-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2011.1224
              Low: JBoss Enterprise Web Platform 5.1.2 update
                              9 December 2011

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           JBoss Enterprise Web & Application Platform 5.1.2
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 5
                   Red Hat Enterprise Linux AS/ES/WS 4
                   Red Hat Enterprise Linux Server 6
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Unauthorised Access -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2011-4314 CVE-2011-4085 

Reference:         ESB-2011.1158

Original Bulletin: 
   https://rhn.redhat.com/errata/RHSA-2011-1806.html
   https://rhn.redhat.com/errata/RHSA-2011-1800.html
   https://rhn.redhat.com/errata/RHSA-2011-1805.html
   https://rhn.redhat.com/errata/RHSA-2011-1804.html
   https://rhn.redhat.com/errata/RHSA-2011-1802.html
   https://rhn.redhat.com/errata/RHSA-2011-1798.html
   https://rhn.redhat.com/errata/RHSA-2011-1799.html
   https://rhn.redhat.com/errata/RHSA-2011-1803.html

Comment: This bulletin contains eight (8) Red Hat security advisories.
         
         This advisory references vulnerabilities in products which run on 
         platforms other than Red Hat. It is recommended that administrators
         running Boss Enterprise Web Platform 5.1.2 check for an updated 
         version of the software for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: JBoss Enterprise Web Platform 5.1.2 update
Advisory ID:       RHSA-2011:1806-01
Product:           JBoss Enterprise Web Platform
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2011-1806.html
Issue date:        2011-12-08
CVE Names:         CVE-2011-4314 
=====================================================================

1. Summary:

JBoss Enterprise Web Platform 5.1.2, which fixes one security issue,
various bugs, and adds several enhancements is now available from the Red
Hat Customer Portal.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Description:

The Enterprise Web Platform is a slimmed down profile of the JBoss
Enterprise Application Platform intended for mid-size workloads with light
and rich Java applications. OpenID4Java allows you to implement OpenID
authentication in your Java applications. OpenID4Java is a Technology
Preview.

This JBoss Enterprise Web Platform 5.1.2 release serves as a replacement
for JBoss Enterprise Web Platform 5.1.1.

This update includes bug fixes and enhancements. JBoss Enterprise Web
Platform is a subset of JBoss Enterprise Application Platform. Users are
directed to the JBoss Enterprise Application Platform 5.1.2 Release Notes
for information on the most significant of these changes. The Release Notes
will be available shortly from
https://docs.redhat.com/docs/en-US/index.html

The following security issue is also fixed with this release:

It was found that the Attribute Exchange (AX) extension of OpenID4Java was
not checking to ensure attributes were signed. If AX was being used to
receive information that an application only trusts the identity provider
to assert, a remote attacker could use this flaw to conduct
man-in-the-middle attacks and compromise the integrity of the information
via a specially-crafted request. By default, only the JBoss Seam openid
example application uses OpenID4Java. (CVE-2011-4314)

Warning: Before applying this update, back up the
"jboss-as-web/server/[PROFILE]/deploy/" directory and any other customized
configuration files of your JBoss Enterprise Web Platform.

All users of JBoss Enterprise Web Platform 5.1.1 as provided from the Red
Hat Customer Portal are advised to upgrade to JBoss Enterprise Web Platform
5.1.2.

3. Solution:

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (http://bugzilla.redhat.com/):

754386 - CVE-2011-4314 openid4java (AX extension): MITM due to improper validation of AX attribute signatures

5. References:

https://www.redhat.com/security/data/cve/CVE-2011-4314.html
https://access.redhat.com/security/updates/classification/#low
https://docs.redhat.com/docs/en-US/index.html
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=enterpriseweb.platform&downloadType=distributions
https://access.redhat.com/support/offerings/techpreview/

6. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFO4SxrXlSAg2UNWIIRAguOAKCTeSI5xAXjhdaob8iSp98RJx5vLACfbe4h
k69DkoEwNnOoMGVnmpwUUO0=
=aLKt
- -----END PGP SIGNATURE-----

- ----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: JBoss Enterprise Web Platform 5.1.2 update
Advisory ID:       RHSA-2011:1803-01
Product:           JBoss Enterprise Web Platform
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2011-1803.html
Issue date:        2011-12-08
CVE Names:         CVE-2011-4314 
=====================================================================

1. Summary:

Updated JBoss Enterprise Web Platform 5.1.2 packages that fix one security
issue, various bugs, and add several enhancements are now available for Red
Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

JBoss Enterprise Web Platform 5 for RHEL 5 Server - i386, noarch, x86_64

3. Description:

The Enterprise Web Platform is a slimmed down profile of the JBoss
Enterprise Application Platform intended for mid-size workloads with light
and rich Java applications. OpenID4Java allows you to implement OpenID
authentication in your Java applications. OpenID4Java is a Technology
Preview.

This JBoss Enterprise Web Platform 5.1.2 release for Red Hat Enterprise
Linux 5 serves as a replacement for JBoss Enterprise Web Platform 5.1.1.

These updated packages include bug fixes and enhancements. JBoss Enterprise
Web Platform is a subset of JBoss Enterprise Application Platform. Users
are directed to the JBoss Enterprise Application Platform 5.1.2 Release
Notes for information on the most significant of these changes. The Release
Notes will be available shortly from
https://docs.redhat.com/docs/en-US/index.html

The following security issue is also fixed with this release:

It was found that the Attribute Exchange (AX) extension of OpenID4Java was
not checking to ensure attributes were signed. If AX was being used to
receive information that an application only trusts the identity provider
to assert, a remote attacker could use this flaw to conduct
man-in-the-middle attacks and compromise the integrity of the information
via a specially-crafted request. By default, only the JBoss Seam openid
example application uses OpenID4Java. (CVE-2011-4314)

Warning: Before applying this update, back up the
"jboss-as-web/server/[PROFILE]/deploy/" directory and any other customized
configuration files of your JBoss Enterprise Web Platform.

All users of JBoss Enterprise Web Platform 5.1.1 on Red Hat Enterprise
Linux 5 are advised to upgrade to these updated packages. The JBoss server
process must be restarted for the update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

733746 - EWP: Tracker bug for the EWP 5.1.2 release for RHEL-5.
754386 - CVE-2011-4314 openid4java (AX extension): MITM due to improper validation of AX attribute signatures

6. Package List:

JBoss Enterprise Web Platform 5 for RHEL 5 Server:

Source:
apache-cxf-2.2.12-4.patch_02.1.1.ep5.el5.src.rpm
cglib-2.2-5.3.ep5.el5.src.rpm
facelets-1.1.15-3.B1_patch_01.2.ep5.el5.src.rpm
glassfish-jaxb-2.1.12-10_patch_02.ep5.el5.src.rpm
glassfish-jsf-1.2_13-5_patch_01.3.ep5.el5.src.rpm
jacorb-jboss-2.3.1-10.patch_03.4.ep5.el5.src.rpm
jakarta-commons-logging-jboss-1.1-10.3_patch_02.1.ep5.el5.src.rpm
jboss-aop2-2.1.6-2.CP03.1.1.ep5.el5.src.rpm
jboss-cache-core-3.2.8-1.ep5.el5.src.rpm
jboss-cl-2.0.10-1.2.ep5.el5.src.rpm
jboss-cluster-ha-client-1.1.4-1.1.ep5.el5.src.rpm
jboss-common-core-2.2.18-1.1.ep5.el5.src.rpm
jboss-eap5-native-5.1.2-1.4.ep5.el5.src.rpm
jboss-ejb3-core-1.3.8-0.1.ep5.el5.src.rpm
jboss-ejb3-proxy-clustered-1.0.3-2.SP1.1.ep5.el5.src.rpm
jboss-ejb3-proxy-impl-1.0.6-2.SP2.1.ep5.el5.src.rpm
jboss-el-1.0_02-0.CR6.2.ep5.el5.src.rpm
jboss-naming-5.0.3-3.CP01.3.1.ep5.el5.src.rpm
jboss-remoting-2.5.4-9.SP3.1.ep5.el5.src.rpm
jboss-seam2-2.2.5.EAP5-5.ep5.el5.src.rpm
jboss-security-spi-2.0.4-6.SP8.1.ep5.el5.src.rpm
jbossas-web-5.1.2-7.ep5.el5.src.rpm
jbossas-web-tp-licenses-5.1.2-8.ep5.el5.src.rpm
jbossas-ws-cxf-ewp-5.1.2-6.ep5.el5.src.rpm
jbosssx2-2.0.4-6.SP8.2.ep5.el5.src.rpm
jbossts-4.6.1-11.CP12.4.ep5.el5.src.rpm
jbossweb-2.1.12-1.4_patch_01.ep5.el5.src.rpm
jbossws-3.1.2-7.SP11.4.ep5.el5.src.rpm
jbossws-common-1.1.0-6.SP8_patch_01.1.ep5.el5.src.rpm
jbossws-framework-3.1.2-6.SP10.2.ep5.el5.src.rpm
jbossws-spi-1.1.2-5.SP7.1.ep5.el5.src.rpm
jgroups-2.6.20-1.1.ep5.el5.src.rpm
jopr-embedded-1.3.4-18.SP5.8.ep5.el5.src.rpm
jopr-hibernate-plugin-3.0.0-13.EmbJopr4.ep5.el5.src.rpm
jopr-jboss-as-5-plugin-3.0.0-12.EmbJopr4.ep5.el5.src.rpm
jopr-jboss-cache-v3-plugin-3.0.0-14.EmbJopr4.ep5.el5.src.rpm
mod_cluster-1.0.10-3.1.GA_CP02.ep5.el5.src.rpm
mod_cluster-native-1.0.10-3.1.GA_CP02.ep5.el5.src.rpm
org-mc4j-ems-1.2.15.1-4.ep5.el5.src.rpm
picketlink-federation-2.0.2-1.1.ep5.el5.src.rpm
resteasy-1.2.1-9.CP02.4.ep5.el5.src.rpm
rh-ewp-docs-5.1.2-4.ep5.el5.src.rpm
rhq-3.0.0-20.EmbJopr4.ep5.el5.src.rpm
rhq-jmx-plugin-3.0.0-20.EmbJopr4.ep5.el5.src.rpm
rhq-platform-plugin-3.0.0-13.EmbJopr4.ep5.el5.src.rpm
slf4j-1.5.8-10_patch_01.2.ep5.el5.src.rpm
xalan-j2-2.7.1-6_patch_05.1.ep5.el5.src.rpm

i386:
jboss-eap5-native-5.1.2-1.4.ep5.el5.i386.rpm
mod_cluster-native-1.0.10-3.1.GA_CP02.ep5.el5.i386.rpm
mod_cluster-native-debuginfo-1.0.10-3.1.GA_CP02.ep5.el5.i386.rpm

noarch:
apache-cxf-2.2.12-4.patch_02.1.1.ep5.el5.noarch.rpm
cglib-2.2-5.3.ep5.el5.noarch.rpm
facelets-1.1.15-3.B1_patch_01.2.ep5.el5.noarch.rpm
glassfish-jaxb-2.1.12-10_patch_02.ep5.el5.noarch.rpm
glassfish-jsf-1.2_13-5_patch_01.3.ep5.el5.noarch.rpm
jacorb-jboss-2.3.1-10.patch_03.4.ep5.el5.noarch.rpm
jakarta-commons-logging-jboss-1.1-10.3_patch_02.1.ep5.el5.noarch.rpm
jboss-aop2-2.1.6-2.CP03.1.1.ep5.el5.noarch.rpm
jboss-cache-core-3.2.8-1.ep5.el5.noarch.rpm
jboss-cl-2.0.10-1.2.ep5.el5.noarch.rpm
jboss-cluster-ha-client-1.1.4-1.1.ep5.el5.noarch.rpm
jboss-common-core-2.2.18-1.1.ep5.el5.noarch.rpm
jboss-ejb3-core-1.3.8-0.1.ep5.el5.noarch.rpm
jboss-ejb3-proxy-clustered-1.0.3-2.SP1.1.ep5.el5.noarch.rpm
jboss-ejb3-proxy-impl-1.0.6-2.SP2.1.ep5.el5.noarch.rpm
jboss-el-1.0_02-0.CR6.2.ep5.el5.noarch.rpm
jboss-naming-5.0.3-3.CP01.3.1.ep5.el5.noarch.rpm
jboss-remoting-2.5.4-9.SP3.1.ep5.el5.noarch.rpm
jboss-seam2-2.2.5.EAP5-5.ep5.el5.noarch.rpm
jboss-seam2-docs-2.2.5.EAP5-5.ep5.el5.noarch.rpm
jboss-seam2-examples-2.2.5.EAP5-5.ep5.el5.noarch.rpm
jboss-seam2-runtime-2.2.5.EAP5-5.ep5.el5.noarch.rpm
jboss-security-spi-2.0.4-6.SP8.1.ep5.el5.noarch.rpm
jbossas-web-5.1.2-7.ep5.el5.noarch.rpm
jbossas-web-client-5.1.2-7.ep5.el5.noarch.rpm
jbossas-web-tp-licenses-5.1.2-8.ep5.el5.noarch.rpm
jbossas-web-ws-native-5.1.2-7.ep5.el5.noarch.rpm
jbossas-ws-cxf-ewp-5.1.2-6.ep5.el5.noarch.rpm
jbosssx2-2.0.4-6.SP8.2.ep5.el5.noarch.rpm
jbossts-4.6.1-11.CP12.4.ep5.el5.noarch.rpm
jbossts-javadoc-4.6.1-11.CP12.4.ep5.el5.noarch.rpm
jbossweb-2.1.12-1.4_patch_01.ep5.el5.noarch.rpm
jbossweb-el-1.0-api-2.1.12-1.4_patch_01.ep5.el5.noarch.rpm
jbossweb-jsp-2.1-api-2.1.12-1.4_patch_01.ep5.el5.noarch.rpm
jbossweb-lib-2.1.12-1.4_patch_01.ep5.el5.noarch.rpm
jbossweb-servlet-2.5-api-2.1.12-1.4_patch_01.ep5.el5.noarch.rpm
jbossws-3.1.2-7.SP11.4.ep5.el5.noarch.rpm
jbossws-common-1.1.0-6.SP8_patch_01.1.ep5.el5.noarch.rpm
jbossws-framework-3.1.2-6.SP10.2.ep5.el5.noarch.rpm
jbossws-spi-1.1.2-5.SP7.1.ep5.el5.noarch.rpm
jgroups-2.6.20-1.1.ep5.el5.noarch.rpm
jopr-embedded-1.3.4-18.SP5.8.ep5.el5.noarch.rpm
jopr-hibernate-plugin-3.0.0-13.EmbJopr4.ep5.el5.noarch.rpm
jopr-jboss-as-5-plugin-3.0.0-12.EmbJopr4.ep5.el5.noarch.rpm
jopr-jboss-cache-v3-plugin-3.0.0-14.EmbJopr4.ep5.el5.noarch.rpm
mod_cluster-demo-1.0.10-3.1.GA_CP02.ep5.el5.noarch.rpm
mod_cluster-jbossas-1.0.10-3.1.GA_CP02.ep5.el5.noarch.rpm
mod_cluster-jbossweb2-1.0.10-3.1.GA_CP02.ep5.el5.noarch.rpm
mod_cluster-tomcat6-1.0.10-3.1.GA_CP02.ep5.el5.noarch.rpm
org-mc4j-ems-1.2.15.1-4.ep5.el5.noarch.rpm
picketlink-federation-2.0.2-1.1.ep5.el5.noarch.rpm
picketlink-federation-webapp-idp-2.0.2-1.1.ep5.el5.noarch.rpm
picketlink-federation-webapp-pdp-2.0.2-1.1.ep5.el5.noarch.rpm
picketlink-federation-webapp-sts-2.0.2-1.1.ep5.el5.noarch.rpm
resteasy-1.2.1-9.CP02.4.ep5.el5.noarch.rpm
resteasy-examples-1.2.1-9.CP02.4.ep5.el5.noarch.rpm
resteasy-javadoc-1.2.1-9.CP02.4.ep5.el5.noarch.rpm
resteasy-manual-1.2.1-9.CP02.4.ep5.el5.noarch.rpm
rh-ewp-docs-5.1.2-4.ep5.el5.noarch.rpm
rh-ewp-docs-examples-5.1.2-4.ep5.el5.noarch.rpm
rhq-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-common-parent-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-client-api-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-comm-api-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-domain-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-gui-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-native-system-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-parent-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-plugin-api-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-plugin-container-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-util-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-jboss-as-common-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-jmx-plugin-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-modules-parent-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-parent-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-platform-plugin-3.0.0-13.EmbJopr4.ep5.el5.noarch.rpm
rhq-plugins-parent-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
slf4j-1.5.8-10_patch_01.2.ep5.el5.noarch.rpm
xalan-j2-2.7.1-6_patch_05.1.ep5.el5.noarch.rpm

x86_64:
jboss-eap5-native-5.1.2-1.4.ep5.el5.x86_64.rpm
mod_cluster-native-1.0.10-3.1.GA_CP02.ep5.el5.x86_64.rpm
mod_cluster-native-debuginfo-1.0.10-3.1.GA_CP02.ep5.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2011-4314.html
https://access.redhat.com/security/updates/classification/#low
https://docs.redhat.com/docs/en-US/index.html
https://access.redhat.com/support/offerings/techpreview/

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFO4SwgXlSAg2UNWIIRAtloAKCmy7UaJ0OstjI8dZOnr9buBjBBmgCcDmVh
V5jLhwbRCbYSnXQ2gOA8w4E=
=jTLl
- -----END PGP SIGNATURE-----


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: JBoss Enterprise Application Platform 5.1.2 update
Advisory ID:       RHSA-2011:1799-01
Product:           JBoss Enterprise Application Platform
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2011-1799.html
Issue date:        2011-12-08
CVE Names:         CVE-2011-4085 CVE-2011-4314 
=====================================================================

1. Summary:

Updated JBoss Enterprise Application Platform 5.1.2 packages that fix two
security issues, various bugs, and add several enhancements are now
available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having low
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

JBoss Enterprise Application Platform 5 for RHEL 5 Server - i386, noarch, x86_64

3. Description:

JBoss Enterprise Application Platform is a platform for Java applications,
which integrates the JBoss Application Server with JBoss Hibernate and
JBoss Seam. OpenID4Java allows you to implement OpenID authentication in
your Java applications. OpenID4Java is a Technology Preview.

This JBoss Enterprise Application Platform 5.1.2 release for Red Hat
Enterprise Linux 5 serves as a replacement for JBoss Enterprise Application
Platform 5.1.1.

These updated packages include bug fixes and enhancements. Refer to
the JBoss Enterprise Application Platform 5.1.2 Release Notes for
information on the most significant of these changes. The Release Notes
will be available shortly from
https://docs.redhat.com/docs/en-US/index.html

The following security issues are also fixed with this release:

It was found that the invoker servlets, deployed by default via
httpha-invoker, only performed access control on the HTTP GET and POST
methods, allowing remote attackers to make unauthenticated requests by
using different HTTP methods. Due to the second layer of authentication
provided by a security interceptor, this issue is not exploitable on
default installations unless an administrator has misconfigured the
security interceptor or disabled it. (CVE-2011-4085)

It was found that the Attribute Exchange (AX) extension of OpenID4Java was
not checking to ensure attributes were signed. If AX was being used to
receive information that an application only trusts the identity provider
to assert, a remote attacker could use this flaw to conduct
man-in-the-middle attacks and compromise the integrity of the information
via a specially-crafted request. By default, only the JBoss Seam openid
example application uses OpenID4Java. (CVE-2011-4314)

Warning: Before applying this update, back up the
"jboss-as/server/[PROFILE]/deploy/" directory and any other customized
configuration files of your JBoss Enterprise Application Platform.

All users of JBoss Enterprise Application Platform 5.1.1 on Red Hat
Enterprise Linux 5 are advised to upgrade to these updated packages. The
JBoss server process must be restarted for the update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

733731 - Tracker bug for the EAP 5.1.2 release for RHEL-5.
750422 - CVE-2011-4085 Invoker servlets authentication bypass (HTTP verb tampering)
754386 - CVE-2011-4314 openid4java (AX extension): MITM due to improper validation of AX attribute signatures

6. Package List:

JBoss Enterprise Application Platform 5 for RHEL 5 Server:

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/apache-cxf-2.2.12-4.patch_02.1.1.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/cglib-2.2-5.3.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/facelets-1.1.15-3.B1_patch_01.2.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/glassfish-jaxb-2.1.12-10_patch_02.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/glassfish-jsf-1.2_13-5_patch_01.3.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jacorb-jboss-2.3.1-10.patch_03.4.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jakarta-commons-logging-jboss-1.1-10.3_patch_02.1.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-aop2-2.1.6-2.CP03.1.1.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-cache-core-3.2.8-1.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-cl-2.0.10-1.2.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-cluster-ha-client-1.1.4-1.1.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-common-core-2.2.18-1.1.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-eap5-native-5.1.2-1.4.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-ejb3-core-1.3.8-0.1.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-ejb3-proxy-clustered-1.0.3-2.SP1.1.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-ejb3-proxy-impl-1.0.6-2.SP2.1.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-el-1.0_02-0.CR6.2.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-messaging-1.4.8-9.SP5.1.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-naming-5.0.3-3.CP01.3.1.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-remoting-2.5.4-9.SP3.1.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-seam2-2.2.5.EAP5-5.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jboss-security-spi-2.0.4-6.SP8.1.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossas-5.1.2-8.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossas-tp-licenses-5.1.2-7.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossas-ws-cxf-5.1.2-8.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbosssx2-2.0.4-6.SP8.2.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossts-4.6.1-11.CP12.4.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossweb-2.1.12-1.4_patch_01.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossws-3.1.2-7.SP11.4.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossws-common-1.1.0-6.SP8_patch_01.1.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossws-framework-3.1.2-6.SP10.2.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jbossws-spi-1.1.2-5.SP7.1.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jgroups-2.6.20-1.1.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jopr-embedded-1.3.4-18.SP5.8.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jopr-hibernate-plugin-3.0.0-13.EmbJopr4.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jopr-jboss-as-5-plugin-3.0.0-12.EmbJopr4.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/jopr-jboss-cache-v3-plugin-3.0.0-14.EmbJopr4.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/mod_cluster-1.0.10-3.1.GA_CP02.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/mod_cluster-native-1.0.10-3.1.GA_CP02.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/org-mc4j-ems-1.2.15.1-4.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/picketlink-federation-2.0.2-1.1.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/resteasy-1.2.1-9.CP02.4.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/rh-eap-docs-5.1.2-6.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/rhq-3.0.0-20.EmbJopr4.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/rhq-jmx-plugin-3.0.0-20.EmbJopr4.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/rhq-platform-plugin-3.0.0-13.EmbJopr4.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/slf4j-1.5.8-10_patch_01.2.ep5.el5.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/JBEAP/SRPMS/xalan-j2-2.7.1-6_patch_05.1.ep5.el5.src.rpm

i386:
jboss-eap5-native-5.1.2-1.4.ep5.el5.i386.rpm
mod_cluster-native-1.0.10-3.1.GA_CP02.ep5.el5.i386.rpm
mod_cluster-native-debuginfo-1.0.10-3.1.GA_CP02.ep5.el5.i386.rpm

noarch:
apache-cxf-2.2.12-4.patch_02.1.1.ep5.el5.noarch.rpm
cglib-2.2-5.3.ep5.el5.noarch.rpm
facelets-1.1.15-3.B1_patch_01.2.ep5.el5.noarch.rpm
glassfish-jaxb-2.1.12-10_patch_02.ep5.el5.noarch.rpm
glassfish-jsf-1.2_13-5_patch_01.3.ep5.el5.noarch.rpm
jacorb-jboss-2.3.1-10.patch_03.4.ep5.el5.noarch.rpm
jakarta-commons-logging-jboss-1.1-10.3_patch_02.1.ep5.el5.noarch.rpm
jboss-aop2-2.1.6-2.CP03.1.1.ep5.el5.noarch.rpm
jboss-cache-core-3.2.8-1.ep5.el5.noarch.rpm
jboss-cl-2.0.10-1.2.ep5.el5.noarch.rpm
jboss-cluster-ha-client-1.1.4-1.1.ep5.el5.noarch.rpm
jboss-common-core-2.2.18-1.1.ep5.el5.noarch.rpm
jboss-ejb3-core-1.3.8-0.1.ep5.el5.noarch.rpm
jboss-ejb3-proxy-clustered-1.0.3-2.SP1.1.ep5.el5.noarch.rpm
jboss-ejb3-proxy-impl-1.0.6-2.SP2.1.ep5.el5.noarch.rpm
jboss-el-1.0_02-0.CR6.2.ep5.el5.noarch.rpm
jboss-messaging-1.4.8-9.SP5.1.ep5.el5.noarch.rpm
jboss-naming-5.0.3-3.CP01.3.1.ep5.el5.noarch.rpm
jboss-remoting-2.5.4-9.SP3.1.ep5.el5.noarch.rpm
jboss-seam2-2.2.5.EAP5-5.ep5.el5.noarch.rpm
jboss-seam2-docs-2.2.5.EAP5-5.ep5.el5.noarch.rpm
jboss-seam2-examples-2.2.5.EAP5-5.ep5.el5.noarch.rpm
jboss-seam2-runtime-2.2.5.EAP5-5.ep5.el5.noarch.rpm
jboss-security-spi-2.0.4-6.SP8.1.ep5.el5.noarch.rpm
jbossas-5.1.2-8.ep5.el5.noarch.rpm
jbossas-client-5.1.2-8.ep5.el5.noarch.rpm
jbossas-messaging-5.1.2-8.ep5.el5.noarch.rpm
jbossas-tp-licenses-5.1.2-7.ep5.el5.noarch.rpm
jbossas-ws-cxf-5.1.2-8.ep5.el5.noarch.rpm
jbossas-ws-native-5.1.2-8.ep5.el5.noarch.rpm
jbosssx2-2.0.4-6.SP8.2.ep5.el5.noarch.rpm
jbossts-4.6.1-11.CP12.4.ep5.el5.noarch.rpm
jbossts-javadoc-4.6.1-11.CP12.4.ep5.el5.noarch.rpm
jbossweb-2.1.12-1.4_patch_01.ep5.el5.noarch.rpm
jbossweb-el-1.0-api-2.1.12-1.4_patch_01.ep5.el5.noarch.rpm
jbossweb-jsp-2.1-api-2.1.12-1.4_patch_01.ep5.el5.noarch.rpm
jbossweb-lib-2.1.12-1.4_patch_01.ep5.el5.noarch.rpm
jbossweb-servlet-2.5-api-2.1.12-1.4_patch_01.ep5.el5.noarch.rpm
jbossws-3.1.2-7.SP11.4.ep5.el5.noarch.rpm
jbossws-common-1.1.0-6.SP8_patch_01.1.ep5.el5.noarch.rpm
jbossws-framework-3.1.2-6.SP10.2.ep5.el5.noarch.rpm
jbossws-spi-1.1.2-5.SP7.1.ep5.el5.noarch.rpm
jgroups-2.6.20-1.1.ep5.el5.noarch.rpm
jopr-embedded-1.3.4-18.SP5.8.ep5.el5.noarch.rpm
jopr-hibernate-plugin-3.0.0-13.EmbJopr4.ep5.el5.noarch.rpm
jopr-jboss-as-5-plugin-3.0.0-12.EmbJopr4.ep5.el5.noarch.rpm
jopr-jboss-cache-v3-plugin-3.0.0-14.EmbJopr4.ep5.el5.noarch.rpm
mod_cluster-demo-1.0.10-3.1.GA_CP02.ep5.el5.noarch.rpm
mod_cluster-jbossas-1.0.10-3.1.GA_CP02.ep5.el5.noarch.rpm
mod_cluster-jbossweb2-1.0.10-3.1.GA_CP02.ep5.el5.noarch.rpm
mod_cluster-tomcat6-1.0.10-3.1.GA_CP02.ep5.el5.noarch.rpm
org-mc4j-ems-1.2.15.1-4.ep5.el5.noarch.rpm
picketlink-federation-2.0.2-1.1.ep5.el5.noarch.rpm
picketlink-federation-webapp-idp-2.0.2-1.1.ep5.el5.noarch.rpm
picketlink-federation-webapp-pdp-2.0.2-1.1.ep5.el5.noarch.rpm
picketlink-federation-webapp-sts-2.0.2-1.1.ep5.el5.noarch.rpm
resteasy-1.2.1-9.CP02.4.ep5.el5.noarch.rpm
resteasy-examples-1.2.1-9.CP02.4.ep5.el5.noarch.rpm
resteasy-javadoc-1.2.1-9.CP02.4.ep5.el5.noarch.rpm
resteasy-manual-1.2.1-9.CP02.4.ep5.el5.noarch.rpm
rh-eap-docs-5.1.2-6.ep5.el5.noarch.rpm
rh-eap-docs-examples-5.1.2-6.ep5.el5.noarch.rpm
rhq-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-ant-bundle-common-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-common-parent-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-client-api-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-comm-api-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-dbutils-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-domain-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-gui-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-native-system-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-parent-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-plugin-api-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-plugin-container-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-plugindoc-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-core-util-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-filetemplate-bundle-common-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-helpers-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-jboss-as-common-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-jmx-plugin-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-modules-parent-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-parent-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-platform-plugin-3.0.0-13.EmbJopr4.ep5.el5.noarch.rpm
rhq-plugin-validator-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-pluginAnnotations-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-pluginGen-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-plugins-parent-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
rhq-rtfilter-3.0.0-20.EmbJopr4.ep5.el5.noarch.rpm
slf4j-1.5.8-10_patch_01.2.ep5.el5.noarch.rpm
xalan-j2-2.7.1-6_patch_05.1.ep5.el5.noarch.rpm

x86_64:
jboss-eap5-native-5.1.2-1.4.ep5.el5.x86_64.rpm
mod_cluster-native-1.0.10-3.1.GA_CP02.ep5.el5.x86_64.rpm
mod_cluster-native-debuginfo-1.0.10-3.1.GA_CP02.ep5.el5.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2011-4085.html
https://www.redhat.com/security/data/cve/CVE-2011-4314.html
https://access.redhat.com/security/updates/classification/#low
https://docs.redhat.com/docs/en-US/index.html
https://access.redhat.com/support/offerings/techpreview/

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFO4SrSXlSAg2UNWIIRAnL2AKCJaVfTZGW9QICf3GGNvd2XU0drzgCffyl2
ynKonDbmhnQhZbodnPaZdaA=
=mpPo
- -----END PGP SIGNATURE-----

- ----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: JBoss Enterprise Application Platform 5.1.2 update
Advisory ID:       RHSA-2011:1798-01
Product:           JBoss Enterprise Application Platform
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2011-1798.html
Issue date:        2011-12-08
CVE Names:         CVE-2011-4085 CVE-2011-4314 
=====================================================================

1. Summary:

Updated JBoss Enterprise Application Platform 5.1.2 packages that fix two
security issues, various bugs, and add several enhancements are now
available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having low
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

JBoss Enterprise Application Platform 5 for RHEL 6 Server - i386, noarch, x86_64

3. Description:

JBoss Enterprise Application Platform is a platform for Java applications,
which integrates the JBoss Application Server with JBoss Hibernate and
JBoss Seam. OpenID4Java allows you to implement OpenID authentication in
your Java applications. OpenID4Java is a Technology Preview.

This JBoss Enterprise Application Platform 5.1.2 release for Red Hat
Enterprise Linux 6 serves as a replacement for JBoss Enterprise Application
Platform 5.1.1.

These updated packages include bug fixes and enhancements. Refer to
the JBoss Enterprise Application Platform 5.1.2 Release Notes for
information on the most significant of these changes. The Release Notes
will be available shortly from
https://docs.redhat.com/docs/en-US/index.html

The following security issues are also fixed with this release:

It was found that the invoker servlets, deployed by default via
httpha-invoker, only performed access control on the HTTP GET and POST
methods, allowing remote attackers to make unauthenticated requests by
using different HTTP methods. Due to the second layer of authentication
provided by a security interceptor, this issue is not exploitable on
default installations unless an administrator has misconfigured the
security interceptor or disabled it. (CVE-2011-4085)

It was found that the Attribute Exchange (AX) extension of OpenID4Java was
not checking to ensure attributes were signed. If AX was being used to
receive information that an application only trusts the identity provider
to assert, a remote attacker could use this flaw to conduct
man-in-the-middle attacks and compromise the integrity of the information
via a specially-crafted request. By default, only the JBoss Seam openid
example application uses OpenID4Java. (CVE-2011-4314)

Warning: Before applying this update, back up the
"jboss-as/server/[PROFILE]/deploy/" directory and any other customized
configuration files of your JBoss Enterprise Application Platform.

All users of JBoss Enterprise Application Platform 5.1.1 on Red Hat
Enterprise Linux 6 are advised to upgrade to these updated packages. The
JBoss server process must be restarted for the update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

733727 - Tracker bug for the EAP 5.1.2 release for RHEL-6.
750422 - CVE-2011-4085 Invoker servlets authentication bypass (HTTP verb tampering)
754386 - CVE-2011-4314 openid4java (AX extension): MITM due to improper validation of AX attribute signatures

6. Package List:

JBoss Enterprise Application Platform 5 for RHEL 6 Server:

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/apache-cxf-2.2.12-4.patch_02.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/cglib-2.2-5.5.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/facelets-1.1.15-3.B1_patch_01.2.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/glassfish-jaxb-2.1.12-10_patch_02.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/glassfish-jsf-1.2_13-5_patch_01.3.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jacorb-jboss-2.3.1-10.patch_03.4.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jakarta-commons-logging-jboss-1.1-10.3_patch_02.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-aop2-2.1.6-2.CP03.1.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-cache-core-3.2.8-1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-cl-2.0.10-1.2.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-cluster-ha-client-1.1.4-1.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-common-core-2.2.18-1.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-eap5-native-5.1.2-1.4.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-ejb3-core-1.3.8-0.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-ejb3-proxy-clustered-1.0.3-2.SP1.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-ejb3-proxy-impl-1.0.6-2.SP2.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-el-1.0_02-0.CR6.2.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-messaging-1.4.8-9.SP5.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-naming-5.0.3-3.CP01.3.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-remoting-2.5.4-9.SP3.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-seam2-2.2.5.EAP5-7.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jboss-security-spi-2.0.4-6.SP8.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossas-5.1.2-8.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossas-tp-licenses-5.1.2-7.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossas-ws-cxf-5.1.2-8.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbosssx2-2.0.4-6.SP8.2.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossts-4.6.1-11.CP12.4.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossweb-2.1.12-1.4_patch_01.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossws-3.1.2-7.SP11.4.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossws-common-1.1.0-6.SP8_patch_01.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossws-framework-3.1.2-6.SP10.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jbossws-spi-1.1.2-5.SP7.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jgroups-2.6.20-1.1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jopr-embedded-1.3.4-18.SP5.8.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jopr-hibernate-plugin-3.0.0-13.EmbJopr4.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jopr-jboss-as-5-plugin-3.0.0-12.EmbJopr4.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/jopr-jboss-cache-v3-plugin-3.0.0-14.EmbJopr4.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/mod_cluster-1.0.10-3.2.GA_CP02.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/mod_cluster-native-1.0.10-3.1.1.GA_CP02.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/org-mc4j-ems-1.2.15.1-7.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/picketlink-federation-2.0.2-1.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/resteasy-1.2.1-9.CP02.5.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/rh-eap-docs-5.1.2-6.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/rhq-3.0.0-20.EmbJopr4.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/rhq-jmx-plugin-3.0.0-20.EmbJopr4.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/rhq-platform-plugin-3.0.0-13.EmbJopr4.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/slf4j-1.5.8-10_patch_01.2.ep5.el6.src.rpm
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/JBEAP/SRPMS/xalan-j2-2.7.1-6_patch_05.1.ep5.el6.src.rpm

i386:
jboss-eap5-native-5.1.2-1.4.ep5.el6.i386.rpm
mod_cluster-native-1.0.10-3.1.1.GA_CP02.ep5.el6.i386.rpm
mod_cluster-native-debuginfo-1.0.10-3.1.1.GA_CP02.ep5.el6.i386.rpm

noarch:
apache-cxf-2.2.12-4.patch_02.1.ep5.el6.noarch.rpm
cglib-2.2-5.5.ep5.el6.noarch.rpm
facelets-1.1.15-3.B1_patch_01.2.ep5.el6.noarch.rpm
glassfish-jaxb-2.1.12-10_patch_02.ep5.el6.noarch.rpm
glassfish-jsf-1.2_13-5_patch_01.3.ep5.el6.noarch.rpm
jacorb-jboss-2.3.1-10.patch_03.4.ep5.el6.noarch.rpm
jakarta-commons-logging-jboss-1.1-10.3_patch_02.1.ep5.el6.noarch.rpm
jboss-aop2-2.1.6-2.CP03.1.1.ep5.el6.noarch.rpm
jboss-cache-core-3.2.8-1.ep5.el6.noarch.rpm
jboss-cl-2.0.10-1.2.ep5.el6.noarch.rpm
jboss-cluster-ha-client-1.1.4-1.1.ep5.el6.noarch.rpm
jboss-common-core-2.2.18-1.1.ep5.el6.noarch.rpm
jboss-ejb3-core-1.3.8-0.1.ep5.el6.noarch.rpm
jboss-ejb3-proxy-clustered-1.0.3-2.SP1.1.ep5.el6.noarch.rpm
jboss-ejb3-proxy-impl-1.0.6-2.SP2.1.ep5.el6.noarch.rpm
jboss-el-1.0_02-0.CR6.2.ep5.el6.noarch.rpm
jboss-messaging-1.4.8-9.SP5.1.ep5.el6.noarch.rpm
jboss-naming-5.0.3-3.CP01.3.ep5.el6.noarch.rpm
jboss-remoting-2.5.4-9.SP3.1.ep5.el6.noarch.rpm
jboss-seam2-2.2.5.EAP5-7.ep5.el6.noarch.rpm
jboss-seam2-docs-2.2.5.EAP5-7.ep5.el6.noarch.rpm
jboss-seam2-examples-2.2.5.EAP5-7.ep5.el6.noarch.rpm
jboss-seam2-runtime-2.2.5.EAP5-7.ep5.el6.noarch.rpm
jboss-security-spi-2.0.4-6.SP8.1.ep5.el6.noarch.rpm
jbossas-5.1.2-8.ep5.el6.noarch.rpm
jbossas-client-5.1.2-8.ep5.el6.noarch.rpm
jbossas-messaging-5.1.2-8.ep5.el6.noarch.rpm
jbossas-tp-licenses-5.1.2-7.ep5.el6.noarch.rpm
jbossas-ws-cxf-5.1.2-8.ep5.el6.noarch.rpm
jbossas-ws-native-5.1.2-8.ep5.el6.noarch.rpm
jbosssx2-2.0.4-6.SP8.2.ep5.el6.noarch.rpm
jbossts-4.6.1-11.CP12.4.ep5.el6.noarch.rpm
jbossts-javadoc-4.6.1-11.CP12.4.ep5.el6.noarch.rpm
jbossweb-2.1.12-1.4_patch_01.ep5.el6.noarch.rpm
jbossweb-el-1.0-api-2.1.12-1.4_patch_01.ep5.el6.noarch.rpm
jbossweb-jsp-2.1-api-2.1.12-1.4_patch_01.ep5.el6.noarch.rpm
jbossweb-lib-2.1.12-1.4_patch_01.ep5.el6.noarch.rpm
jbossweb-servlet-2.5-api-2.1.12-1.4_patch_01.ep5.el6.noarch.rpm
jbossws-3.1.2-7.SP11.4.ep5.el6.noarch.rpm
jbossws-common-1.1.0-6.SP8_patch_01.1.ep5.el6.noarch.rpm
jbossws-framework-3.1.2-6.SP10.1.ep5.el6.noarch.rpm
jbossws-spi-1.1.2-5.SP7.1.ep5.el6.noarch.rpm
jgroups-2.6.20-1.1.ep5.el6.noarch.rpm
jopr-embedded-1.3.4-18.SP5.8.ep5.el6.noarch.rpm
jopr-hibernate-plugin-3.0.0-13.EmbJopr4.ep5.el6.noarch.rpm
jopr-jboss-as-5-plugin-3.0.0-12.EmbJopr4.ep5.el6.noarch.rpm
jopr-jboss-cache-v3-plugin-3.0.0-14.EmbJopr4.ep5.el6.noarch.rpm
mod_cluster-demo-1.0.10-3.2.GA_CP02.ep5.el6.noarch.rpm
mod_cluster-jbossas-1.0.10-3.2.GA_CP02.ep5.el6.noarch.rpm
mod_cluster-jbossweb2-1.0.10-3.2.GA_CP02.ep5.el6.noarch.rpm
mod_cluster-tomcat6-1.0.10-3.2.GA_CP02.ep5.el6.noarch.rpm
org-mc4j-ems-1.2.15.1-7.ep5.el6.noarch.rpm
picketlink-federation-2.0.2-1.ep5.el6.noarch.rpm
picketlink-federation-webapp-idp-2.0.2-1.ep5.el6.noarch.rpm
picketlink-federation-webapp-pdp-2.0.2-1.ep5.el6.noarch.rpm
picketlink-federation-webapp-sts-2.0.2-1.ep5.el6.noarch.rpm
resteasy-1.2.1-9.CP02.5.ep5.el6.noarch.rpm
resteasy-examples-1.2.1-9.CP02.5.ep5.el6.noarch.rpm
resteasy-javadoc-1.2.1-9.CP02.5.ep5.el6.noarch.rpm
resteasy-manual-1.2.1-9.CP02.5.ep5.el6.noarch.rpm
rh-eap-docs-5.1.2-6.ep5.el6.noarch.rpm
rh-eap-docs-examples-5.1.2-6.ep5.el6.noarch.rpm
rhq-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-ant-bundle-common-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-common-parent-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-client-api-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-comm-api-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-dbutils-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-domain-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-gui-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-native-system-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-parent-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-plugin-api-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-plugin-container-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-plugindoc-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-util-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-filetemplate-bundle-common-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-helpers-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-jboss-as-common-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-jmx-plugin-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-modules-parent-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-parent-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-platform-plugin-3.0.0-13.EmbJopr4.ep5.el6.noarch.rpm
rhq-plugin-validator-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-pluginAnnotations-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-pluginGen-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-plugins-parent-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-rtfilter-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
slf4j-1.5.8-10_patch_01.2.ep5.el6.noarch.rpm
xalan-j2-2.7.1-6_patch_05.1.ep5.el6.noarch.rpm

x86_64:
jboss-eap5-native-5.1.2-1.4.ep5.el6.x86_64.rpm
mod_cluster-native-1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64.rpm
mod_cluster-native-debuginfo-1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2011-4085.html
https://www.redhat.com/security/data/cve/CVE-2011-4314.html
https://access.redhat.com/security/updates/classification/#low
https://docs.redhat.com/docs/en-US/index.html
https://access.redhat.com/support/offerings/techpreview/

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFO4SquXlSAg2UNWIIRAkE5AJ0eUn3uOW+Tf4jKb2tZD2Y3OTZV8QCggbiy
QJzFUNQ+cJtlR83IVSMveMI=
=ChRk
- -----END PGP SIGNATURE-----

- ----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: JBoss Enterprise Web Platform 5.1.2 update
Advisory ID:       RHSA-2011:1802-01
Product:           JBoss Enterprise Web Platform
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2011-1802.html
Issue date:        2011-12-08
CVE Names:         CVE-2011-4314 
=====================================================================

1. Summary:

Updated JBoss Enterprise Web Platform 5.1.2 packages that fix one security
issue, various bugs, and add several enhancements are now available for Red
Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

JBoss Enterprise Web Platform 5 for RHEL 6 Server - i386, noarch, x86_64

3. Description:

The Enterprise Web Platform is a slimmed down profile of the JBoss
Enterprise Application Platform intended for mid-size workloads with light
and rich Java applications. OpenID4Java allows you to implement OpenID
authentication in your Java applications. OpenID4Java is a Technology
Preview.

This JBoss Enterprise Web Platform 5.1.2 release for Red Hat Enterprise
Linux 6 serves as a replacement for JBoss Enterprise Web Platform 5.1.1.

These updated packages include bug fixes and enhancements. JBoss Enterprise
Web Platform is a subset of JBoss Enterprise Application Platform. Users
are directed to the JBoss Enterprise Application Platform 5.1.2 Release
Notes for information on the most significant of these changes. The Release
Notes will be available shortly from
https://docs.redhat.com/docs/en-US/index.html

The following security issue is also fixed with this release:

It was found that the Attribute Exchange (AX) extension of OpenID4Java was
not checking to ensure attributes were signed. If AX was being used to
receive information that an application only trusts the identity provider
to assert, a remote attacker could use this flaw to conduct
man-in-the-middle attacks and compromise the integrity of the information
via a specially-crafted request. By default, only the JBoss Seam openid
example application uses OpenID4Java. (CVE-2011-4314)

Warning: Before applying this update, back up the
"jboss-as-web/server/[PROFILE]/deploy/" directory and any other customized
configuration files of your JBoss Enterprise Web Platform.

All users of JBoss Enterprise Web Platform 5.1.1 on Red Hat Enterprise
Linux 6 are advised to upgrade to these updated packages. The JBoss server
process must be restarted for the update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

733745 - EWP: Tracker bug for the EWP 5.1.2 release for RHEL-6.
754386 - CVE-2011-4314 openid4java (AX extension): MITM due to improper validation of AX attribute signatures

6. Package List:

JBoss Enterprise Web Platform 5 for RHEL 6 Server:

Source:
apache-cxf-2.2.12-4.patch_02.1.ep5.el6.src.rpm
cglib-2.2-5.5.ep5.el6.src.rpm
facelets-1.1.15-3.B1_patch_01.2.ep5.el6.src.rpm
glassfish-jaxb-2.1.12-10_patch_02.ep5.el6.src.rpm
glassfish-jsf-1.2_13-5_patch_01.3.ep5.el6.src.rpm
jacorb-jboss-2.3.1-10.patch_03.4.ep5.el6.src.rpm
jakarta-commons-logging-jboss-1.1-10.3_patch_02.1.ep5.el6.src.rpm
jboss-aop2-2.1.6-2.CP03.1.1.ep5.el6.src.rpm
jboss-cache-core-3.2.8-1.ep5.el6.src.rpm
jboss-cl-2.0.10-1.2.ep5.el6.src.rpm
jboss-cluster-ha-client-1.1.4-1.1.ep5.el6.src.rpm
jboss-common-core-2.2.18-1.1.ep5.el6.src.rpm
jboss-eap5-native-5.1.2-1.4.ep5.el6.src.rpm
jboss-ejb3-core-1.3.8-0.1.ep5.el6.src.rpm
jboss-ejb3-proxy-clustered-1.0.3-2.SP1.1.ep5.el6.src.rpm
jboss-ejb3-proxy-impl-1.0.6-2.SP2.1.ep5.el6.src.rpm
jboss-el-1.0_02-0.CR6.2.ep5.el6.src.rpm
jboss-naming-5.0.3-3.CP01.3.ep5.el6.src.rpm
jboss-remoting-2.5.4-9.SP3.1.ep5.el6.src.rpm
jboss-seam2-2.2.5.EAP5-7.ep5.el6.src.rpm
jboss-security-spi-2.0.4-6.SP8.1.ep5.el6.src.rpm
jbossas-web-5.1.2-7.ep5.el6.src.rpm
jbossas-web-tp-licenses-5.1.2-6.ep5.el6.src.rpm
jbossas-ws-cxf-ewp-5.1.2-6.ep5.el6.src.rpm
jbosssx2-2.0.4-6.SP8.2.ep5.el6.src.rpm
jbossts-4.6.1-11.CP12.4.ep5.el6.src.rpm
jbossweb-2.1.12-1.4_patch_01.ep5.el6.src.rpm
jbossws-3.1.2-7.SP11.4.ep5.el6.src.rpm
jbossws-common-1.1.0-6.SP8_patch_01.1.ep5.el6.src.rpm
jbossws-framework-3.1.2-6.SP10.1.ep5.el6.src.rpm
jbossws-spi-1.1.2-5.SP7.1.ep5.el6.src.rpm
jgroups-2.6.20-1.1.ep5.el6.src.rpm
jopr-embedded-1.3.4-18.SP5.8.ep5.el6.src.rpm
jopr-hibernate-plugin-3.0.0-13.EmbJopr4.ep5.el6.src.rpm
jopr-jboss-as-5-plugin-3.0.0-12.EmbJopr4.ep5.el6.src.rpm
jopr-jboss-cache-v3-plugin-3.0.0-14.EmbJopr4.ep5.el6.src.rpm
mod_cluster-1.0.10-3.2.GA_CP02.ep5.el6.src.rpm
mod_cluster-native-1.0.10-3.1.1.GA_CP02.ep5.el6.src.rpm
org-mc4j-ems-1.2.15.1-7.ep5.el6.src.rpm
picketlink-federation-2.0.2-1.ep5.el6.src.rpm
resteasy-1.2.1-9.CP02.5.ep5.el6.src.rpm
rh-ewp-docs-5.1.2-4.ep5.el6.src.rpm
rhq-3.0.0-20.EmbJopr4.ep5.el6.src.rpm
rhq-jmx-plugin-3.0.0-20.EmbJopr4.ep5.el6.src.rpm
rhq-platform-plugin-3.0.0-13.EmbJopr4.ep5.el6.src.rpm
slf4j-1.5.8-10_patch_01.2.ep5.el6.src.rpm
xalan-j2-2.7.1-6_patch_05.1.ep5.el6.src.rpm

i386:
jboss-eap5-native-5.1.2-1.4.ep5.el6.i386.rpm
mod_cluster-native-1.0.10-3.1.1.GA_CP02.ep5.el6.i386.rpm
mod_cluster-native-debuginfo-1.0.10-3.1.1.GA_CP02.ep5.el6.i386.rpm

noarch:
apache-cxf-2.2.12-4.patch_02.1.ep5.el6.noarch.rpm
cglib-2.2-5.5.ep5.el6.noarch.rpm
facelets-1.1.15-3.B1_patch_01.2.ep5.el6.noarch.rpm
glassfish-jaxb-2.1.12-10_patch_02.ep5.el6.noarch.rpm
glassfish-jsf-1.2_13-5_patch_01.3.ep5.el6.noarch.rpm
jacorb-jboss-2.3.1-10.patch_03.4.ep5.el6.noarch.rpm
jakarta-commons-logging-jboss-1.1-10.3_patch_02.1.ep5.el6.noarch.rpm
jboss-aop2-2.1.6-2.CP03.1.1.ep5.el6.noarch.rpm
jboss-cache-core-3.2.8-1.ep5.el6.noarch.rpm
jboss-cl-2.0.10-1.2.ep5.el6.noarch.rpm
jboss-cluster-ha-client-1.1.4-1.1.ep5.el6.noarch.rpm
jboss-common-core-2.2.18-1.1.ep5.el6.noarch.rpm
jboss-ejb3-core-1.3.8-0.1.ep5.el6.noarch.rpm
jboss-ejb3-proxy-clustered-1.0.3-2.SP1.1.ep5.el6.noarch.rpm
jboss-ejb3-proxy-impl-1.0.6-2.SP2.1.ep5.el6.noarch.rpm
jboss-el-1.0_02-0.CR6.2.ep5.el6.noarch.rpm
jboss-naming-5.0.3-3.CP01.3.ep5.el6.noarch.rpm
jboss-remoting-2.5.4-9.SP3.1.ep5.el6.noarch.rpm
jboss-seam2-2.2.5.EAP5-7.ep5.el6.noarch.rpm
jboss-seam2-docs-2.2.5.EAP5-7.ep5.el6.noarch.rpm
jboss-seam2-examples-2.2.5.EAP5-7.ep5.el6.noarch.rpm
jboss-seam2-runtime-2.2.5.EAP5-7.ep5.el6.noarch.rpm
jboss-security-spi-2.0.4-6.SP8.1.ep5.el6.noarch.rpm
jbossas-web-5.1.2-7.ep5.el6.noarch.rpm
jbossas-web-client-5.1.2-7.ep5.el6.noarch.rpm
jbossas-web-tp-licenses-5.1.2-6.ep5.el6.noarch.rpm
jbossas-web-ws-native-5.1.2-7.ep5.el6.noarch.rpm
jbossas-ws-cxf-ewp-5.1.2-6.ep5.el6.noarch.rpm
jbosssx2-2.0.4-6.SP8.2.ep5.el6.noarch.rpm
jbossts-4.6.1-11.CP12.4.ep5.el6.noarch.rpm
jbossts-javadoc-4.6.1-11.CP12.4.ep5.el6.noarch.rpm
jbossweb-2.1.12-1.4_patch_01.ep5.el6.noarch.rpm
jbossweb-el-1.0-api-2.1.12-1.4_patch_01.ep5.el6.noarch.rpm
jbossweb-jsp-2.1-api-2.1.12-1.4_patch_01.ep5.el6.noarch.rpm
jbossweb-lib-2.1.12-1.4_patch_01.ep5.el6.noarch.rpm
jbossweb-servlet-2.5-api-2.1.12-1.4_patch_01.ep5.el6.noarch.rpm
jbossws-3.1.2-7.SP11.4.ep5.el6.noarch.rpm
jbossws-common-1.1.0-6.SP8_patch_01.1.ep5.el6.noarch.rpm
jbossws-framework-3.1.2-6.SP10.1.ep5.el6.noarch.rpm
jbossws-spi-1.1.2-5.SP7.1.ep5.el6.noarch.rpm
jgroups-2.6.20-1.1.ep5.el6.noarch.rpm
jopr-embedded-1.3.4-18.SP5.8.ep5.el6.noarch.rpm
jopr-hibernate-plugin-3.0.0-13.EmbJopr4.ep5.el6.noarch.rpm
jopr-jboss-as-5-plugin-3.0.0-12.EmbJopr4.ep5.el6.noarch.rpm
jopr-jboss-cache-v3-plugin-3.0.0-14.EmbJopr4.ep5.el6.noarch.rpm
mod_cluster-demo-1.0.10-3.2.GA_CP02.ep5.el6.noarch.rpm
mod_cluster-jbossas-1.0.10-3.2.GA_CP02.ep5.el6.noarch.rpm
mod_cluster-jbossweb2-1.0.10-3.2.GA_CP02.ep5.el6.noarch.rpm
mod_cluster-tomcat6-1.0.10-3.2.GA_CP02.ep5.el6.noarch.rpm
org-mc4j-ems-1.2.15.1-7.ep5.el6.noarch.rpm
picketlink-federation-2.0.2-1.ep5.el6.noarch.rpm
picketlink-federation-webapp-idp-2.0.2-1.ep5.el6.noarch.rpm
picketlink-federation-webapp-pdp-2.0.2-1.ep5.el6.noarch.rpm
picketlink-federation-webapp-sts-2.0.2-1.ep5.el6.noarch.rpm
resteasy-1.2.1-9.CP02.5.ep5.el6.noarch.rpm
resteasy-examples-1.2.1-9.CP02.5.ep5.el6.noarch.rpm
resteasy-javadoc-1.2.1-9.CP02.5.ep5.el6.noarch.rpm
resteasy-manual-1.2.1-9.CP02.5.ep5.el6.noarch.rpm
rh-ewp-docs-5.1.2-4.ep5.el6.noarch.rpm
rh-ewp-docs-examples-5.1.2-4.ep5.el6.noarch.rpm
rhq-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-ant-bundle-common-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-common-parent-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-client-api-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-comm-api-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-dbutils-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-domain-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-gui-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-native-system-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-parent-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-plugin-api-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-plugin-container-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-plugindoc-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-core-util-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-filetemplate-bundle-common-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-helpers-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-jboss-as-common-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-jmx-plugin-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-modules-parent-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-parent-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-platform-plugin-3.0.0-13.EmbJopr4.ep5.el6.noarch.rpm
rhq-plugin-validator-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-pluginAnnotations-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-pluginGen-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-plugins-parent-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
rhq-rtfilter-3.0.0-20.EmbJopr4.ep5.el6.noarch.rpm
slf4j-1.5.8-10_patch_01.2.ep5.el6.noarch.rpm
xalan-j2-2.7.1-6_patch_05.1.ep5.el6.noarch.rpm

x86_64:
jboss-eap5-native-5.1.2-1.4.ep5.el6.x86_64.rpm
mod_cluster-native-1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64.rpm
mod_cluster-native-debuginfo-1.0.10-3.1.1.GA_CP02.ep5.el6.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2011-4314.html
https://access.redhat.com/security/updates/classification/#low
https://docs.redhat.com/docs/en-US/index.html
https://access.redhat.com/support/offerings/techpreview/

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFO4SwDXlSAg2UNWIIRAu8XAJ9PbJwq62eoVSKWbNVh+7ip021jaQCgsD8C
JenESxtqzLUo8sz7Aoy3mks=
=GB5i
- -----END PGP SIGNATURE-----

- ----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: JBoss Enterprise Web Platform 5.1.2 update
Advisory ID:       RHSA-2011:1804-01
Product:           JBoss Enterprise Web Platform
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2011-1804.html
Issue date:        2011-12-08
CVE Names:         CVE-2011-4314 
=====================================================================

1. Summary:

Updated JBoss Enterprise Web Platform 5.1.2 packages that fix one security
issue, various bugs, and add several enhancements are now available for Red
Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

JBoss Enterprise Web Platform 5 for RHEL 4 AS - i386, noarch, x86_64
JBoss Enterprise Web Platform 5 for RHEL 4 ES - i386, noarch, x86_64

3. Description:

The Enterprise Web Platform is a slimmed down profile of the JBoss
Enterprise Application Platform intended for mid-size workloads with light
and rich Java applications. OpenID4Java allows you to implement OpenID
authentication in your Java applications. OpenID4Java is a Technology
Preview.

This JBoss Enterprise Web Platform 5.1.2 release for Red Hat Enterprise
Linux 4 serves as a replacement for JBoss Enterprise Web Platform 5.1.1.

These updated packages include bug fixes and enhancements. JBoss Enterprise
Web Platform is a subset of JBoss Enterprise Application Platform. Users
are directed to the JBoss Enterprise Application Platform 5.1.2 Release
Notes for information on the most significant of these changes. The Release
Notes will be available shortly from
https://docs.redhat.com/docs/en-US/index.html

The following security issue is also fixed with this release:

It was found that the Attribute Exchange (AX) extension of OpenID4Java was
not checking to ensure attributes were signed. If AX was being used to
receive information that an application only trusts the identity provider
to assert, a remote attacker could use this flaw to conduct
man-in-the-middle attacks and compromise the integrity of the information
via a specially-crafted request. By default, only the JBoss Seam openid
example application uses OpenID4Java. (CVE-2011-4314)

Warning: Before applying this update, back up the
"jboss-as-web/server/[PROFILE]/deploy/" directory and any other customized
configuration files of your JBoss Enterprise Web Platform.

All users of JBoss Enterprise Web Platform 5.1.1 on Red Hat Enterprise
Linux 4 are advised to upgrade to these updated packages. The JBoss server
process must be restarted for the update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

733747 - EWP: Tracker bug for the EWP 5.1.2 release for RHEL-4.
754386 - CVE-2011-4314 openid4java (AX extension): MITM due to improper validation of AX attribute signatures

6. Package List:

JBoss Enterprise Web Platform 5 for RHEL 4 AS:

Source:
apache-cxf-2.2.12-4.patch_02.1.1.ep5.el4.src.rpm
cglib-2.2-5.3.ep5.el4.src.rpm
facelets-1.1.15-3.B1_patch_01.2.ep5.el4.src.rpm
glassfish-jaxb-2.1.12-10_patch_02.ep5.el4.src.rpm
glassfish-jsf-1.2_13-5_patch_01.3.ep5.el4.src.rpm
jacorb-jboss-2.3.1-10.patch_03.4.ep5.el4.src.rpm
jakarta-commons-logging-jboss-1.1-10.3_patch_02.1.ep5.el4.src.rpm
jboss-aop2-2.1.6-2.CP03.1.1.ep5.el4.src.rpm
jboss-cache-core-3.2.8-1.ep5.el4.src.rpm
jboss-cl-2.0.10-1.2.ep5.el4.src.rpm
jboss-cluster-ha-client-1.1.4-1.1.ep5.el4.src.rpm
jboss-common-core-2.2.18-1.1.ep5.el4.src.rpm
jboss-eap5-native-5.1.2-1.4.ep5.el4.src.rpm
jboss-ejb3-core-1.3.8-0.1.ep5.el4.src.rpm
jboss-ejb3-proxy-clustered-1.0.3-2.SP1.1.ep5.el4.src.rpm
jboss-ejb3-proxy-impl-1.0.6-2.SP2.1.ep5.el4.src.rpm
jboss-el-1.0_02-0.CR6.2.ep5.el4.src.rpm
jboss-naming-5.0.3-3.CP01.3.1.ep5.el4.src.rpm
jboss-remoting-2.5.4-9.SP3.1.ep5.el4.src.rpm
jboss-seam2-2.2.5.EAP5-6.ep5.el4.src.rpm
jboss-security-spi-2.0.4-6.SP8.1.ep5.el4.src.rpm
jbossas-web-5.1.2-7.ep5.el4.src.rpm
jbossas-web-tp-licenses-5.1.2-8.ep5.el4.src.rpm
jbossas-ws-cxf-ewp-5.1.2-6.ep5.el4.src.rpm
jbosssx2-2.0.4-6.SP8.2.ep5.el4.src.rpm
jbossts-4.6.1-11.CP12.4.ep5.el4.src.rpm
jbossweb-2.1.12-1.4_patch_01.ep5.el4.src.rpm
jbossws-3.1.2-7.SP11.4.ep5.el4.src.rpm
jbossws-common-1.1.0-6.SP8_patch_01.1.ep5.el4.src.rpm
jbossws-framework-3.1.2-6.SP10.2.ep5.el4.src.rpm
jbossws-spi-1.1.2-5.SP7.1.ep5.el4.src.rpm
jgroups-2.6.20-1.1.ep5.el4.src.rpm
jopr-embedded-1.3.4-18.SP5.8.ep5.el4.src.rpm
jopr-hibernate-plugin-3.0.0-14.EmbJopr4.ep5.el4.src.rpm
jopr-jboss-as-5-plugin-3.0.0-13.EmbJopr4.ep5.el4.src.rpm
jopr-jboss-cache-v3-plugin-3.0.0-14.EmbJopr4.ep5.el4.src.rpm
mod_cluster-1.0.10-3.GA_CP02.ep5.el4.src.rpm
mod_cluster-native-1.0.10-3.GA_CP02.ep5.el4.src.rpm
org-mc4j-ems-1.2.15.1-4.ep5.el4.src.rpm
picketlink-federation-2.0.2-1.1.ep5.el4.src.rpm
resteasy-1.2.1-9.CP02.4.ep5.el4.src.rpm
rh-ewp-docs-5.1.2-4.ep5.el4.src.rpm
rhq-3.0.0-21.EmbJopr4.ep5.el4.src.rpm
rhq-jmx-plugin-3.0.0-21.EmbJopr4.ep5.el4.src.rpm
rhq-platform-plugin-3.0.0-14.EmbJopr4.ep5.el4.src.rpm
slf4j-1.5.8-10_patch_01.2.ep5.el4.src.rpm
xalan-j2-2.7.1-6_patch_05.1.ep5.el4.src.rpm

i386:
jboss-eap5-native-5.1.2-1.4.ep5.el4.i386.rpm
mod_cluster-native-1.0.10-3.GA_CP02.ep5.el4.i386.rpm
mod_cluster-native-debuginfo-1.0.10-3.GA_CP02.ep5.el4.i386.rpm

