Updated Red Hat JBoss Enterprise Application Platform 6.2.2 packages thatfix one security issue are now available for Red Hat Enterprise Linux 5and 6.The Red Hat Security Response Team has rated this update as havingImportant security impact. A Common Vulnerability Scoring System (CVSS)base score, which gives a detailed severity rating, is available from theCVE link in the References section.

Red Hat JBoss Enterprise Application Platform 6 is a platform for Javaapplications based on JBoss Application Server 7.It was found that the secure processing feature of Xalan-Java hadinsufficient restrictions defined for certain properties and features.A remote attacker able to provide Extensible Stylesheet LanguageTransformations (XSLT) content to be processed by an application usingXalan-Java could use this flaw to bypass the intended constraints of thesecure processing feature. Depending on the components available in theclasspath, this could lead to arbitrary remote code execution in thecontext of the application server running the application that usesXalan-Java. (CVE-2014-0107)All users of Red Hat JBoss Enterprise Application Platform 6.2.2 on Red HatEnterprise Linux 5 and 6 are advised to upgrade to these updated packages.The JBoss server process must be restarted for the update to take effect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied. Also, back up any customized RedHat JBoss Enterprise Application Platform 6 configuration files. On update,the configuration files that have been locally modified will not beupdated. The updated version of such files will be stored as the rpmnewfiles. Make sure to locate any such files after the update and merge anychanges manually.This update is available via the Red Hat Network. Details on how to use theRed Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258JBoss Enterprise Application Platform 6 EL5

SRPMS:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el5.src.rpm
    MD5: e3749fc71bd32fcc0e1d6caf5ad6be85SHA-256: 2e6916a1fd688edb24c9ef1c4dbb62503c84c698ef6e19e5171013db25abcfdb
 
IA-32:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el5.noarch.rpm
    MD5: 1769a6e32193947dc81f38e06b0f8726SHA-256: e67bbf5243eb9bab88e780d56d5c72540d6858136f3c2241cd026a5c12e683c5
 
x86_64:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el5.noarch.rpm
    MD5: 1769a6e32193947dc81f38e06b0f8726SHA-256: e67bbf5243eb9bab88e780d56d5c72540d6858136f3c2241cd026a5c12e683c5
 
JBoss Enterprise Application Platform 6 EL6

SRPMS:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el6.src.rpm
    MD5: 543b1fb669f54949001f72efc8f43fe7SHA-256: 693b20419013ce5a6c8fc56afb8f0f204cd299d2b1667ba7a5180e5ab26950c0
 
IA-32:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el6.noarch.rpm
    MD5: e99a695021af70e045fc12808d7db316SHA-256: e28b7d617d934b2f6afbe3890f562f449371d47b1ada4ad99ef96d837e618f08
 
x86_64:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el6.noarch.rpm
    MD5: e99a695021af70e045fc12808d7db316SHA-256: e28b7d617d934b2f6afbe3890f562f449371d47b1ada4ad99ef96d837e618f08
 
JBoss Enterprise Application Platform 6.2 EL5

SRPMS:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el5.src.rpm
    MD5: e3749fc71bd32fcc0e1d6caf5ad6be85SHA-256: 2e6916a1fd688edb24c9ef1c4dbb62503c84c698ef6e19e5171013db25abcfdb
 
IA-32:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el5.noarch.rpm
    MD5: 1769a6e32193947dc81f38e06b0f8726SHA-256: e67bbf5243eb9bab88e780d56d5c72540d6858136f3c2241cd026a5c12e683c5
 
x86_64:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el5.noarch.rpm
    MD5: 1769a6e32193947dc81f38e06b0f8726SHA-256: e67bbf5243eb9bab88e780d56d5c72540d6858136f3c2241cd026a5c12e683c5
 
JBoss Enterprise Application Platform 6.2 EL6

SRPMS:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el6.src.rpm
    MD5: 543b1fb669f54949001f72efc8f43fe7SHA-256: 693b20419013ce5a6c8fc56afb8f0f204cd299d2b1667ba7a5180e5ab26950c0
 
IA-32:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el6.noarch.rpm
    MD5: e99a695021af70e045fc12808d7db316SHA-256: e28b7d617d934b2f6afbe3890f562f449371d47b1ada4ad99ef96d837e618f08
 
x86_64:
xalan-j2-eap6-2.7.1-9.redhat_7.1.ep6.el6.noarch.rpm
    MD5: e99a695021af70e045fc12808d7db316SHA-256: e28b7d617d934b2f6afbe3890f562f449371d47b1ada4ad99ef96d837e618f08
 
(The unlinked packages above are only available from the Red Hat Network)
1080248 – CVE-2014-0107 Xalan-Java: insufficient constraints in secure processing feature

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply