Security Advisory Important: Red Hat JBoss Enterprise Application Platform 6.2.2 security update

Advisory: RHSA-2014:0453-1
Type: Security Advisory
Severity: Important
Issued on: 2014-04-30
Last updated on: 2014-04-30
Affected Products: JBoss Enterprise Application Platform 6 EL5
JBoss Enterprise Application Platform 6 EL6
JBoss Enterprise Application Platform 6.2 EL5
JBoss Enterprise Application Platform 6.2 EL6
CVEs (cve.mitre.org): CVE-2014-0107

Details

Updated Red Hat JBoss Enterprise Application Platform 6.2.2 packages that
fix one security issue are now available for Red Hat Enterprise Linux 5
and 6.

The Red Hat Security Response Team has rated this update as having
Important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
applications based on JBoss Application Server 7.

It was found that the secure processing feature of Xalan-Java had
insufficient restrictions defined for certain properties and features.
A remote attacker able to provide Extensible Stylesheet Language
Transformations (XSLT) content to be processed by an application using
Xalan-Java could use this flaw to bypass the intended constraints of the
secure processing feature. Depending on the components available in the
classpath, this could lead to arbitrary remote code execution in the
context of the application server running the application that uses
Xalan-Java. (CVE-2014-0107)

All users of Red Hat JBoss Enterprise Application Platform 6.2.2 on Red Hat
Enterprise Linux 5 and 6 are advised to upgrade to these updated packages.
The JBoss server process must be restarted for the update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied. Also, back up any customized Red
Hat JBoss Enterprise Application Platform 6 configuration files. On update,
the configuration files that have been locally modified will not be
updated. The updated version of such files will be stored as the rpmnew
files. Make sure to locate any such files after the update and merge any
changes manually.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

JBoss Enterprise Application Platform 6 EL5

SRPMS:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el5.src.rpm
File outdated by:  RHBA-2015:1236
    MD5: e3749fc71bd32fcc0e1d6caf5ad6be85
SHA-256: 2e6916a1fd688edb24c9ef1c4dbb62503c84c698ef6e19e5171013db25abcfdb
 
IA-32:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el5.noarch.rpm
File outdated by:  RHBA-2015:1236
    MD5: 1769a6e32193947dc81f38e06b0f8726
SHA-256: e67bbf5243eb9bab88e780d56d5c72540d6858136f3c2241cd026a5c12e683c5
 
x86_64:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el5.noarch.rpm
File outdated by:  RHBA-2015:1236
    MD5: 1769a6e32193947dc81f38e06b0f8726
SHA-256: e67bbf5243eb9bab88e780d56d5c72540d6858136f3c2241cd026a5c12e683c5
 
JBoss Enterprise Application Platform 6 EL6

SRPMS:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el6.src.rpm
File outdated by:  RHBA-2015:1237
    MD5: 543b1fb669f54949001f72efc8f43fe7
SHA-256: 693b20419013ce5a6c8fc56afb8f0f204cd299d2b1667ba7a5180e5ab26950c0
 
IA-32:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el6.noarch.rpm
File outdated by:  RHBA-2015:1237
    MD5: e99a695021af70e045fc12808d7db316
SHA-256: e28b7d617d934b2f6afbe3890f562f449371d47b1ada4ad99ef96d837e618f08
 
x86_64:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el6.noarch.rpm
File outdated by:  RHBA-2015:1237
    MD5: e99a695021af70e045fc12808d7db316
SHA-256: e28b7d617d934b2f6afbe3890f562f449371d47b1ada4ad99ef96d837e618f08
 
JBoss Enterprise Application Platform 6.2 EL5

SRPMS:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el5.src.rpm
File outdated by:  RHBA-2015:1236
    MD5: e3749fc71bd32fcc0e1d6caf5ad6be85
SHA-256: 2e6916a1fd688edb24c9ef1c4dbb62503c84c698ef6e19e5171013db25abcfdb
 
IA-32:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el5.noarch.rpm     MD5: 1769a6e32193947dc81f38e06b0f8726
SHA-256: e67bbf5243eb9bab88e780d56d5c72540d6858136f3c2241cd026a5c12e683c5
 
x86_64:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el5.noarch.rpm     MD5: 1769a6e32193947dc81f38e06b0f8726
SHA-256: e67bbf5243eb9bab88e780d56d5c72540d6858136f3c2241cd026a5c12e683c5
 
JBoss Enterprise Application Platform 6.2 EL6

SRPMS:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el6.src.rpm
File outdated by:  RHBA-2015:1237
    MD5: 543b1fb669f54949001f72efc8f43fe7
SHA-256: 693b20419013ce5a6c8fc56afb8f0f204cd299d2b1667ba7a5180e5ab26950c0
 
IA-32:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el6.noarch.rpm     MD5: e99a695021af70e045fc12808d7db316
SHA-256: e28b7d617d934b2f6afbe3890f562f449371d47b1ada4ad99ef96d837e618f08
 
x86_64:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el6.noarch.rpm     MD5: e99a695021af70e045fc12808d7db316
SHA-256: e28b7d617d934b2f6afbe3890f562f449371d47b1ada4ad99ef96d837e618f08
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1080248 - CVE-2014-0107 Xalan-Java: insufficient constraints in secure processing feature


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/