noarch:
apache-cxf-2.2.12-4.patch_02.1.1.ep5.el4.noarch.rpm
cglib-2.2-5.3.ep5.el4.noarch.rpm
facelets-1.1.15-3.B1_patch_01.2.ep5.el4.noarch.rpm
glassfish-jaxb-2.1.12-10_patch_02.ep5.el4.noarch.rpm
glassfish-jsf-1.2_13-5_patch_01.3.ep5.el4.noarch.rpm
jacorb-jboss-2.3.1-10.patch_03.4.ep5.el4.noarch.rpm
jakarta-commons-logging-jboss-1.1-10.3_patch_02.1.ep5.el4.noarch.rpm
jboss-aop2-2.1.6-2.CP03.1.1.ep5.el4.noarch.rpm
jboss-cache-core-3.2.8-1.ep5.el4.noarch.rpm
jboss-cl-2.0.10-1.2.ep5.el4.noarch.rpm
jboss-cluster-ha-client-1.1.4-1.1.ep5.el4.noarch.rpm
jboss-common-core-2.2.18-1.1.ep5.el4.noarch.rpm
jboss-ejb3-core-1.3.8-0.1.ep5.el4.noarch.rpm
jboss-ejb3-proxy-clustered-1.0.3-2.SP1.1.ep5.el4.noarch.rpm
jboss-ejb3-proxy-impl-1.0.6-2.SP2.1.ep5.el4.noarch.rpm
jboss-el-1.0_02-0.CR6.2.ep5.el4.noarch.rpm
jboss-naming-5.0.3-3.CP01.3.1.ep5.el4.noarch.rpm
jboss-remoting-2.5.4-9.SP3.1.ep5.el4.noarch.rpm
jboss-seam2-2.2.5.EAP5-6.ep5.el4.noarch.rpm
jboss-seam2-docs-2.2.5.EAP5-6.ep5.el4.noarch.rpm
jboss-seam2-examples-2.2.5.EAP5-6.ep5.el4.noarch.rpm
jboss-seam2-runtime-2.2.5.EAP5-6.ep5.el4.noarch.rpm
jboss-security-spi-2.0.4-6.SP8.1.ep5.el4.noarch.rpm
jbossas-web-5.1.2-7.ep5.el4.noarch.rpm
jbossas-web-client-5.1.2-7.ep5.el4.noarch.rpm
jbossas-web-tp-licenses-5.1.2-8.ep5.el4.noarch.rpm
jbossas-web-ws-native-5.1.2-7.ep5.el4.noarch.rpm
jbossas-ws-cxf-ewp-5.1.2-6.ep5.el4.noarch.rpm
jbosssx2-2.0.4-6.SP8.2.ep5.el4.noarch.rpm
jbossts-4.6.1-11.CP12.4.ep5.el4.noarch.rpm
jbossts-javadoc-4.6.1-11.CP12.4.ep5.el4.noarch.rpm
jbossweb-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossweb-el-1.0-api-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossweb-jsp-2.1-api-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossweb-lib-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossweb-servlet-2.5-api-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossws-3.1.2-7.SP11.4.ep5.el4.noarch.rpm
jbossws-common-1.1.0-6.SP8_patch_01.1.ep5.el4.noarch.rpm
jbossws-framework-3.1.2-6.SP10.2.ep5.el4.noarch.rpm
jbossws-spi-1.1.2-5.SP7.1.ep5.el4.noarch.rpm
jgroups-2.6.20-1.1.ep5.el4.noarch.rpm
jopr-embedded-1.3.4-18.SP5.8.ep5.el4.noarch.rpm
jopr-hibernate-plugin-3.0.0-14.EmbJopr4.ep5.el4.noarch.rpm
jopr-jboss-as-5-plugin-3.0.0-13.EmbJopr4.ep5.el4.noarch.rpm
jopr-jboss-cache-v3-plugin-3.0.0-14.EmbJopr4.ep5.el4.noarch.rpm
mod_cluster-demo-1.0.10-3.GA_CP02.ep5.el4.noarch.rpm
mod_cluster-jbossas-1.0.10-3.GA_CP02.ep5.el4.noarch.rpm
mod_cluster-jbossweb2-1.0.10-3.GA_CP02.ep5.el4.noarch.rpm
mod_cluster-tomcat6-1.0.10-3.GA_CP02.ep5.el4.noarch.rpm
org-mc4j-ems-1.2.15.1-4.ep5.el4.noarch.rpm
picketlink-federation-2.0.2-1.1.ep5.el4.noarch.rpm
picketlink-federation-webapp-idp-2.0.2-1.1.ep5.el4.noarch.rpm
picketlink-federation-webapp-pdp-2.0.2-1.1.ep5.el4.noarch.rpm
picketlink-federation-webapp-sts-2.0.2-1.1.ep5.el4.noarch.rpm
resteasy-1.2.1-9.CP02.4.ep5.el4.noarch.rpm
resteasy-examples-1.2.1-9.CP02.4.ep5.el4.noarch.rpm
resteasy-javadoc-1.2.1-9.CP02.4.ep5.el4.noarch.rpm
resteasy-manual-1.2.1-9.CP02.4.ep5.el4.noarch.rpm
rh-ewp-docs-5.1.2-4.ep5.el4.noarch.rpm
rh-ewp-docs-examples-5.1.2-4.ep5.el4.noarch.rpm
rhq-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-common-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-client-api-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-comm-api-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-domain-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-gui-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-native-system-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-plugin-api-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-plugin-container-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-util-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-jboss-as-common-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-jmx-plugin-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-modules-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-platform-plugin-3.0.0-14.EmbJopr4.ep5.el4.noarch.rpm
rhq-plugins-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
slf4j-1.5.8-10_patch_01.2.ep5.el4.noarch.rpm
xalan-j2-2.7.1-6_patch_05.1.ep5.el4.noarch.rpm

x86_64:
jboss-eap5-native-5.1.2-1.4.ep5.el4.x86_64.rpm
mod_cluster-native-1.0.10-3.GA_CP02.ep5.el4.x86_64.rpm
mod_cluster-native-debuginfo-1.0.10-3.GA_CP02.ep5.el4.x86_64.rpm

JBoss Enterprise Web Platform 5 for RHEL 4 ES:

Source:
apache-cxf-2.2.12-4.patch_02.1.1.ep5.el4.src.rpm
cglib-2.2-5.3.ep5.el4.src.rpm
facelets-1.1.15-3.B1_patch_01.2.ep5.el4.src.rpm
glassfish-jaxb-2.1.12-10_patch_02.ep5.el4.src.rpm
glassfish-jsf-1.2_13-5_patch_01.3.ep5.el4.src.rpm
jacorb-jboss-2.3.1-10.patch_03.4.ep5.el4.src.rpm
jakarta-commons-logging-jboss-1.1-10.3_patch_02.1.ep5.el4.src.rpm
jboss-aop2-2.1.6-2.CP03.1.1.ep5.el4.src.rpm
jboss-cache-core-3.2.8-1.ep5.el4.src.rpm
jboss-cl-2.0.10-1.2.ep5.el4.src.rpm
jboss-cluster-ha-client-1.1.4-1.1.ep5.el4.src.rpm
jboss-common-core-2.2.18-1.1.ep5.el4.src.rpm
jboss-eap5-native-5.1.2-1.4.ep5.el4.src.rpm
jboss-ejb3-core-1.3.8-0.1.ep5.el4.src.rpm
jboss-ejb3-proxy-clustered-1.0.3-2.SP1.1.ep5.el4.src.rpm
jboss-ejb3-proxy-impl-1.0.6-2.SP2.1.ep5.el4.src.rpm
jboss-el-1.0_02-0.CR6.2.ep5.el4.src.rpm
jboss-naming-5.0.3-3.CP01.3.1.ep5.el4.src.rpm
jboss-remoting-2.5.4-9.SP3.1.ep5.el4.src.rpm
jboss-seam2-2.2.5.EAP5-6.ep5.el4.src.rpm
jboss-security-spi-2.0.4-6.SP8.1.ep5.el4.src.rpm
jbossas-web-5.1.2-7.ep5.el4.src.rpm
jbossas-web-tp-licenses-5.1.2-8.ep5.el4.src.rpm
jbossas-ws-cxf-ewp-5.1.2-6.ep5.el4.src.rpm
jbosssx2-2.0.4-6.SP8.2.ep5.el4.src.rpm
jbossts-4.6.1-11.CP12.4.ep5.el4.src.rpm
jbossweb-2.1.12-1.4_patch_01.ep5.el4.src.rpm
jbossws-3.1.2-7.SP11.4.ep5.el4.src.rpm
jbossws-common-1.1.0-6.SP8_patch_01.1.ep5.el4.src.rpm
jbossws-framework-3.1.2-6.SP10.2.ep5.el4.src.rpm
jbossws-spi-1.1.2-5.SP7.1.ep5.el4.src.rpm
jgroups-2.6.20-1.1.ep5.el4.src.rpm
jopr-embedded-1.3.4-18.SP5.8.ep5.el4.src.rpm
jopr-hibernate-plugin-3.0.0-14.EmbJopr4.ep5.el4.src.rpm
jopr-jboss-as-5-plugin-3.0.0-13.EmbJopr4.ep5.el4.src.rpm
jopr-jboss-cache-v3-plugin-3.0.0-14.EmbJopr4.ep5.el4.src.rpm
mod_cluster-1.0.10-3.GA_CP02.ep5.el4.src.rpm
mod_cluster-native-1.0.10-3.GA_CP02.ep5.el4.src.rpm
org-mc4j-ems-1.2.15.1-4.ep5.el4.src.rpm
picketlink-federation-2.0.2-1.1.ep5.el4.src.rpm
resteasy-1.2.1-9.CP02.4.ep5.el4.src.rpm
rh-ewp-docs-5.1.2-4.ep5.el4.src.rpm
rhq-3.0.0-21.EmbJopr4.ep5.el4.src.rpm
rhq-jmx-plugin-3.0.0-21.EmbJopr4.ep5.el4.src.rpm
rhq-platform-plugin-3.0.0-14.EmbJopr4.ep5.el4.src.rpm
slf4j-1.5.8-10_patch_01.2.ep5.el4.src.rpm
xalan-j2-2.7.1-6_patch_05.1.ep5.el4.src.rpm

i386:
jboss-eap5-native-5.1.2-1.4.ep5.el4.i386.rpm
mod_cluster-native-1.0.10-3.GA_CP02.ep5.el4.i386.rpm
mod_cluster-native-debuginfo-1.0.10-3.GA_CP02.ep5.el4.i386.rpm

noarch:
apache-cxf-2.2.12-4.patch_02.1.1.ep5.el4.noarch.rpm
cglib-2.2-5.3.ep5.el4.noarch.rpm
facelets-1.1.15-3.B1_patch_01.2.ep5.el4.noarch.rpm
glassfish-jaxb-2.1.12-10_patch_02.ep5.el4.noarch.rpm
glassfish-jsf-1.2_13-5_patch_01.3.ep5.el4.noarch.rpm
jacorb-jboss-2.3.1-10.patch_03.4.ep5.el4.noarch.rpm
jakarta-commons-logging-jboss-1.1-10.3_patch_02.1.ep5.el4.noarch.rpm
jboss-aop2-2.1.6-2.CP03.1.1.ep5.el4.noarch.rpm
jboss-cache-core-3.2.8-1.ep5.el4.noarch.rpm
jboss-cl-2.0.10-1.2.ep5.el4.noarch.rpm
jboss-cluster-ha-client-1.1.4-1.1.ep5.el4.noarch.rpm
jboss-common-core-2.2.18-1.1.ep5.el4.noarch.rpm
jboss-ejb3-core-1.3.8-0.1.ep5.el4.noarch.rpm
jboss-ejb3-proxy-clustered-1.0.3-2.SP1.1.ep5.el4.noarch.rpm
jboss-ejb3-proxy-impl-1.0.6-2.SP2.1.ep5.el4.noarch.rpm
jboss-el-1.0_02-0.CR6.2.ep5.el4.noarch.rpm
jboss-naming-5.0.3-3.CP01.3.1.ep5.el4.noarch.rpm
jboss-remoting-2.5.4-9.SP3.1.ep5.el4.noarch.rpm
jboss-seam2-2.2.5.EAP5-6.ep5.el4.noarch.rpm
jboss-seam2-docs-2.2.5.EAP5-6.ep5.el4.noarch.rpm
jboss-seam2-examples-2.2.5.EAP5-6.ep5.el4.noarch.rpm
jboss-seam2-runtime-2.2.5.EAP5-6.ep5.el4.noarch.rpm
jboss-security-spi-2.0.4-6.SP8.1.ep5.el4.noarch.rpm
jbossas-web-5.1.2-7.ep5.el4.noarch.rpm
jbossas-web-client-5.1.2-7.ep5.el4.noarch.rpm
jbossas-web-tp-licenses-5.1.2-8.ep5.el4.noarch.rpm
jbossas-web-ws-native-5.1.2-7.ep5.el4.noarch.rpm
jbossas-ws-cxf-ewp-5.1.2-6.ep5.el4.noarch.rpm
jbosssx2-2.0.4-6.SP8.2.ep5.el4.noarch.rpm
jbossts-4.6.1-11.CP12.4.ep5.el4.noarch.rpm
jbossts-javadoc-4.6.1-11.CP12.4.ep5.el4.noarch.rpm
jbossweb-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossweb-el-1.0-api-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossweb-jsp-2.1-api-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossweb-lib-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossweb-servlet-2.5-api-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossws-3.1.2-7.SP11.4.ep5.el4.noarch.rpm
jbossws-common-1.1.0-6.SP8_patch_01.1.ep5.el4.noarch.rpm
jbossws-framework-3.1.2-6.SP10.2.ep5.el4.noarch.rpm
jbossws-spi-1.1.2-5.SP7.1.ep5.el4.noarch.rpm
jgroups-2.6.20-1.1.ep5.el4.noarch.rpm
jopr-embedded-1.3.4-18.SP5.8.ep5.el4.noarch.rpm
jopr-hibernate-plugin-3.0.0-14.EmbJopr4.ep5.el4.noarch.rpm
jopr-jboss-as-5-plugin-3.0.0-13.EmbJopr4.ep5.el4.noarch.rpm
jopr-jboss-cache-v3-plugin-3.0.0-14.EmbJopr4.ep5.el4.noarch.rpm
mod_cluster-demo-1.0.10-3.GA_CP02.ep5.el4.noarch.rpm
mod_cluster-jbossas-1.0.10-3.GA_CP02.ep5.el4.noarch.rpm
mod_cluster-jbossweb2-1.0.10-3.GA_CP02.ep5.el4.noarch.rpm
mod_cluster-tomcat6-1.0.10-3.GA_CP02.ep5.el4.noarch.rpm
org-mc4j-ems-1.2.15.1-4.ep5.el4.noarch.rpm
picketlink-federation-2.0.2-1.1.ep5.el4.noarch.rpm
picketlink-federation-webapp-idp-2.0.2-1.1.ep5.el4.noarch.rpm
picketlink-federation-webapp-pdp-2.0.2-1.1.ep5.el4.noarch.rpm
picketlink-federation-webapp-sts-2.0.2-1.1.ep5.el4.noarch.rpm
resteasy-1.2.1-9.CP02.4.ep5.el4.noarch.rpm
resteasy-examples-1.2.1-9.CP02.4.ep5.el4.noarch.rpm
resteasy-javadoc-1.2.1-9.CP02.4.ep5.el4.noarch.rpm
resteasy-manual-1.2.1-9.CP02.4.ep5.el4.noarch.rpm
rh-ewp-docs-5.1.2-4.ep5.el4.noarch.rpm
rh-ewp-docs-examples-5.1.2-4.ep5.el4.noarch.rpm
rhq-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-common-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-client-api-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-comm-api-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-domain-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-gui-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-native-system-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-plugin-api-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-plugin-container-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-util-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-jboss-as-common-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-jmx-plugin-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-modules-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-platform-plugin-3.0.0-14.EmbJopr4.ep5.el4.noarch.rpm
rhq-plugins-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
slf4j-1.5.8-10_patch_01.2.ep5.el4.noarch.rpm
xalan-j2-2.7.1-6_patch_05.1.ep5.el4.noarch.rpm

x86_64:
jboss-eap5-native-5.1.2-1.4.ep5.el4.x86_64.rpm
mod_cluster-native-1.0.10-3.GA_CP02.ep5.el4.x86_64.rpm
mod_cluster-native-debuginfo-1.0.10-3.GA_CP02.ep5.el4.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2011-4314.html
https://access.redhat.com/security/updates/classification/#low
https://docs.redhat.com/docs/en-US/index.html
https://access.redhat.com/support/offerings/techpreview/

