360fd |
mod_ssl22-2.2.26-41.ep6.el7.x86_64.rpm | SHA-256: 353415231a5adc49682e243f9b2828988863d9be0b3dab5bad25fbe2d603b689 |
JBoss Enterprise Web Server 2 for RHEL 6
SRPM | |
---|---|
httpd-2.2.26-39.ep6.el6.src.rpm | SHA-256: 6b3955a2170e8e5ae563d37f6c61ddcf33bd891dbd4b62393857cea36e00c3be |
x86_64 | |
httpd-2.2.26-39.ep6.el6.x86_64.rpm | SHA-256: fea8c03541271eae0be5bdcc69ed79b6f93edfda874563ae7b887523d86e559e |
httpd-debuginfo-2.2.26-39.ep6.el6.x86_64.rpm | SHA-256: 3ee7efdb91439815b255dbd9961542b772a5d46f27d18efbbecdfb91e49d70eb |
httpd-devel-2.2.26-39.ep6.el6.x86_64.rpm | SHA-256: 4fb761e752e3490a1cf8ecf04e90a7720b76c67d8911c2046be130307ebc1629 |
httpd-manual-2.2.26-39.ep6.el6.x86_64.rpm | SHA-256: 273420c5a743418d2aa42234291b78755cdfab5108daab3c57dce318bff6c361 |
httpd-tools-2.2.26-39.ep6.el6.x86_64.rpm | SHA-256: 8f4b654d273f0047dbadb6b3fef4fd64d8bf6f1724a9338ceb18a7f3f0f5be4a |
mod_ssl-2.2.26-39.ep6.el6.x86_64.rpm | SHA-256: d9e023a8db373b6a9757c514a7509ad3d63a1dcd701213ef8da660f4c0975416 |
i386 | |
httpd-2.2.26-39.ep6.el6.i386.rpm | SHA-256: a6f8ebdafb00fff80daaefe209c5b877550eb46120333a8b3d7ce765e72e0704 |
httpd-debuginfo-2.2.26-39.ep6.el6.i386.rpm | SHA-256: 1a7d59dd6b39c046a98abd0a79e1dee0f9c0c1005acb00f87d5b52bb6c7da5e4 |
httpd-devel-2.2.26-39.ep6.el6.i386.rpm | SHA-256: 354c93c8279f3892e21bc3bb2f85cdd21b07941bd9c9f917e5d0fa93cbdedb5a |
httpd-manual-2.2.26-39.ep6.el6.i386.rpm | SHA-256: 0f4006692d1011851882efaf2cdee3f2560e9da3daa2c2a7ba23e76902de2897 |
httpd-tools-2.2.26-39.ep6.el6.i386.rpm | SHA-256: e6f51657112babd262e108db126a27d66ea0e816ccdf0231d7517f35e1841f70 |
mod_ssl-2.2.26-39.ep6.el6.i386.rpm | SHA-256: 083283652a046062876eb3dadbfef3fc20c6c5df0b6400016ef52850fe4bf911 |
JBoss Enterprise Web Server 2 for RHEL 5
SRPM | |
---|---|
httpd-2.2.26-39.ep6.el5.src.rpm | SHA-256: 5e5bb14c34af61a37a14e880ac64bf5faec8d4902c596c1813b11e1f1479ed15 |
x86_64 | |
httpd-2.2.26-39.ep6.el5.x86_64.rpm | SHA-256: 82b22435f9a3e5e212334f5ba4874ef26ba0d9fc17aeee1616f3c1bf5ac08b59 |
httpd-devel-2.2.26-39.ep6.el5.x86_64.rpm | SHA-256: 1b4c672d23e925ddb4c2775808226fcc91a2c072d1a56bea582d4f317ba74292 |
httpd-manual-2.2.26-39.ep6.el5.x86_64.rpm | SHA-256: 98fe64bec9cbd189ffd9e006a81daa5024424ec29323c1b7c5c13be6b587a08d |
httpd-tools-2.2.26-39.ep6.el5.x86_64.rpm | SHA-256: 7f56306567c00e5c3cfa853fc288ed9416ea63944808fd7ec0da53525284fd4b |
mod_ssl-2.2.26-39.ep6.el5.x86_64.rpm | SHA-256: 3d8e980e26bf71fd9d78743537004947c57bb0a8ba3b4670d857ec08e2e9b25d |
i386 | |
httpd-2.2.26-39.ep6.el5.i386.rpm | SHA-256: cf2ec172125a4c48ca31cb03628f1ecc54aa8db15588887f9b5d73a6a1ba1dc3 |
httpd-devel-2.2.26-39.ep6.el5.i386.rpm | SHA-256: 010f718bc35c4393fdb3ac5a552890c94db1c0e9b4c319e8fc683b890638dede |
httpd-manual-2.2.26-39.ep6.el5.i386.rpm | SHA-256: e349f8b0739684ae9c8ccfbdc704fa1fba8c744d9100abfdb8e113bfd442c784 |
httpd-tools-2.2.26-39.ep6.el5.i386.rpm | SHA-256: 411668520d8b817aed713f85feb8ce2e2721a7f3fea29eee39f733edb0c7f031 |
mod_ssl-2.2.26-39.ep6.el5.i386.rpm | SHA-256: 74743e14f9cbd69af2d394ad47edf1173af159f1cde521bc78dbb0e3651b4245 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.