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFO4Sw8XlSAg2UNWIIRAhp0AJoDzbjQUoHp6KYJHzkwM2HTwtWguwCcCeB1
wbGG1g/vtGXsgIXQ/bUQ0Lk=
=oKz5
- -----END PGP SIGNATURE-----


- ----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: JBoss Enterprise Application Platform 5.1.2 update
Advisory ID:       RHSA-2011:1805-01
Product:           JBoss Enterprise Application Platform
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2011-1805.html
Issue date:        2011-12-08
CVE Names:         CVE-2011-4085 CVE-2011-4314 
=====================================================================

1. Summary:

JBoss Enterprise Application Platform 5.1.2, which fixes two security
issues, various bugs, and adds several enhancements is now available from
the Red Hat Customer Portal.

The Red Hat Security Response Team has rated this update as having low
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Description:

JBoss Enterprise Application Platform is a platform for Java applications,
which integrates the JBoss Application Server with JBoss Hibernate and
JBoss Seam. OpenID4Java allows you to implement OpenID authentication in
your Java applications. OpenID4Java is a Technology Preview.

This JBoss Enterprise Application Platform 5.1.2 release serves as a
replacement for JBoss Enterprise Application Platform 5.1.1, and includes
bug fixes and enhancements. Refer to the JBoss Enterprise Application
Platform 5.1.2 Release Notes for information on the most significant of
these changes. The Release Notes will be available shortly from
https://docs.redhat.com/docs/en-US/index.html

The following security issues are also fixed with this release:

It was found that the invoker servlets, deployed by default via
httpha-invoker, only performed access control on the HTTP GET and POST
methods, allowing remote attackers to make unauthenticated requests by
using different HTTP methods. Due to the second layer of authentication
provided by a security interceptor, this issue is not exploitable on
default installations unless an administrator has misconfigured the
security interceptor or disabled it. (CVE-2011-4085)

It was found that the Attribute Exchange (AX) extension of OpenID4Java was
not checking to ensure attributes were signed. If AX was being used to
receive information that an application only trusts the identity provider
to assert, a remote attacker could use this flaw to conduct
man-in-the-middle attacks and compromise the integrity of the information
via a specially-crafted request. By default, only the JBoss Seam openid
example application uses OpenID4Java. (CVE-2011-4314)

Warning: Before applying this update, back up the
"jboss-as/server/[PROFILE]/deploy/" directory and any other customized
configuration files of your JBoss Enterprise Application Platform.

All users of JBoss Enterprise Application Platform 5.1.1 as provided from
the Red Hat Customer Portal are advised to upgrade to JBoss Enterprise
Application Platform 5.1.2.

3. Solution:

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (http://bugzilla.redhat.com/):

750422 - CVE-2011-4085 Invoker servlets authentication bypass (HTTP verb tampering)
754386 - CVE-2011-4314 openid4java (AX extension): MITM due to improper validation of AX attribute signatures

5. References:

https://www.redhat.com/security/data/cve/CVE-2011-4085.html
https://www.redhat.com/security/data/cve/CVE-2011-4314.html
https://access.redhat.com/security/updates/classification/#low
https://docs.redhat.com/docs/en-US/index.html
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=distributions
https://access.redhat.com/support/offerings/techpreview/

6. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFO4SxXXlSAg2UNWIIRAuy9AJ46pOOgEi4UglK1GhOgEP3RbZ38hwCZAa30
pYYc46OffYOnStN8kWOzA9k=
=GTJm
- -----END PGP SIGNATURE-----

- ---BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: JBoss Enterprise Application Platform 5.1.2 update
Advisory ID:       RHSA-2011:1800-01
Product:           JBoss Enterprise Application Platform
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2011-1800.html
Issue date:        2011-12-08
CVE Names:         CVE-2011-4085 CVE-2011-4314 
=====================================================================

1. Summary:

Updated JBoss Enterprise Application Platform 5.1.2 packages that fix two
security issues, various bugs, and add several enhancements are now
available for Red Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having low
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

2. Relevant releases/architectures:

JBoss Enterprise Application Platform 5 for RHEL 4 AS - i386, noarch, x86_64
JBoss Enterprise Application Platform 5 for RHEL 4 ES - i386, noarch, x86_64

3. Description:

JBoss Enterprise Application Platform is a platform for Java applications,
which integrates the JBoss Application Server with JBoss Hibernate and
JBoss Seam. OpenID4Java allows you to implement OpenID authentication in
your Java applications. OpenID4Java is a Technology Preview.

This JBoss Enterprise Application Platform 5.1.2 release for Red Hat
Enterprise Linux 4 serves as a replacement for JBoss Enterprise Application
Platform 5.1.1.

These updated packages include bug fixes and enhancements. Refer to
the JBoss Enterprise Application Platform 5.1.2 Release Notes for
information on the most significant of these changes. The Release Notes
will be available shortly from
https://docs.redhat.com/docs/en-US/index.html

The following security issues are also fixed with this release:

It was found that the invoker servlets, deployed by default via
httpha-invoker, only performed access control on the HTTP GET and POST
methods, allowing remote attackers to make unauthenticated requests by
using different HTTP methods. Due to the second layer of authentication
provided by a security interceptor, this issue is not exploitable on
default installations unless an administrator has misconfigured the
security interceptor or disabled it. (CVE-2011-4085)

It was found that the Attribute Exchange (AX) extension of OpenID4Java was
not checking to ensure attributes were signed. If AX was being used to
receive information that an application only trusts the identity provider
to assert, a remote attacker could use this flaw to conduct
man-in-the-middle attacks and compromise the integrity of the information
via a specially-crafted request. By default, only the JBoss Seam openid
example application uses OpenID4Java. (CVE-2011-4314)

Warning: Before applying this update, back up the
"jboss-as/server/[PROFILE]/deploy/" directory and any other customized
configuration files of your JBoss Enterprise Application Platform.

All users of JBoss Enterprise Application Platform 5.1.1 on Red Hat
Enterprise Linux 4 are advised to upgrade to these updated packages. The
JBoss server process must be restarted for the update to take effect.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

733737 - Tracker bug for the EAP 5.1.2 release for RHEL-4.
750422 - CVE-2011-4085 Invoker servlets authentication bypass (HTTP verb tampering)
754386 - CVE-2011-4314 openid4java (AX extension): MITM due to improper validation of AX attribute signatures

6. Package List:

JBoss Enterprise Application Platform 5 for RHEL 4 AS:

Source:
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/apache-cxf-2.2.12-4.patch_02.1.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/cglib-2.2-5.3.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/facelets-1.1.15-3.B1_patch_01.2.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/glassfish-jaxb-2.1.12-10_patch_02.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/glassfish-jsf-1.2_13-5_patch_01.3.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jacorb-jboss-2.3.1-10.patch_03.4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jakarta-commons-logging-jboss-1.1-10.3_patch_02.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-aop2-2.1.6-2.CP03.1.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-cache-core-3.2.8-1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-cl-2.0.10-1.2.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-cluster-ha-client-1.1.4-1.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-common-core-2.2.18-1.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-eap5-native-5.1.2-1.4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-ejb3-core-1.3.8-0.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-ejb3-proxy-clustered-1.0.3-2.SP1.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-ejb3-proxy-impl-1.0.6-2.SP2.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-el-1.0_02-0.CR6.2.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-messaging-1.4.8-9.SP5.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-naming-5.0.3-3.CP01.3.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-remoting-2.5.4-9.SP3.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-seam2-2.2.5.EAP5-6.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jboss-security-spi-2.0.4-6.SP8.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jbossas-5.1.2-8.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jbossas-tp-licenses-5.1.2-7.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jbossas-ws-cxf-5.1.2-8.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jbosssx2-2.0.4-6.SP8.2.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jbossts-4.6.1-11.CP12.4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jbossweb-2.1.12-1.4_patch_01.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jbossws-3.1.2-7.SP11.4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jbossws-common-1.1.0-6.SP8_patch_01.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jbossws-framework-3.1.2-6.SP10.2.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jbossws-spi-1.1.2-5.SP7.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jgroups-2.6.20-1.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jopr-embedded-1.3.4-18.SP5.8.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jopr-hibernate-plugin-3.0.0-14.EmbJopr4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jopr-jboss-as-5-plugin-3.0.0-13.EmbJopr4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/jopr-jboss-cache-v3-plugin-3.0.0-14.EmbJopr4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/mod_cluster-1.0.10-3.GA_CP02.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/mod_cluster-native-1.0.10-3.GA_CP02.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/org-mc4j-ems-1.2.15.1-4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/picketlink-federation-2.0.2-1.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/resteasy-1.2.1-9.CP02.4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/rh-eap-docs-5.1.2-6.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/rhq-3.0.0-21.EmbJopr4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/rhq-jmx-plugin-3.0.0-21.EmbJopr4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/rhq-platform-plugin-3.0.0-14.EmbJopr4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/slf4j-1.5.8-10_patch_01.2.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4AS/en/JBEAP/SRPMS/xalan-j2-2.7.1-6_patch_05.1.ep5.el4.src.rpm

i386:
jboss-eap5-native-5.1.2-1.4.ep5.el4.i386.rpm
mod_cluster-native-1.0.10-3.GA_CP02.ep5.el4.i386.rpm
mod_cluster-native-debuginfo-1.0.10-3.GA_CP02.ep5.el4.i386.rpm

noarch:
apache-cxf-2.2.12-4.patch_02.1.1.ep5.el4.noarch.rpm
cglib-2.2-5.3.ep5.el4.noarch.rpm
facelets-1.1.15-3.B1_patch_01.2.ep5.el4.noarch.rpm
glassfish-jaxb-2.1.12-10_patch_02.ep5.el4.noarch.rpm
glassfish-jsf-1.2_13-5_patch_01.3.ep5.el4.noarch.rpm
jacorb-jboss-2.3.1-10.patch_03.4.ep5.el4.noarch.rpm
jakarta-commons-logging-jboss-1.1-10.3_patch_02.1.ep5.el4.noarch.rpm
jboss-aop2-2.1.6-2.CP03.1.1.ep5.el4.noarch.rpm
jboss-cache-core-3.2.8-1.ep5.el4.noarch.rpm
jboss-cl-2.0.10-1.2.ep5.el4.noarch.rpm
jboss-cluster-ha-client-1.1.4-1.1.ep5.el4.noarch.rpm
jboss-common-core-2.2.18-1.1.ep5.el4.noarch.rpm
jboss-ejb3-core-1.3.8-0.1.ep5.el4.noarch.rpm
jboss-ejb3-proxy-clustered-1.0.3-2.SP1.1.ep5.el4.noarch.rpm
jboss-ejb3-proxy-impl-1.0.6-2.SP2.1.ep5.el4.noarch.rpm
jboss-el-1.0_02-0.CR6.2.ep5.el4.noarch.rpm
jboss-messaging-1.4.8-9.SP5.1.ep5.el4.noarch.rpm
jboss-naming-5.0.3-3.CP01.3.1.ep5.el4.noarch.rpm
jboss-remoting-2.5.4-9.SP3.1.ep5.el4.noarch.rpm
jboss-seam2-2.2.5.EAP5-6.ep5.el4.noarch.rpm
jboss-seam2-docs-2.2.5.EAP5-6.ep5.el4.noarch.rpm
jboss-seam2-examples-2.2.5.EAP5-6.ep5.el4.noarch.rpm
jboss-seam2-runtime-2.2.5.EAP5-6.ep5.el4.noarch.rpm
jboss-security-spi-2.0.4-6.SP8.1.ep5.el4.noarch.rpm
jbossas-5.1.2-8.ep5.el4.noarch.rpm
jbossas-client-5.1.2-8.ep5.el4.noarch.rpm
jbossas-messaging-5.1.2-8.ep5.el4.noarch.rpm
jbossas-tp-licenses-5.1.2-7.ep5.el4.noarch.rpm
jbossas-ws-cxf-5.1.2-8.ep5.el4.noarch.rpm
jbossas-ws-native-5.1.2-8.ep5.el4.noarch.rpm
jbosssx2-2.0.4-6.SP8.2.ep5.el4.noarch.rpm
jbossts-4.6.1-11.CP12.4.ep5.el4.noarch.rpm
jbossts-javadoc-4.6.1-11.CP12.4.ep5.el4.noarch.rpm
jbossweb-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossweb-el-1.0-api-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossweb-jsp-2.1-api-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossweb-lib-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossweb-servlet-2.5-api-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossws-3.1.2-7.SP11.4.ep5.el4.noarch.rpm
jbossws-common-1.1.0-6.SP8_patch_01.1.ep5.el4.noarch.rpm
jbossws-framework-3.1.2-6.SP10.2.ep5.el4.noarch.rpm
jbossws-spi-1.1.2-5.SP7.1.ep5.el4.noarch.rpm
jgroups-2.6.20-1.1.ep5.el4.noarch.rpm
jopr-embedded-1.3.4-18.SP5.8.ep5.el4.noarch.rpm
jopr-hibernate-plugin-3.0.0-14.EmbJopr4.ep5.el4.noarch.rpm
jopr-jboss-as-5-plugin-3.0.0-13.EmbJopr4.ep5.el4.noarch.rpm
jopr-jboss-cache-v3-plugin-3.0.0-14.EmbJopr4.ep5.el4.noarch.rpm
mod_cluster-demo-1.0.10-3.GA_CP02.ep5.el4.noarch.rpm
mod_cluster-jbossas-1.0.10-3.GA_CP02.ep5.el4.noarch.rpm
mod_cluster-jbossweb2-1.0.10-3.GA_CP02.ep5.el4.noarch.rpm
mod_cluster-tomcat6-1.0.10-3.GA_CP02.ep5.el4.noarch.rpm
org-mc4j-ems-1.2.15.1-4.ep5.el4.noarch.rpm
picketlink-federation-2.0.2-1.1.ep5.el4.noarch.rpm
picketlink-federation-webapp-idp-2.0.2-1.1.ep5.el4.noarch.rpm
picketlink-federation-webapp-pdp-2.0.2-1.1.ep5.el4.noarch.rpm
picketlink-federation-webapp-sts-2.0.2-1.1.ep5.el4.noarch.rpm
resteasy-1.2.1-9.CP02.4.ep5.el4.noarch.rpm
resteasy-examples-1.2.1-9.CP02.4.ep5.el4.noarch.rpm
resteasy-javadoc-1.2.1-9.CP02.4.ep5.el4.noarch.rpm
resteasy-manual-1.2.1-9.CP02.4.ep5.el4.noarch.rpm
rh-eap-docs-5.1.2-6.ep5.el4.noarch.rpm
rh-eap-docs-examples-5.1.2-6.ep5.el4.noarch.rpm
rhq-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-common-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-client-api-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-comm-api-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-domain-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-gui-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-native-system-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-plugin-api-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-plugin-container-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-util-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-jboss-as-common-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-jmx-plugin-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-modules-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-platform-plugin-3.0.0-14.EmbJopr4.ep5.el4.noarch.rpm
rhq-plugins-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
slf4j-1.5.8-10_patch_01.2.ep5.el4.noarch.rpm
xalan-j2-2.7.1-6_patch_05.1.ep5.el4.noarch.rpm

x86_64:
jboss-eap5-native-5.1.2-1.4.ep5.el4.x86_64.rpm
mod_cluster-native-1.0.10-3.GA_CP02.ep5.el4.x86_64.rpm
mod_cluster-native-debuginfo-1.0.10-3.GA_CP02.ep5.el4.x86_64.rpm

JBoss Enterprise Application Platform 5 for RHEL 4 ES:

Source:
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/apache-cxf-2.2.12-4.patch_02.1.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/cglib-2.2-5.3.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/facelets-1.1.15-3.B1_patch_01.2.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/glassfish-jaxb-2.1.12-10_patch_02.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/glassfish-jsf-1.2_13-5_patch_01.3.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jacorb-jboss-2.3.1-10.patch_03.4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jakarta-commons-logging-jboss-1.1-10.3_patch_02.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-aop2-2.1.6-2.CP03.1.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-cache-core-3.2.8-1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-cl-2.0.10-1.2.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-cluster-ha-client-1.1.4-1.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-common-core-2.2.18-1.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-eap5-native-5.1.2-1.4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-ejb3-core-1.3.8-0.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-ejb3-proxy-clustered-1.0.3-2.SP1.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-ejb3-proxy-impl-1.0.6-2.SP2.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-el-1.0_02-0.CR6.2.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-messaging-1.4.8-9.SP5.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-naming-5.0.3-3.CP01.3.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-remoting-2.5.4-9.SP3.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-seam2-2.2.5.EAP5-6.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jboss-security-spi-2.0.4-6.SP8.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jbossas-5.1.2-8.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jbossas-tp-licenses-5.1.2-7.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jbossas-ws-cxf-5.1.2-8.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jbosssx2-2.0.4-6.SP8.2.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jbossts-4.6.1-11.CP12.4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jbossweb-2.1.12-1.4_patch_01.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jbossws-3.1.2-7.SP11.4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jbossws-common-1.1.0-6.SP8_patch_01.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jbossws-framework-3.1.2-6.SP10.2.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jbossws-spi-1.1.2-5.SP7.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jgroups-2.6.20-1.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jopr-embedded-1.3.4-18.SP5.8.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jopr-hibernate-plugin-3.0.0-14.EmbJopr4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jopr-jboss-as-5-plugin-3.0.0-13.EmbJopr4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/jopr-jboss-cache-v3-plugin-3.0.0-14.EmbJopr4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/mod_cluster-1.0.10-3.GA_CP02.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/mod_cluster-native-1.0.10-3.GA_CP02.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/org-mc4j-ems-1.2.15.1-4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/picketlink-federation-2.0.2-1.1.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/resteasy-1.2.1-9.CP02.4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/rh-eap-docs-5.1.2-6.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/rhq-3.0.0-21.EmbJopr4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/rhq-jmx-plugin-3.0.0-21.EmbJopr4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/rhq-platform-plugin-3.0.0-14.EmbJopr4.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/slf4j-1.5.8-10_patch_01.2.ep5.el4.src.rpm
ftp://updates.redhat.com/enterprise/4ES/en/JBEAP/SRPMS/xalan-j2-2.7.1-6_patch_05.1.ep5.el4.src.rpm

i386:
jboss-eap5-native-5.1.2-1.4.ep5.el4.i386.rpm
mod_cluster-native-1.0.10-3.GA_CP02.ep5.el4.i386.rpm
mod_cluster-native-debuginfo-1.0.10-3.GA_CP02.ep5.el4.i386.rpm

noarch:
apache-cxf-2.2.12-4.patch_02.1.1.ep5.el4.noarch.rpm
cglib-2.2-5.3.ep5.el4.noarch.rpm
facelets-1.1.15-3.B1_patch_01.2.ep5.el4.noarch.rpm
glassfish-jaxb-2.1.12-10_patch_02.ep5.el4.noarch.rpm
glassfish-jsf-1.2_13-5_patch_01.3.ep5.el4.noarch.rpm
jacorb-jboss-2.3.1-10.patch_03.4.ep5.el4.noarch.rpm
jakarta-commons-logging-jboss-1.1-10.3_patch_02.1.ep5.el4.noarch.rpm
jboss-aop2-2.1.6-2.CP03.1.1.ep5.el4.noarch.rpm
jboss-cache-core-3.2.8-1.ep5.el4.noarch.rpm
jboss-cl-2.0.10-1.2.ep5.el4.noarch.rpm
jboss-cluster-ha-client-1.1.4-1.1.ep5.el4.noarch.rpm
jboss-common-core-2.2.18-1.1.ep5.el4.noarch.rpm
jboss-ejb3-core-1.3.8-0.1.ep5.el4.noarch.rpm
jboss-ejb3-proxy-clustered-1.0.3-2.SP1.1.ep5.el4.noarch.rpm
jboss-ejb3-proxy-impl-1.0.6-2.SP2.1.ep5.el4.noarch.rpm
jboss-el-1.0_02-0.CR6.2.ep5.el4.noarch.rpm
jboss-messaging-1.4.8-9.SP5.1.ep5.el4.noarch.rpm
jboss-naming-5.0.3-3.CP01.3.1.ep5.el4.noarch.rpm
jboss-remoting-2.5.4-9.SP3.1.ep5.el4.noarch.rpm
jboss-seam2-2.2.5.EAP5-6.ep5.el4.noarch.rpm
jboss-seam2-docs-2.2.5.EAP5-6.ep5.el4.noarch.rpm
jboss-seam2-examples-2.2.5.EAP5-6.ep5.el4.noarch.rpm
jboss-seam2-runtime-2.2.5.EAP5-6.ep5.el4.noarch.rpm
jboss-security-spi-2.0.4-6.SP8.1.ep5.el4.noarch.rpm
jbossas-5.1.2-8.ep5.el4.noarch.rpm
jbossas-client-5.1.2-8.ep5.el4.noarch.rpm
jbossas-messaging-5.1.2-8.ep5.el4.noarch.rpm
jbossas-tp-licenses-5.1.2-7.ep5.el4.noarch.rpm
jbossas-ws-cxf-5.1.2-8.ep5.el4.noarch.rpm
jbossas-ws-native-5.1.2-8.ep5.el4.noarch.rpm
jbosssx2-2.0.4-6.SP8.2.ep5.el4.noarch.rpm
jbossts-4.6.1-11.CP12.4.ep5.el4.noarch.rpm
jbossts-javadoc-4.6.1-11.CP12.4.ep5.el4.noarch.rpm
jbossweb-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossweb-el-1.0-api-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossweb-jsp-2.1-api-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossweb-lib-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossweb-servlet-2.5-api-2.1.12-1.4_patch_01.ep5.el4.noarch.rpm
jbossws-3.1.2-7.SP11.4.ep5.el4.noarch.rpm
jbossws-common-1.1.0-6.SP8_patch_01.1.ep5.el4.noarch.rpm
jbossws-framework-3.1.2-6.SP10.2.ep5.el4.noarch.rpm
jbossws-spi-1.1.2-5.SP7.1.ep5.el4.noarch.rpm
jgroups-2.6.20-1.1.ep5.el4.noarch.rpm
jopr-embedded-1.3.4-18.SP5.8.ep5.el4.noarch.rpm
jopr-hibernate-plugin-3.0.0-14.EmbJopr4.ep5.el4.noarch.rpm
jopr-jboss-as-5-plugin-3.0.0-13.EmbJopr4.ep5.el4.noarch.rpm
jopr-jboss-cache-v3-plugin-3.0.0-14.EmbJopr4.ep5.el4.noarch.rpm
mod_cluster-demo-1.0.10-3.GA_CP02.ep5.el4.noarch.rpm
mod_cluster-jbossas-1.0.10-3.GA_CP02.ep5.el4.noarch.rpm
mod_cluster-jbossweb2-1.0.10-3.GA_CP02.ep5.el4.noarch.rpm
mod_cluster-tomcat6-1.0.10-3.GA_CP02.ep5.el4.noarch.rpm
org-mc4j-ems-1.2.15.1-4.ep5.el4.noarch.rpm
picketlink-federation-2.0.2-1.1.ep5.el4.noarch.rpm
picketlink-federation-webapp-idp-2.0.2-1.1.ep5.el4.noarch.rpm
picketlink-federation-webapp-pdp-2.0.2-1.1.ep5.el4.noarch.rpm
picketlink-federation-webapp-sts-2.0.2-1.1.ep5.el4.noarch.rpm
resteasy-1.2.1-9.CP02.4.ep5.el4.noarch.rpm
resteasy-examples-1.2.1-9.CP02.4.ep5.el4.noarch.rpm
resteasy-javadoc-1.2.1-9.CP02.4.ep5.el4.noarch.rpm
resteasy-manual-1.2.1-9.CP02.4.ep5.el4.noarch.rpm
rh-eap-docs-5.1.2-6.ep5.el4.noarch.rpm
rh-eap-docs-examples-5.1.2-6.ep5.el4.noarch.rpm
rhq-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-common-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-client-api-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-comm-api-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-domain-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-gui-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-native-system-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-plugin-api-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-plugin-container-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-core-util-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-jboss-as-common-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-jmx-plugin-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-modules-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
rhq-platform-plugin-3.0.0-14.EmbJopr4.ep5.el4.noarch.rpm
rhq-plugins-parent-3.0.0-21.EmbJopr4.ep5.el4.noarch.rpm
slf4j-1.5.8-10_patch_01.2.ep5.el4.noarch.rpm
xalan-j2-2.7.1-6_patch_05.1.ep5.el4.noarch.rpm

x86_64:
jboss-eap5-native-5.1.2-1.4.ep5.el4.x86_64.rpm
mod_cluster-native-1.0.10-3.GA_CP02.ep5.el4.x86_64.rpm
mod_cluster-native-debuginfo-1.0.10-3.GA_CP02.ep5.el4.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2011-4085.html
https://www.redhat.com/security/data/cve/CVE-2011-4314.html
https://access.redhat.com/security/updates/classification/#low
https://docs.redhat.com/docs/en-US/index.html
https://access.redhat.com/support/offerings/techpreview/

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFO4SruXlSAg2UNWIIRAtd3AJ43lL1NQY2GE3J7q02MYfGKD//LWACeN/JI
VpHJWGd3m6aEJIJB3+HUQtg=
=ccIt
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=rnhS
-----END PGP SIGNATURE-----